SlideShare a Scribd company logo
1 of 16
PHISHING
Presented By:- Saurabh Kant
Sahu
CONTE
NT
• Introduction
• Examples of Phishing attacks
• Common Phishing Techniques
• Causes ofPhishing
• Effects ofPhishing
• Protection against Phishing
• Conclusion
• Reference
INTRODUCTION
▰ A phishing attack is a methodof tricking
users intounknowinglyprovidingpersonal
and financial informationorsending funds
toattackers.
▰ Themost common formis touseemailto
providea linktowhatappears tobe a
legitimatesite butis actuallya malicious
site controlledbytheattacker
.
3
“The fraudulent practice of
sending
4
emails purporting to be from
reputable
companies in order to induce
individuals to reveal personal
information, such as passwords
and credit card numbers.
As per Oxford dictionary
“Phishing” is:
EXAMPLES OFPHISHING ATTACKS
▰ RBI(Reserve Bank of India) phishing
scam
▻Users received an email, disguised
as originating from the RBI, which
promised them a prize money of
10Lakhs within 48
hours.
▰ Google under phishing attacks
▻Users received a legal notice which
wanted them to refurbish their personal
information with a warning that users
who did not update their details within
30 days would lose their account 5
COMMON PHISHINGTECHNIQUES
▰ Deceptivephishing
▻Emailmessages claiming tocome from
recognized sources ask youtoverifyyour
account,re-enterinformationormake a
payment.
▰ Malware-basedphishing
▻Malwarecan bepresentas an email
attachmentora downloadable filefroma
website fora particularissue.
6
COMMON PHISHING TECHNIQUES(Contd..)
▰ DNS based phishing(“Pharming”)
▻Fraudsters hijack a website’s domain
name and use itto direct users to an
impostersite.
▰ Man-in-the-middlephishing
▻Hacker willbeinbetweentheuser andthe
website.Wheneveruser enterstheir
informationhackers willtakethe
informationwithoutcausing interruption
totheusers.
7
COMMON PHISHING TECHNIQUES(Contd..)
information. 8
▰ Search Enginephishing
▻Phishers willcreatewebpages forfake
products, getthepages indexedbysearch
engines,and waitforcustomers toenter
theirconfidential information.
▰ Content-injectionphishing
▻Hackers willreplacetheoriginal content
withthefakecontentinthewebsitewhich
misdirects theuser togive theirsensitive
CAUSES OFPHISHING
▰ Unawareness amongpublic
▻Therehasbeenlack of awareness regardingthephishing attacks among the
common masses.
▰ Unawareness ofpolicy
▻Thefraudsters oftencount on victim’s unawareness of Bank/financial
institutionpolicies and procedures forcontacting customers, particularlyfor
issues relatingtoaccount maintenanceand fraudinvestigation.
▰ Technicalsophistication
▻URLobfuscation is used byphisherstomakephishing emailsandwebsites
om
appear morelegitimate.e.g. PayPals.com instead of
PayPal.c
9
EFFECTS OFPHISHING
Phishing is a seriouscrimeinthecyber world.Due toPhishing, theremaybe:
▰ Financialloss
▰ Dataloss
▰ Blacklisting ofinstitutions
▰ Introduction of malwareandviruses intoa PC oracomputersystem
▰ Illegal use of user’sdetails
▰ Misuse of yoursocial securitynumberetc
▰Thephisher can also takea user’s account details and open a newaccount on
thenameof theuser forfinancialgain.
10
PROTECTIONAGAINST PHISHING
▰ Two-factorauthentication
▻In this process youlogin witha
password anda secret codereceived
on yourmobile.
▰ HTTPS Protocol
▻HTTPS is a moresecure protocol
thanHTTP
. These websites are
equipped withSSL (secure socket
layer)thatcreates a securechannel
forinformationtransition. 11
PROTECTIONAGAINST PHISHING(Contd..)
▰ Websitereliability
▻Beforeenteringlogin details users
should check thepadlockappeared
on thetoporbottomof webpage.
▰ Hyperlinkinmails
▻Neverclick hyperlinkinmailsfrom
unknown orunverifiedsources.
12
PROTECTIONAGAINST PHISHING(Contd..)
▰ Anti-phishingtoolbar
▻These toolbars runquickchecks
on thesites thatyou arevisiting
and compare themtolists of
knownphishing sites.
▰ Firewalls
▻Firewalls check wherethetraffic
is coming from,whetheritis an
acceptable domainnameor
Internetprotocol. 13
CONCLUSION
Phishing will never be completely eradicated.
However
, a combinationof good organization and
practice, proper application
technologies, and improvements
of current
in security
technology has the potential to drastically reduce
the prevalence of phishing and the losses suffered
from it. User education remains the strongest and
at the same time, the weakest link to phishing
countermeasures.
14
REFERENCES
▰ Paper titled“AReviewon Phishing Attacks and Various AntiPhishing
Techniques”(InternationalJournal of ComputerApplications)
▰ Paper titled“Phishing Attacks and Defenses”(International Journal ofSecurity
and Its Applications Vol.10)
▰ https://en.wikipedia.org/wiki/Phishing
▰ https://www.tripwire.com/state-of-security/security-awareness
15
ThankYou

