GROUP NO : 10
GROUP
PRESENTATION
OF
TOPIC
PHISHING AND HACKING
GROUP MEMBERS :
1. MEHEDI HASSAN BAPPY – 16221021
2. ISHTIAK U AHMED – 16221031
3. Fardun M RAHMAN - 16221053
PHISHING
What Is Phishing?
Actually originated from the word “FISHING”.
Criminal sets a particular bait as a fraudulency
or fooling.
Get access of accounts and take personal data.
History Of Phishing
Phishing was originated around
January 1996.
The first move was made byWAREZ
community.
In 2001 phishers put eye on online
payment system.
In 2003 they use email worm program
to have sites like EBAY or PAYPAL.
In 2004 they attack on banking sites
and customers with PopupWindows.
Types Of Phishing
Phishing Types
Malware
Host File
Poisoning
DataTheft Key loggers
Session
Hijacking
Phishing Types
Search
Engine
Phishing
Phone
Phishing
DNS based
Phishing
Control
Injection
Phishing
Man InThe
Middle
Phishing
Phishing Types : Malware
¤ Malicious Software combined Mal+Ware =
Malware.
¤ Install without notice of the user.
¤ Difficult to remove and get access with user data
¤ Designed to steal credit card or any password of
your computer.
Phishing Types : Malware
Phishing Types : Malware
Up-to-date web browser
Install antivirus solution and
monitor.
Deploy a web filter to block
malicious websites
Latest security patches and
updates
Phishing Types : Keylogger
Secretly
monitor
and log all
key –
strokes.
Can be a
device
other
than a
software.
Parental
care and
company
care
Track
down user
activity of
keyboard
input.
Phishing Types : Keylogger
Phishing Types : Keylogger
A firewall is a
great defense.
Keep your
software updated.
Change your
password
frequently.
Software like
ZONEALARM
shut down all
inbound and
outbound data.
Install a password
manager.
Phishing Types : Data Theft
Illegal
transfer of
storage
USB drive
Portable
hard drive
Email
Printing
Remote
sharing
Consequence
could be
severe for
both
individual
and
businessman
.
Phishing Types : Data Theft
Phishing Types : Data Theft
Usage of restricted
network in
organization.
Laptop lockdown
and biometric
security measures.
Use of anti-malware
software.
Encryption of
confidential
information or
personal data.
Periodic reviews of
device and system
which can pose high
risk.
A man-in-the-middle attack is a type of cyberattack where a
malicious actor inserts him/herself into a conversation between
two parties, impersonates both parties and gains access to
information that the two parties were trying to send to each
other. A man-in-the-middle attack allows a malicious actor to
intercept, send and receive data meant for someone else, or not
meant to be sent at all, without either outside party knowing
until it is too late. Man-in-the-middle attacks can be
abbreviated in many ways, including MITM, MitM, MiM or MIM.
Phishing Types : Man In The Middle
The positive side of hacking
Social good
Data Security
Brand Innovation
A look in the past
Misunderstanding between
hacker and cracker
First used at MIT in 1960
What hackers do
The majority do it for fun
Quite rare on personal
computer
Usually attacks bank for
money
Professionals target big
company
What are the effects of computer hacking
Privacy breach Loss of data Identity theft Track of actions
Computer hacking is a breach of computer
security .it can expose sensitive user data
and risk user privacy
What are the effects of computer hacking
Privacy breach Loss of data Identity theft Track of actions
Deletion or manipulation of sensitive data
with intent to achieve personal gain is
another effect of computer hacking
What are the effects of computer hacking
Privacy breach Loss of data Identity theft Track of actions
It is a fraud that involves pretention to be
someone else, with intent to gain
unauthorized access
What are the effects of computer hacking
Privacy breach Loss of data Identity theft Track of actions
Key logging software which is capable of
tracking and recording every key stole by
the user
What are the effects of computer hacking
Dos attack Stealing of
information
National security fraud
The DOS attack as it is called refers to
the attempt of making computer
resources unavailable to users
What are the effects of computer hacking
Dos attack Stealing of
information
National security fraud
Computer hacking can lead to theft of critical
business information. Business clients can be
lost
What are the effects of computer hacking
Dos attack Stealing of
information
National security fraud
Hacking of highly sensitive data can
potentially risk the national security and
sake the overall well being of the country
citizens
What are the effects of computer hacking
Dos attack Stealing of
information
National security fraud
Zombie computer are used for
fraudulent activities like spamming and
phishing
How hackers work
Log keystrokes
Infect computers
with virus
Gain backdoor
access
Hack passwords
How hackers work
Zombie
computers
Physically hacking
Virus in flash
drives
Spy on email
How to prevent hacking
Update operating
system and web
browser
Use strong password Purchase anti-virus
software
Install firewall on
computer
How to prevent hacking
Update operating
system and web
browser
Use strong password Purchase anti-virus
software
Install firewall on
computer
How to prevent hacking
Update operating
system and web
browser
Use strong password Purchase anti-virus
software
Install firewall on
computer
How to prevent hacking
Update operating
system and web
browser
Use strong password Purchase anti-virus
software
Install firewall on
computer
Thank You

Phishing and hacking

  • 1.
