SlideShare a Scribd company logo
PHISHING
WHAT IS PHISHING ??? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
EXAMPLE OF USE
DAMAGE CAUSED BY PHISHING ,[object Object],[object Object],[object Object]
IMPORTANT OF  PHISHING
Anti-phishing  measures have been implemented as features embedded in browsers, as extensions or toolbars for browsers, and as part of website login procedures. The following are some of the main approaches to the problem. Helping users identify legitimate sites   Since PHISHING is based on impersonation, preventing it depends on users having some reliable way to identify the sites they are dealing with.  Alerting users to fraudulent websites  Another popular approach to fighting PHISHING is to maintain a list of known phishing sites and to check websites against the list.  Microsoft's new IE7 browser ,  Mozilla   Firefox  2.0, and  Opera  all contain this type of anti-PHISING measure. Firefox 2 uses  Google  anti-phishing software. Opera 9.1 uses live blacklists from  PhishTank  and  GeoTrust , as well as live whitelists from  GeoTrust . Some implementations of this approach send the visited URLs to a central service to be checked, which has raised concerns about compromising the user's privacy. According to a report by Mozilla in late 2006, Firefox 2 was found to be more effective than Internet Explorer 7 at detecting fraudulent sites in a study by an independent software testing company.  Eliminating phishing mail   Spam filters  can also help by reducing the number of phishing emails that users receive.
STEP TO AVOID  PHISHING
Users can take steps to avoid PHISHING attempts by slightly modifying their browsing habits. Users who are contacted about an account needing to be "verified" (or any other topic used by PHISHERS) can contact the company that is the subject of the email to check that the email is legitimate, or can type in a trusted web address for the company's website into the address bar of their browser to bypass the link in the suspected PHISHING message. Nearly all legitimate email messages from companies to their customers will contain an item of information that is not readily available to PHISHERS. Some companies, like PAYPAL, always address their customers by their username in emails, so if an email addresses a user in a generic fashion (" Dear PAYPAL customer ") it is likely to be an attempt at PHISHING. Emails from banks and credit card companies will often include partial account numbers. However, recent research  has shown that typical users do not distinguish between the first few digits and  This is a significant problem since the first few digits often are the same for all clients of one financial institution. One should always be suspicious if the message does not contain specific personal information. PHISHING attempts in early 2006, however, used such highly personalized information, making it unsafe to rely on personal information alone as a sign that a message is legitimate. Furthermore, another recent study concluded in part that the presence of this information does not significantly affect the success rate of PHISHING attacks, suggesting that most users do not pay attention to such details anyway.  the last few digits of an account number
SOURCE OF REFERENCE ,[object Object]

More Related Content

What's hot

Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharks
Nalneesh Gaur
 
Phishing
PhishingPhishing
Phishing
PhishingPhishing
Phishing
oitaoming
 
Seminaar Report of Phishing VIII Sem
Seminaar Report of Phishing VIII SemSeminaar Report of Phishing VIII Sem
Seminaar Report of Phishing VIII Sem
Narendra Singh
 
Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniques
Sushil Kumar
 
Intro phishing
Intro phishingIntro phishing
Intro phishing
Sayali Dayama
 
Phishing attack
Phishing attackPhishing attack
Phishing attack
Raghav Chhabra
 
Phishing
PhishingPhishing
Phishing
Syeda Javeria
 
Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Prevention
sonalikharade3
 
Phishing
PhishingPhishing
Phishing
Archit Mohanty
 
Phishing
PhishingPhishing
Phishing
shivli0769
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark World
Avishek Datta
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N Gtemi
 
Strategies to handle Phishing attacks
Strategies to handle Phishing attacksStrategies to handle Phishing attacks
Strategies to handle Phishing attacks
Sreejith.D. Menon
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
Sachin Saini
 
PHISHING attack
PHISHING attack PHISHING attack
PHISHING attack
Shubh Thakkar
 
Phishing
PhishingPhishing
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks pptAryan Ragu
 
Phishing
PhishingPhishing
Phishing
Arpit Patel
 
Phishing
PhishingPhishing

What's hot (20)

Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharks
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
Seminaar Report of Phishing VIII Sem
Seminaar Report of Phishing VIII SemSeminaar Report of Phishing VIII Sem
Seminaar Report of Phishing VIII Sem
 
Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniques
 
Intro phishing
Intro phishingIntro phishing
Intro phishing
 
Phishing attack
Phishing attackPhishing attack
Phishing attack
 
Phishing
PhishingPhishing
Phishing
 
Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Prevention
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark World
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Strategies to handle Phishing attacks
Strategies to handle Phishing attacksStrategies to handle Phishing attacks
Strategies to handle Phishing attacks
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
PHISHING attack
PHISHING attack PHISHING attack
PHISHING attack
 
Phishing
PhishingPhishing
Phishing
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 

Viewers also liked

KB More than a library
KB More than a libraryKB More than a library
KB More than a library
ibo010
 
La seu de manresa
La seu de manresaLa seu de manresa
La seu de manresanreguant
 
Real Miami Beach Keeping Current 2007 06
Real Miami Beach Keeping Current 2007 06Real Miami Beach Keeping Current 2007 06
Real Miami Beach Keeping Current 2007 06
realmiamibeach.com
 
Consejo infancia juventud_ainsa
Consejo infancia juventud_ainsaConsejo infancia juventud_ainsa
Consejo infancia juventud_ainsa
sobrarbenses
 
Biovale Biodiesel Business As An Agent Of Social Inclusion
Biovale   Biodiesel Business As An Agent Of Social InclusionBiovale   Biodiesel Business As An Agent Of Social Inclusion
Biovale Biodiesel Business As An Agent Of Social InclusionTEIAS TEIA DE EXECUTIVOS
 
Els Gegants De Manresa
Els Gegants De ManresaEls Gegants De Manresa
Els Gegants De Manresa
nreguant
 
Fem un pastis de poma
Fem un pastis de pomaFem un pastis de poma
Fem un pastis de poma
nreguant
 
Oostende bereidt zich voor op digitale revolutie
Oostende bereidt zich voor op digitale revolutieOostende bereidt zich voor op digitale revolutie
Oostende bereidt zich voor op digitale revolutieNuntra BVBA
 
Món Sant Benet. Melanie Fernández
Món Sant Benet. Melanie FernándezMón Sant Benet. Melanie Fernández
Món Sant Benet. Melanie Fernándeznreguant
 
Visita Als Geganters De Manresa
Visita Als Geganters De ManresaVisita Als Geganters De Manresa
Visita Als Geganters De Manresanreguant
 
Pastis de galetes de xocolata
Pastis de galetes de xocolataPastis de galetes de xocolata
Pastis de galetes de xocolatanreguant
 
Credit de sintesi. jose,javi i albert
Credit de sintesi. jose,javi i albertCredit de sintesi. jose,javi i albert
Credit de sintesi. jose,javi i albertnreguant
 
Trabajos De Animales
Trabajos De AnimalesTrabajos De Animales
Trabajos De Animalesrascallu
 

Viewers also liked (20)

Navatas2007
Navatas2007Navatas2007
Navatas2007
 
KB More than a library
KB More than a libraryKB More than a library
KB More than a library
 
La seu de manresa
La seu de manresaLa seu de manresa
La seu de manresa
 
Real Miami Beach Keeping Current 2007 06
Real Miami Beach Keeping Current 2007 06Real Miami Beach Keeping Current 2007 06
Real Miami Beach Keeping Current 2007 06
 
Consejo infancia juventud_ainsa
Consejo infancia juventud_ainsaConsejo infancia juventud_ainsa
Consejo infancia juventud_ainsa
 
Biovale Biodiesel Business As An Agent Of Social Inclusion
Biovale   Biodiesel Business As An Agent Of Social InclusionBiovale   Biodiesel Business As An Agent Of Social Inclusion
Biovale Biodiesel Business As An Agent Of Social Inclusion
 
Els Gegants De Manresa
Els Gegants De ManresaEls Gegants De Manresa
Els Gegants De Manresa
 
Mba New Leaders New Perspectives
Mba  New Leaders New PerspectivesMba  New Leaders New Perspectives
Mba New Leaders New Perspectives
 
Fem un pastis de poma
Fem un pastis de pomaFem un pastis de poma
Fem un pastis de poma
 
Oostende bereidt zich voor op digitale revolutie
Oostende bereidt zich voor op digitale revolutieOostende bereidt zich voor op digitale revolutie
Oostende bereidt zich voor op digitale revolutie
 
