Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
PHISHING….. Created by: Benson Oo CLICK  HERE  FOR MORE….
<ul><li>What is  Phishing ? </li></ul><ul><li>How they Attack? </li></ul><ul><li>How to Detect? </li></ul><ul><li>Damage c...
What is pHisHing??? <ul><li>Phishing is defined as the fraudulent acquisition of personal information by tricking an indiv...
How They ATTACK….. <ul><li>Most attacks of phishing use some form of technical deception designed to make a link in an ema...
How TO DEteCt….. <ul><li>It is actually very noticeable. You will see misspelled URLs. One way seeing it is discovering @ ...
Damage caused by phishing. <ul><li>The damage caused by phishing ranges from loss of access to email to substantial financ...
Conclusion….. <ul><li>Phishing e–mails are only a small aspect of the overall phishing economy and until now, the only asp...
Source Of Information <ul><li>www.wikipedia.org </li></ul><ul><li>www.antiphishing.org </li></ul><ul><li>www.google.com </...
Upcoming SlideShare
Loading in …5
×
Upcoming SlideShare
Phishing attacks ppt
Next
Download to read offline and view in fullscreen.

9

Share

Download to read offline

P H I S H I N G

Download to read offline

is to fulfill my SPM

Related Books

Free with a 30 day trial from Scribd

See all

P H I S H I N G

  1. 1. PHISHING….. Created by: Benson Oo CLICK HERE FOR MORE….
  2. 2. <ul><li>What is Phishing ? </li></ul><ul><li>How they Attack? </li></ul><ul><li>How to Detect? </li></ul><ul><li>Damage caused by phishing . </li></ul><ul><li>Conclusion. </li></ul><ul><li>Source of Information. </li></ul>CONTENT
  3. 3. What is pHisHing??? <ul><li>Phishing is defined as the fraudulent acquisition of personal information by tricking an individual into believing the attacker is a trustworthy entity this is normally done through emails and an instant message. </li></ul>
  4. 4. How They ATTACK….. <ul><li>Most attacks of phishing use some form of technical deception designed to make a link in an email appear to belong to the spoofed organization. Misspelled URLs or the use of subdomains are common tricks used by phishers, such as this example URL, http://www.maybank.home.com/. One method of spoofing links used web addresses containing the @ symbol, which were used to include a username and password in a web URL </li></ul>
  5. 5. How TO DEteCt….. <ul><li>It is actually very noticeable. You will see misspelled URLs. One way seeing it is discovering @ in the web addresses e.g. http://www.hotmail.com@members.com. Some web browsers such as Mozilla and Internet Explorer has closed this off while Opera gives a warning and an option to get off the website. In another popular method of phishing, an attacker uses a bank or other services website scripts on the victim.These types of attack known as cross-site scripting. </li></ul>
  6. 6. Damage caused by phishing. <ul><li>The damage caused by phishing ranges from loss of access to email to substantial financial loss. This style of identity theft is becoming more popular, because of the ease with which unsuspecting people often divulge personal information to phishers, including credit card numbers , social security numbers, and mothers maiden names. There are also fears that identity thieves can obtain some such information simply by accessing public records. Once they have the information they need and want, the phishers will use that person’s detail to create fake accounts using the victims name, using up a persons credit, or even prevent the victim from accessing to their own accounts </li></ul>
  7. 7. Conclusion….. <ul><li>Phishing e–mails are only a small aspect of the overall phishing economy and until now, the only aspect seen by the most people. The phishing economy is a decentralized and self–organized social network of merchants and consumers governed by laws of supply and demand. This clearer picture of the landscape, the players, and insight into phishing operations will hopefully assist in the fight against online fraud. </li></ul>
  8. 8. Source Of Information <ul><li>www.wikipedia.org </li></ul><ul><li>www.antiphishing.org </li></ul><ul><li>www.google.com </li></ul><ul><li>www.webopedia.com </li></ul><ul><li>www.computerworld.com </li></ul><ul><li>www.yahoo.com </li></ul><ul><li>www.honeynet.org </li></ul>
  • radhadonthabhaktuni

    Sep. 10, 2018
  • MonikaRajput19

    Oct. 13, 2017
  • OlumideAdebo

    Mar. 21, 2017
  • HemaliPatel21

    Mar. 8, 2017
  • vitalch

    Jun. 20, 2016
  • owenchisamba

    Apr. 15, 2016
  • babypaswan

    Apr. 15, 2014
  • nidhisinghjamwal

    Sep. 23, 2013
  • sonusharma31

    Mar. 5, 2013

is to fulfill my SPM

Views

Total views

31,790

On Slideshare

0

From embeds

0

Number of embeds

55

Actions

Downloads

1,110

Shares

0

Comments

0

Likes

9

×