SlideShare a Scribd company logo
1 of 47
PHISHING A THREAT TO
NETWORK SECURITY
1
OUTLINE……
Introduction
What Is Phishing??
What Kind Of Information
Do The Hackers Want?
How Phishing Is Done?
Techniques Of Phishing
Prevention
Conclusion
2
INTRODUCTION
Origin of word “Phishing” from two words –
‘Password’ & ‘Harvesting’.
3
 There are a number of different phishing
techniques used to obtain personal information
from users.
 As technology becomes more advanced, the
phishing techniques being used are also more
advanced.
 To prevent Internet phishing, users should
have knowledge of various types of phishing
techniques and we should also be aware of
anti-phishing techniques to protect ourselves
from getting phished.
4
PHISHING
 Phishing is a type of deception designed to
steal your valuable personal data, such as
credit card numbers, passwords, account data,
or other information.
5
 Your name, address and
date of birth
 Social Security number
 Driver’s License number
 Credit Card numbers
 ATM cards
 Telephone calling cards
6
SECTORS WHICH PHISHING IS DONE 7
8HOW PHISHING IS DONE ??
http://fbaction.net/
9
10
11
12
Difference between https and http
If You are using Hypertext Transfer Protocol
Secure (HTTPS) Instead of Hypertext Transfer
Protocol (HTTP), then your website is safe and no one
can steal your information.
If No, Then The website You are working with is
not safe….!
• To verify the website you are connecting to is the
genuine website.
• To ensure the privacy of your data during transit.
• To ensure the integrity of your data during transit.
Why do we use TLS or SSL? 13
 Using https, the computers agree
on a “code”
This “code” is running in TLS or
SSL so that no one can steal Your
personal Information.
14Why https is safe?
TYPES OF PHISHING
 Clone phishing
 Spear phishing
 Whaling phishing
15
Clone Phishing
16
Content of original mail (including link) copied
to create duplicate email. But the link may be
replaced with phishers fake or harmful links.
Spear Phishing
Phishing attempts directed at specific
individuals or companies have been termed
Spear Phishing.
Whaling Phishing
Phishing attacks have been directed specifically
at senior executives and other high profile
targets within businesses is known as Whaling
Phishing.
Phishing
Link
manipul
-ation
Key
loggers
Session
hacking
Phone
phishing
17
Link manipulation
18
1)Link manipulation
Link manipulation is the technique
in which the phisher sends fake link
to A website that is usually visited
by the victim or the user.
Two Types Of Fake Links.
Link Which Redirected to Phishers
website.
Malware Links.
19
20
Link Which Redirected to Phishers
website.
Malware Links. 21
22
23
Example
24
HOW TO PREVENT?
 One of the anti-phishing techniques used to prevent
link manipulation is to move the mouse over the link
to view the actual address.
 To check the http”s” connection in address bar ,
meaning its a secure connection.
25
KEY LOGGERS
26
WHY KEYLOGGERS ARE A THREAT?
 key loggers doesn't make any threat to the
system itself
 A key logger is a type of software can record
instant messages, e-mail, and any information
you type at any time using your keyboard.
 As a result, cyber criminals can get PIN codes
and account numbers for e-payment systems,
passwords to online gaming accounts, email
addresses, user names, email passwords etc.
27
HOW TO DETECT AND PREVENT??
 Make entries through the virtual keyboard.
 install an antivirus product and keep its database up to
date.
 Use anti-spyware software's.
28
29SESSION HIJACKING
•Session Hijacking (a.k.a. Session Side jacking) is a form
of Man In The Middle (MITM) attack.
• In which a malicious attacker has access to the transport
layer and can eavesdrop on communications.
•When communications are not protected they can steal
the unique session ID and imitate the victim on the
target site.
•This grants the attacker access to your account and data.
SESSION HIJACKING 30
Example…! 31
Steps in Session Hijacking
1. Place yourself between the victim and the target .
2. Monitor the flow of packets
3. Predict the sequence number
4. Kill the connection to the victim’s machine
5. Take over the session
6. Start injecting packets to the target server
32
Prevention of session hijacking
1.Encription and connectivity.
2.Use anti-virus software.
PHONE
PHISHING
33
Phone phishing
 Mobile Phishing is a social engineering
technique where the attack is invited via mobile
texting rather than email.
 Using Fake Calls and will say to dial something.
 Using fake SMS.
34
Examples of phone phishing 35
So be careful
when you
use Mobile
banking and
all..!
36
Email Spoofing
 Email Trap By Using Fake Email Address.
 This is the trick
Used by spammers.
37
Defensive tips against email spoofing
 Firstly check the salutation
 Take care of grammar
mistakes
 Must check the links in email
 Claiming that an email has
come from reliable source
 Forward spoofed emails to
FTC (Federal Trade
Commission)
38
Prevention Against Phishing Attack
39
1.Never respond to emails that request
personal financial information 40
2.Visit bank’s websites by typing the
URL into the address bar
41
3.Keep a regular check on your
Accounts and Credit cards. 42
4.Be cautious with emails and personal data .
43
5.Keep your computer secure
6.Use anti-spam
software
447.Use anti-
spyware software
8. Use Firewall.
9. Check the website you are
visiting is secure.
10. Always report suspicious
activity
45
11. GET EDUCATED ABOUT
PHISHING PREVENTION ATTACK
“It is better to be safer now, than feel sorry later”
46
47