    GROUP NO :10 GROUP PRESENTATION OF
  • 2.
    TOPIC PHISHING AND HACKING GROUPMEMBERS : 1. MEHEDI HASSAN BAPPY – 16221021 2. ISHTIAK U AHMED – 16221031 3. Fardun M RAHMAN - 16221053
  • 3.
  • 4.
    What Is Phishing? Actuallyoriginated from the word “FISHING”. Criminal sets a particular bait as a fraudulency or fooling. Get access of accounts and take personal data.
  • 5.
    History Of Phishing Phishingwas originated around January 1996. The first move was made byWAREZ community. In 2001 phishers put eye on online payment system. In 2003 they use email worm program to have sites like EBAY or PAYPAL. In 2004 they attack on banking sites and customers with PopupWindows.
  • 6.
  • 7.
  • 8.
  • 9.
    Phishing Types :Malware ¤ Malicious Software combined Mal+Ware = Malware. ¤ Install without notice of the user. ¤ Difficult to remove and get access with user data ¤ Designed to steal credit card or any password of your computer.
  • 10.
  • 11.
    Phishing Types :Malware Up-to-date web browser Install antivirus solution and monitor. Deploy a web filter to block malicious websites Latest security patches and updates
  • 12.
    Phishing Types :Keylogger Secretly monitor and log all key – strokes. Can be a device other than a software. Parental care and company care Track down user activity of keyboard input.
  • 13.
  • 14.
    Phishing Types :Keylogger A firewall is a great defense. Keep your software updated. Change your password frequently. Software like ZONEALARM shut down all inbound and outbound data. Install a password manager.
  • 15.
    Phishing Types :Data Theft Illegal transfer of storage USB drive Portable hard drive Email Printing Remote sharing Consequence could be severe for both individual and businessman .
  • 16.
    Phishing Types :Data Theft
  • 17.
    Phishing Types :Data Theft Usage of restricted network in organization. Laptop lockdown and biometric security measures. Use of anti-malware software. Encryption of confidential information or personal data. Periodic reviews of device and system which can pose high risk.
  • 18.
    A man-in-the-middle attackis a type of cyberattack where a malicious actor inserts him/herself into a conversation between two parties, impersonates both parties and gains access to information that the two parties were trying to send to each other. A man-in-the-middle attack allows a malicious actor to intercept, send and receive data meant for someone else, or not meant to be sent at all, without either outside party knowing until it is too late. Man-in-the-middle attacks can be abbreviated in many ways, including MITM, MitM, MiM or MIM. Phishing Types : Man In The Middle
  • 19.
    The positive sideof hacking Social good Data Security Brand Innovation
  • 20.
    A look inthe past Misunderstanding between hacker and cracker First used at MIT in 1960
  • 21.
    What hackers do Themajority do it for fun Quite rare on personal computer Usually attacks bank for money Professionals target big company
  • 22.
    What are theeffects of computer hacking Privacy breach Loss of data Identity theft Track of actions Computer hacking is a breach of computer security .it can expose sensitive user data and risk user privacy
  • 23.
    What are theeffects of computer hacking Privacy breach Loss of data Identity theft Track of actions Deletion or manipulation of sensitive data with intent to achieve personal gain is another effect of computer hacking
  • 24.
    What are theeffects of computer hacking Privacy breach Loss of data Identity theft Track of actions It is a fraud that involves pretention to be someone else, with intent to gain unauthorized access
  • 25.
    What are theeffects of computer hacking Privacy breach Loss of data Identity theft Track of actions Key logging software which is capable of tracking and recording every key stole by the user
  • 26.
    What are theeffects of computer hacking Dos attack Stealing of information National security fraud The DOS attack as it is called refers to the attempt of making computer resources unavailable to users
  • 27.
    What are theeffects of computer hacking Dos attack Stealing of information National security fraud Computer hacking can lead to theft of critical business information. Business clients can be lost
  • 28.
    What are theeffects of computer hacking Dos attack Stealing of information National security fraud Hacking of highly sensitive data can potentially risk the national security and sake the overall well being of the country citizens
  • 29.
    What are theeffects of computer hacking Dos attack Stealing of information National security fraud Zombie computer are used for fraudulent activities like spamming and phishing
  • 30.
    How hackers work Logkeystrokes Infect computers with virus Gain backdoor access Hack passwords
  • 31.
    How hackers work Zombie computers Physicallyhacking Virus in flash drives Spy on email
  • 32.
    How to preventhacking Update operating system and web browser Use strong password Purchase anti-virus software Install firewall on computer
  • 33.
    How to preventhacking Update operating system and web browser Use strong password Purchase anti-virus software Install firewall on computer
  • 34.
    How to preventhacking Update operating system and web browser Use strong password Purchase anti-virus software Install firewall on computer
  • 35.
    How to preventhacking Update operating system and web browser Use strong password Purchase anti-virus software Install firewall on computer
  • 36.