Para O Ano
Para O AnoPara O Ano
Para O Ano
 
Món Sant Benet. Melanie Fernández
Món Sant Benet. Melanie FernándezMón Sant Benet. Melanie Fernández
Món Sant Benet. Melanie Fernández
 
Chasing Progress
Chasing ProgressChasing Progress
Chasing Progress
 
Visita Als Geganters De Manresa
Visita Als Geganters De ManresaVisita Als Geganters De Manresa
Visita Als Geganters De Manresa
 
Pastis de galetes de xocolata
Pastis de galetes de xocolataPastis de galetes de xocolata
Pastis de galetes de xocolata
 
Credit de sintesi. jose,javi i albert
Credit de sintesi. jose,javi i albertCredit de sintesi. jose,javi i albert
Credit de sintesi. jose,javi i albert
 
Trabajos De Animales
Trabajos De AnimalesTrabajos De Animales
Trabajos De Animales
 
Inernational Aspen
Inernational AspenInernational Aspen
Inernational Aspen
 
Living Carbon Neutral Eco Justice
Living Carbon Neutral   Eco JusticeLiving Carbon Neutral   Eco Justice
Living Carbon Neutral Eco Justice
 
Net Impact Chapter Updated
Net Impact Chapter  UpdatedNet Impact Chapter  Updated
Net Impact Chapter Updated
 

Similar to P H I S H I N G

Phishing website method
Phishing website methodPhishing website method
Phishing website method
arelyf_7
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentationmbachnak
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
wlynn1
 
Databreach forecast
Databreach forecastDatabreach forecast
Databreach forecast
Suresh Kesavan
 
IT Sample Paper
IT Sample PaperIT Sample Paper
IT Sample Paper
Write My Essay
 
Internet Threats and Risk Mitigation
Internet Threats and Risk MitigationInternet Threats and Risk Mitigation
Internet Threats and Risk Mitigation
BrandProtect
 
IRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing SitesIRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing Sites
IRJET Journal
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
Vasundhara Singh Gautam
 
Detecting phishing websites using associative classification (2)
Detecting phishing websites using associative classification (2)Detecting phishing websites using associative classification (2)
Detecting phishing websites using associative classification (2)
Alexander Decker
 
IRJET- A Survey on Automatic Phishing Email Detection using Natural Langu...
IRJET-  	  A Survey on Automatic Phishing Email Detection using Natural Langu...IRJET-  	  A Survey on Automatic Phishing Email Detection using Natural Langu...
IRJET- A Survey on Automatic Phishing Email Detection using Natural Langu...
IRJET Journal
 
Cybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxCybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptx
AbdullaFatiya3
 
Phis
PhisPhis
Exploring And Investigating New Dimensions In Phishing
Exploring And Investigating New Dimensions In PhishingExploring And Investigating New Dimensions In Phishing
Exploring And Investigating New Dimensions In Phishing
Muhammad Haroon CISM PCI QSA ISMS LA CPTS CEH
 
Phishing
PhishingPhishing
Phishing
Ajit Yadav
 
SayanMitra.pdf
SayanMitra.pdfSayanMitra.pdf
SayanMitra.pdf
TanayMalhotra
 
December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10
seadeloitte
 
Driving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your EnemyDriving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your Enemy
First Atlantic Commerce
 
Managing Social Media in the Workplace
Managing Social Media in the WorkplaceManaging Social Media in the Workplace
Managing Social Media in the Workplace
Eric Swenson
 
Managing Social Media in the Workplace
Managing Social Media in the WorkplaceManaging Social Media in the Workplace
Managing Social Media in the Workplace
Eric Swenson
 

Similar to P H I S H I N G (20)

Phishing website method
Phishing website methodPhishing website method
Phishing website method
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
 
Databreach forecast
Databreach forecastDatabreach forecast
Databreach forecast
 
IT Sample Paper
IT Sample PaperIT Sample Paper
IT Sample Paper
 
Internet Threats and Risk Mitigation
Internet Threats and Risk MitigationInternet Threats and Risk Mitigation
Internet Threats and Risk Mitigation
 
IRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing SitesIRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing Sites
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
 
Detecting phishing websites using associative classification (2)
Detecting phishing websites using associative classification (2)Detecting phishing websites using associative classification (2)
Detecting phishing websites using associative classification (2)
 
IRJET- A Survey on Automatic Phishing Email Detection using Natural Langu...
IRJET-  	  A Survey on Automatic Phishing Email Detection using Natural Langu...IRJET-  	  A Survey on Automatic Phishing Email Detection using Natural Langu...
IRJET- A Survey on Automatic Phishing Email Detection using Natural Langu...
 
Cybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxCybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptx
 
Phis
PhisPhis
Phis
 
Exploring And Investigating New Dimensions In Phishing
Exploring And Investigating New Dimensions In PhishingExploring And Investigating New Dimensions In Phishing
Exploring And Investigating New Dimensions In Phishing
 
Phishing
PhishingPhishing
Phishing
 
SayanMitra.pdf
SayanMitra.pdfSayanMitra.pdf
SayanMitra.pdf
 
internet security
internet securityinternet security
internet security
 
December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10
 
Driving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your EnemyDriving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your Enemy
 
Managing Social Media in the Workplace
Managing Social Media in the WorkplaceManaging Social Media in the Workplace
Managing Social Media in the Workplace
 
Managing Social Media in the Workplace
Managing Social Media in the WorkplaceManaging Social Media in the Workplace
Managing Social Media in the Workplace
 

Recently uploaded

how to sell pi coins in South Korea profitably.
how to sell pi coins in South Korea profitably.how to sell pi coins in South Korea profitably.
how to sell pi coins in South Korea profitably.
DOT TECH
 
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdfUS Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
pchutichetpong
 
how can I sell pi coins after successfully completing KYC
how can I sell pi coins after successfully completing KYChow can I sell pi coins after successfully completing KYC
how can I sell pi coins after successfully completing KYC
DOT TECH
 
when will pi network coin be available on crypto exchange.
when will pi network coin be available on crypto exchange.when will pi network coin be available on crypto exchange.
when will pi network coin be available on crypto exchange.
DOT TECH
 
Transkredit Finance Company Products Presentation (1).pptx
Transkredit Finance Company Products Presentation (1).pptxTranskredit Finance Company Products Presentation (1).pptx
Transkredit Finance Company Products Presentation (1).pptx
jenomjaneh
 
how to sell pi coins effectively (from 50 - 100k pi)
how to sell pi coins effectively (from 50 - 100k  pi)how to sell pi coins effectively (from 50 - 100k  pi)
how to sell pi coins effectively (from 50 - 100k pi)
DOT TECH
 
how can i use my minded pi coins I need some funds.
how can i use my minded pi coins I need some funds.how can i use my minded pi coins I need some funds.
how can i use my minded pi coins I need some funds.
DOT TECH
 
Instant Issue Debit Cards
Instant Issue Debit CardsInstant Issue Debit Cards
Instant Issue Debit Cards
egoetzinger
 
Which Crypto to Buy Today for Short-Term in May-June 2024.pdf
Which Crypto to Buy Today for Short-Term in May-June 2024.pdfWhich Crypto to Buy Today for Short-Term in May-June 2024.pdf
Which Crypto to Buy Today for Short-Term in May-June 2024.pdf
Kezex (KZX)
 
Webinar Exploring DORA for Fintechs - Simont Braun
Webinar Exploring DORA for Fintechs - Simont BraunWebinar Exploring DORA for Fintechs - Simont Braun
Webinar Exploring DORA for Fintechs - Simont Braun
FinTech Belgium
 
can I really make money with pi network.
can I really make money with pi network.can I really make money with pi network.
can I really make money with pi network.
DOT TECH
 
what is the future of Pi Network currency.
what is the future of Pi Network currency.what is the future of Pi Network currency.
what is the future of Pi Network currency.
DOT TECH
 
SWAIAP Fraud Risk Mitigation Prof Oyedokun.pptx
SWAIAP Fraud Risk Mitigation   Prof Oyedokun.pptxSWAIAP Fraud Risk Mitigation   Prof Oyedokun.pptx
SWAIAP Fraud Risk Mitigation Prof Oyedokun.pptx
Godwin Emmanuel Oyedokun MBA MSc ACA ACIB FCTI FCFIP CFE
 
what is the best method to sell pi coins in 2024
what is the best method to sell pi coins in 2024what is the best method to sell pi coins in 2024
what is the best method to sell pi coins in 2024
DOT TECH
 