More Related Content

What's hot

How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanControlScan, Inc.
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks pptAryan Ragu
 
Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Preventionsonalikharade3
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness TrainingJen Ruhman
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafeCheapSSLsecurity
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing AttacksJagan Mohan
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threatsourav newatia
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation sweetpeace1
 
Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...ABHAY PATHAK
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasuresJorge Sebastiao
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N Gbensonoo
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Jay Nagar
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness TrainingDave Monahan
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorJames Krusic
 

What's hot (20)

How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Prevention
 
Phising
PhisingPhising
Phising
 
Phishing
PhishingPhishing
Phishing
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
PHISHING attack
PHISHING attack PHISHING attack
PHISHING attack
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You Safe
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing Attacks
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threat
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Phishing
PhishingPhishing
Phishing
 
Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human Behavior
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 

Viewers also liked

Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber SecurityAnand Kater
 
Let's legalize Gambling in India
Let's legalize Gambling in IndiaLet's legalize Gambling in India
Let's legalize Gambling in IndiaAlankar Das
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Simon Salter
 
Forms in nature.upload to slideshare
Forms in nature.upload to slideshareForms in nature.upload to slideshare
Forms in nature.upload to slideshareclarizadave
 
Social Action and Art Education: A Curriculum for Change
Social Action and Art Education: A Curriculum for ChangeSocial Action and Art Education: A Curriculum for Change
Social Action and Art Education: A Curriculum for Changepiqahamin
 
Pitstop - One stop solution to resource management
Pitstop - One stop solution to resource managementPitstop - One stop solution to resource management
Pitstop - One stop solution to resource managementAnushree Prasanna Kumar
 
Article review
Article reviewArticle review
Article reviewpiqahamin
 
公器不私用 - 企业实时通讯新世代 (先作科技有限公司 谢权华先生)
公器不私用 - 企业实时通讯新世代 (先作科技有限公司 谢权华先生)公器不私用 - 企业实时通讯新世代 (先作科技有限公司 谢权华先生)
公器不私用 - 企业实时通讯新世代 (先作科技有限公司 谢权华先生)ITSolutionDirectory
 
Tcpo2 electrode maintenance
Tcpo2 electrode maintenance Tcpo2 electrode maintenance
Tcpo2 electrode maintenance Perimed
 
Gave Dingen Doen (GDD) Breda - Pitch Vincent over VoxVote
Gave Dingen Doen (GDD) Breda - Pitch Vincent over VoxVoteGave Dingen Doen (GDD) Breda - Pitch Vincent over VoxVote
Gave Dingen Doen (GDD) Breda - Pitch Vincent over VoxVoteeBay for Business
 
Using art in pre-registration nurse education
Using art in pre-registration nurse educationUsing art in pre-registration nurse education
Using art in pre-registration nurse educationpiqahamin
 
CALMing the High Cost of Educational Resources: How CSUSM is Creating Alterna...
CALMing the High Cost of Educational Resources: How CSUSM is Creating Alterna...CALMing the High Cost of Educational Resources: How CSUSM is Creating Alterna...
CALMing the High Cost of Educational Resources: How CSUSM is Creating Alterna...Carmen Mitchell
 
Reconceptualizing the Role of Creativity in Art Education Theory and Practice
Reconceptualizing the Role of Creativity in Art Education Theory and PracticeReconceptualizing the Role of Creativity in Art Education Theory and Practice
Reconceptualizing the Role of Creativity in Art Education Theory and Practicepiqahamin
 

Viewers also liked (19)

Cyber security
Cyber securityCyber security
Cyber security
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
 
Let's legalize Gambling in India
Let's legalize Gambling in IndiaLet's legalize Gambling in India
Let's legalize Gambling in India
 
phising netiqueta
phising netiquetaphising netiqueta
phising netiqueta
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Social Analytics
Social AnalyticsSocial Analytics
Social Analytics
 
Forms in nature.upload to slideshare
Forms in nature.upload to slideshareForms in nature.upload to slideshare
Forms in nature.upload to slideshare
 