Pensions and housing - Pensions PlayPen - 4 June 2024 v3 (1).pdf
Pensions and housing - Pensions PlayPen - 4 June 2024 v3 (1).pdfPensions and housing - Pensions PlayPen - 4 June 2024 v3 (1).pdf
Pensions and housing - Pensions PlayPen - 4 June 2024 v3 (1).pdf
Henry Tapper
 
This assessment plan proposal is to outline a structured approach to evaluati...
This assessment plan proposal is to outline a structured approach to evaluati...This assessment plan proposal is to outline a structured approach to evaluati...
This assessment plan proposal is to outline a structured approach to evaluati...
lamluanvan.net Viết thuê luận văn
 
how to sell pi coins at high rate quickly.
how to sell pi coins at high rate quickly.how to sell pi coins at high rate quickly.
how to sell pi coins at high rate quickly.
DOT TECH
 
PF-Wagner's Theory of Public Expenditure.pptx
PF-Wagner's Theory of Public Expenditure.pptxPF-Wagner's Theory of Public Expenditure.pptx
PF-Wagner's Theory of Public Expenditure.pptx
GunjanSharma28848
 
Scope Of Macroeconomics introduction and basic theories
Scope Of Macroeconomics introduction and basic theoriesScope Of Macroeconomics introduction and basic theories
Scope Of Macroeconomics introduction and basic theories
nomankalyar153
 
USDA Loans in California: A Comprehensive Overview.pptx
USDA Loans in California: A Comprehensive Overview.pptxUSDA Loans in California: A Comprehensive Overview.pptx
USDA Loans in California: A Comprehensive Overview.pptx
marketing367770
 

Recently uploaded (20)

how to sell pi coins in South Korea profitably.
how to sell pi coins in South Korea profitably.how to sell pi coins in South Korea profitably.
how to sell pi coins in South Korea profitably.
 
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdfUS Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
 
how can I sell pi coins after successfully completing KYC
how can I sell pi coins after successfully completing KYChow can I sell pi coins after successfully completing KYC
how can I sell pi coins after successfully completing KYC
 
when will pi network coin be available on crypto exchange.
when will pi network coin be available on crypto exchange.when will pi network coin be available on crypto exchange.
when will pi network coin be available on crypto exchange.
 
Transkredit Finance Company Products Presentation (1).pptx
Transkredit Finance Company Products Presentation (1).pptxTranskredit Finance Company Products Presentation (1).pptx
Transkredit Finance Company Products Presentation (1).pptx
 
how to sell pi coins effectively (from 50 - 100k pi)
how to sell pi coins effectively (from 50 - 100k  pi)how to sell pi coins effectively (from 50 - 100k  pi)
how to sell pi coins effectively (from 50 - 100k pi)
 
how can i use my minded pi coins I need some funds.
how can i use my minded pi coins I need some funds.how can i use my minded pi coins I need some funds.
how can i use my minded pi coins I need some funds.
 
Instant Issue Debit Cards
Instant Issue Debit CardsInstant Issue Debit Cards
Instant Issue Debit Cards
 
Which Crypto to Buy Today for Short-Term in May-June 2024.pdf
Which Crypto to Buy Today for Short-Term in May-June 2024.pdfWhich Crypto to Buy Today for Short-Term in May-June 2024.pdf
Which Crypto to Buy Today for Short-Term in May-June 2024.pdf
 
Webinar Exploring DORA for Fintechs - Simont Braun
Webinar Exploring DORA for Fintechs - Simont BraunWebinar Exploring DORA for Fintechs - Simont Braun
Webinar Exploring DORA for Fintechs - Simont Braun
 
can I really make money with pi network.
can I really make money with pi network.can I really make money with pi network.
can I really make money with pi network.
 
what is the future of Pi Network currency.
what is the future of Pi Network currency.what is the future of Pi Network currency.
what is the future of Pi Network currency.
 
SWAIAP Fraud Risk Mitigation Prof Oyedokun.pptx
SWAIAP Fraud Risk Mitigation   Prof Oyedokun.pptxSWAIAP Fraud Risk Mitigation   Prof Oyedokun.pptx
SWAIAP Fraud Risk Mitigation Prof Oyedokun.pptx
 
what is the best method to sell pi coins in 2024
what is the best method to sell pi coins in 2024what is the best method to sell pi coins in 2024
what is the best method to sell pi coins in 2024
 
Pensions and housing - Pensions PlayPen - 4 June 2024 v3 (1).pdf
Pensions and housing - Pensions PlayPen - 4 June 2024 v3 (1).pdfPensions and housing - Pensions PlayPen - 4 June 2024 v3 (1).pdf
Pensions and housing - Pensions PlayPen - 4 June 2024 v3 (1).pdf
 
This assessment plan proposal is to outline a structured approach to evaluati...
This assessment plan proposal is to outline a structured approach to evaluati...This assessment plan proposal is to outline a structured approach to evaluati...
This assessment plan proposal is to outline a structured approach to evaluati...
 
how to sell pi coins at high rate quickly.
how to sell pi coins at high rate quickly.how to sell pi coins at high rate quickly.
how to sell pi coins at high rate quickly.
 
PF-Wagner's Theory of Public Expenditure.pptx
PF-Wagner's Theory of Public Expenditure.pptxPF-Wagner's Theory of Public Expenditure.pptx
PF-Wagner's Theory of Public Expenditure.pptx
 
Scope Of Macroeconomics introduction and basic theories
Scope Of Macroeconomics introduction and basic theoriesScope Of Macroeconomics introduction and basic theories
Scope Of Macroeconomics introduction and basic theories
 
USDA Loans in California: A Comprehensive Overview.pptx
USDA Loans in California: A Comprehensive Overview.pptxUSDA Loans in California: A Comprehensive Overview.pptx
USDA Loans in California: A Comprehensive Overview.pptx
 

P H I S H I N G

  • 2.
  • 4.
  • 5. IMPORTANT OF PHISHING
  • 6. Anti-phishing measures have been implemented as features embedded in browsers, as extensions or toolbars for browsers, and as part of website login procedures. The following are some of the main approaches to the problem. Helping users identify legitimate sites Since PHISHING is based on impersonation, preventing it depends on users having some reliable way to identify the sites they are dealing with. Alerting users to fraudulent websites Another popular approach to fighting PHISHING is to maintain a list of known phishing sites and to check websites against the list. Microsoft's new IE7 browser , Mozilla Firefox 2.0, and Opera all contain this type of anti-PHISING measure. Firefox 2 uses Google anti-phishing software. Opera 9.1 uses live blacklists from PhishTank and GeoTrust , as well as live whitelists from GeoTrust . Some implementations of this approach send the visited URLs to a central service to be checked, which has raised concerns about compromising the user's privacy. According to a report by Mozilla in late 2006, Firefox 2 was found to be more effective than Internet Explorer 7 at detecting fraudulent sites in a study by an independent software testing company. Eliminating phishing mail Spam filters can also help by reducing the number of phishing emails that users receive.
  • 7. STEP TO AVOID PHISHING
  • 8. Users can take steps to avoid PHISHING attempts by slightly modifying their browsing habits. Users who are contacted about an account needing to be "verified" (or any other topic used by PHISHERS) can contact the company that is the subject of the email to check that the email is legitimate, or can type in a trusted web address for the company's website into the address bar of their browser to bypass the link in the suspected PHISHING message. Nearly all legitimate email messages from companies to their customers will contain an item of information that is not readily available to PHISHERS. Some companies, like PAYPAL, always address their customers by their username in emails, so if an email addresses a user in a generic fashion (" Dear PAYPAL customer ") it is likely to be an attempt at PHISHING. Emails from banks and credit card companies will often include partial account numbers. However, recent research has shown that typical users do not distinguish between the first few digits and This is a significant problem since the first few digits often are the same for all clients of one financial institution. One should always be suspicious if the message does not contain specific personal information. PHISHING attempts in early 2006, however, used such highly personalized information, making it unsafe to rely on personal information alone as a sign that a message is legitimate. Furthermore, another recent study concluded in part that the presence of this information does not significantly affect the success rate of PHISHING attacks, suggesting that most users do not pay attention to such details anyway. the last few digits of an account number
  • 9.