Araling Panlipunan
Araling PanlipunanAraling Panlipunan
Araling Panlipunan
 
Social Action and Art Education: A Curriculum for Change
Social Action and Art Education: A Curriculum for ChangeSocial Action and Art Education: A Curriculum for Change
Social Action and Art Education: A Curriculum for Change
 
Pitstop - One stop solution to resource management
Pitstop - One stop solution to resource managementPitstop - One stop solution to resource management
Pitstop - One stop solution to resource management
 
Article review
Article reviewArticle review
Article review
 
公器不私用 - 企业实时通讯新世代 (先作科技有限公司 谢权华先生)
公器不私用 - 企业实时通讯新世代 (先作科技有限公司 谢权华先生)公器不私用 - 企业实时通讯新世代 (先作科技有限公司 谢权华先生)
公器不私用 - 企业实时通讯新世代 (先作科技有限公司 谢权华先生)
 
Consuntivo 2014 dell'economia regionale
Consuntivo 2014 dell'economia regionaleConsuntivo 2014 dell'economia regionale
Consuntivo 2014 dell'economia regionale
 
Tcpo2 electrode maintenance
Tcpo2 electrode maintenance Tcpo2 electrode maintenance
Tcpo2 electrode maintenance
 
Gave Dingen Doen (GDD) Breda - Pitch Vincent over VoxVote
Gave Dingen Doen (GDD) Breda - Pitch Vincent over VoxVoteGave Dingen Doen (GDD) Breda - Pitch Vincent over VoxVote
Gave Dingen Doen (GDD) Breda - Pitch Vincent over VoxVote
 
Using art in pre-registration nurse education
Using art in pre-registration nurse educationUsing art in pre-registration nurse education
Using art in pre-registration nurse education
 
Le Camere dell'Economia - Da quarant'anni in rete per lo sviluppo
Le Camere dell'Economia - Da quarant'anni in rete per lo sviluppoLe Camere dell'Economia - Da quarant'anni in rete per lo sviluppo
Le Camere dell'Economia - Da quarant'anni in rete per lo sviluppo
 
CALMing the High Cost of Educational Resources: How CSUSM is Creating Alterna...
CALMing the High Cost of Educational Resources: How CSUSM is Creating Alterna...CALMing the High Cost of Educational Resources: How CSUSM is Creating Alterna...
CALMing the High Cost of Educational Resources: How CSUSM is Creating Alterna...
 
Reconceptualizing the Role of Creativity in Art Education Theory and Practice
Reconceptualizing the Role of Creativity in Art Education Theory and PracticeReconceptualizing the Role of Creativity in Art Education Theory and Practice
Reconceptualizing the Role of Creativity in Art Education Theory and Practice
 

Similar to Phising a Threat to Network Security

Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2Conf
 
Cyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptxCyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptxjenanityanand4
 
E Mail Phishing Prevention and Detection
E Mail Phishing Prevention and DetectionE Mail Phishing Prevention and Detection
E Mail Phishing Prevention and Detectionijtsrd
 
phishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptxphishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptxErrorError22
 
Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniquesSushil Kumar
 
December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10seadeloitte
 
Web spoofing hacking
Web spoofing hackingWeb spoofing hacking
Web spoofing hackingjignesh khunt
 
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awarenessOWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awarenessMaherHamza9
 
Phishing technique tanish khilani
Phishing technique tanish  khilani Phishing technique tanish  khilani
Phishing technique tanish khilani Tanish Khilani
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresIRJET Journal
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingmentAswani34
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...Ankita Shirke
 

Similar to Phising a Threat to Network Security (20)

Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Cyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptxCyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptx
 
E Mail Phishing Prevention and Detection
E Mail Phishing Prevention and DetectionE Mail Phishing Prevention and Detection
E Mail Phishing Prevention and Detection
 
phishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptxphishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptx
 
Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniques
 
December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10
 
Pp8
Pp8Pp8
Pp8
 
Web spoofing hacking
Web spoofing hackingWeb spoofing hacking
Web spoofing hacking
 
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awarenessOWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
 
Phishing technique tanish khilani
Phishing technique tanish  khilani Phishing technique tanish  khilani
Phishing technique tanish khilani
 
Phishing.pdf
Phishing.pdfPhishing.pdf
Phishing.pdf
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
 
Phishing and hacking
Phishing and hackingPhishing and hacking
Phishing and hacking
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
 

Recently uploaded

Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 

Phising a Threat to Network Security

  • 1. PHISHING A THREAT TO NETWORK SECURITY 1
  • 2. OUTLINE…… Introduction What Is Phishing?? What Kind Of Information Do The Hackers Want? How Phishing Is Done? Techniques Of Phishing Prevention Conclusion 2
  • 3. INTRODUCTION Origin of word “Phishing” from two words – ‘Password’ & ‘Harvesting’. 3
  • 4.  There are a number of different phishing techniques used to obtain personal information from users.  As technology becomes more advanced, the phishing techniques being used are also more advanced.  To prevent Internet phishing, users should have knowledge of various types of phishing techniques and we should also be aware of anti-phishing techniques to protect ourselves from getting phished. 4
  • 5. PHISHING  Phishing is a type of deception designed to steal your valuable personal data, such as credit card numbers, passwords, account data, or other information. 5
  • 6.  Your name, address and date of birth  Social Security number  Driver’s License number  Credit Card numbers  ATM cards  Telephone calling cards 6
  • 10. 10
  • 11. 11
  • 12. 12 Difference between https and http If You are using Hypertext Transfer Protocol Secure (HTTPS) Instead of Hypertext Transfer Protocol (HTTP), then your website is safe and no one can steal your information. If No, Then The website You are working with is not safe….!
  • 13. • To verify the website you are connecting to is the genuine website. • To ensure the privacy of your data during transit. • To ensure the integrity of your data during transit. Why do we use TLS or SSL? 13
  • 14.  Using https, the computers agree on a “code” This “code” is running in TLS or SSL so that no one can steal Your personal Information. 14Why https is safe?
  • 15. TYPES OF PHISHING  Clone phishing  Spear phishing  Whaling phishing 15
  • 16. Clone Phishing 16 Content of original mail (including link) copied to create duplicate email. But the link may be replaced with phishers fake or harmful links. Spear Phishing Phishing attempts directed at specific individuals or companies have been termed Spear Phishing. Whaling Phishing Phishing attacks have been directed specifically at senior executives and other high profile targets within businesses is known as Whaling Phishing.
  • 19. 1)Link manipulation Link manipulation is the technique in which the phisher sends fake link to A website that is usually visited by the victim or the user. Two Types Of Fake Links. Link Which Redirected to Phishers website. Malware Links. 19
  • 20. 20 Link Which Redirected to Phishers website.
  • 22. 22
  • 24. 24
  • 25. HOW TO PREVENT?  One of the anti-phishing techniques used to prevent link manipulation is to move the mouse over the link to view the actual address.  To check the http”s” connection in address bar , meaning its a secure connection. 25
  • 27. WHY KEYLOGGERS ARE A THREAT?  key loggers doesn't make any threat to the system itself  A key logger is a type of software can record instant messages, e-mail, and any information you type at any time using your keyboard.  As a result, cyber criminals can get PIN codes and account numbers for e-payment systems, passwords to online gaming accounts, email addresses, user names, email passwords etc. 27
  • 28. HOW TO DETECT AND PREVENT??  Make entries through the virtual keyboard.  install an antivirus product and keep its database up to date.  Use anti-spyware software's. 28
  • 30. •Session Hijacking (a.k.a. Session Side jacking) is a form of Man In The Middle (MITM) attack. • In which a malicious attacker has access to the transport layer and can eavesdrop on communications. •When communications are not protected they can steal the unique session ID and imitate the victim on the target site. •This grants the attacker access to your account and data. SESSION HIJACKING 30
  • 32. Steps in Session Hijacking 1. Place yourself between the victim and the target . 2. Monitor the flow of packets 3. Predict the sequence number 4. Kill the connection to the victim’s machine 5. Take over the session 6. Start injecting packets to the target server 32 Prevention of session hijacking 1.Encription and connectivity. 2.Use anti-virus software.
  • 34. Phone phishing  Mobile Phishing is a social engineering technique where the attack is invited via mobile texting rather than email.  Using Fake Calls and will say to dial something.  Using fake SMS. 34
  • 35. Examples of phone phishing 35
  • 36. So be careful when you use Mobile banking and all..! 36
  • 37. Email Spoofing  Email Trap By Using Fake Email Address.  This is the trick Used by spammers. 37
  • 38. Defensive tips against email spoofing  Firstly check the salutation  Take care of grammar mistakes  Must check the links in email  Claiming that an email has come from reliable source  Forward spoofed emails to FTC (Federal Trade Commission) 38
  • 40. 1.Never respond to emails that request personal financial information 40
  • 41. 2.Visit bank’s websites by typing the URL into the address bar 41
  • 42. 3.Keep a regular check on your Accounts and Credit cards. 42
  • 43. 4.Be cautious with emails and personal data . 43 5.Keep your computer secure
  • 45. 8. Use Firewall. 9. Check the website you are visiting is secure. 10. Always report suspicious activity 45
  • 46. 11. GET EDUCATED ABOUT PHISHING PREVENTION ATTACK “It is better to be safer now, than feel sorry later” 46
  • 47. 47