More Related Content

Similar to phishing attack - man in the middle.pptx

FHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking FraudFHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking Fraudtomciolkosz
 
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!tomciolkosz
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldAvishek Datta
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingSachin Saini
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)aleeya91
 
Identity theft pp presentation
Identity theft pp presentationIdentity theft pp presentation
Identity theft pp presentationYusuf Qadir
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threatsourav newatia
 
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2Conf
 
Phishing website method
Phishing website methodPhishing website method
Phishing website methodarelyf_7
 
Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharksNalneesh Gaur
 
Unveiling the Threat How to Recognize and Report Crypto Scams
Unveiling the Threat  How to Recognize and Report Crypto ScamsUnveiling the Threat  How to Recognize and Report Crypto Scams
Unveiling the Threat How to Recognize and Report Crypto ScamsMike Bike
 
Unit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesUnit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesArnav Chowdhury
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15Naval OPSEC
 
Cyber Security Motivation
Cyber Security MotivationCyber Security Motivation
Cyber Security MotivationSuman Thapaliya
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 

Similar to phishing attack - man in the middle.pptx (20)

FHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking FraudFHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking Fraud
 
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark World
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
 
Identity theft pp presentation
Identity theft pp presentationIdentity theft pp presentation
Identity theft pp presentation
 
Phishing
PhishingPhishing
Phishing
 
Bank frauds
Bank fraudsBank frauds
Bank frauds
 
Phishing file pp
Phishing file ppPhishing file pp
Phishing file pp
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threat
 
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
 
Phishing website method
Phishing website methodPhishing website method
Phishing website method
 
Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharks
 
Cyber.ppt
Cyber.pptCyber.ppt
Cyber.ppt
 
Unveiling the Threat How to Recognize and Report Crypto Scams
Unveiling the Threat  How to Recognize and Report Crypto ScamsUnveiling the Threat  How to Recognize and Report Crypto Scams
Unveiling the Threat How to Recognize and Report Crypto Scams
 
Unit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesUnit iii: Common Hacking Techniques
Unit iii: Common Hacking Techniques
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15
 
Infographic - What is Vishing?
Infographic - What is Vishing?Infographic - What is Vishing?
Infographic - What is Vishing?
 
Cyber Security Motivation
Cyber Security MotivationCyber Security Motivation
Cyber Security Motivation
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 

Recently uploaded

VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our EscortsCall Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escortsindian call girls near you
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663Call Girls Mumbai
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdfkeithzhangding
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 

Recently uploaded (20)

VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our EscortsCall Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Vip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 

phishing attack - man in the middle.pptx

  • 2. CONTE NT • Introduction • Examples of Phishing attacks • Common Phishing Techniques • Causes ofPhishing • Effects ofPhishing • Protection against Phishing • Conclusion • Reference
  • 3. INTRODUCTION ▰ A phishing attack is a methodof tricking users intounknowinglyprovidingpersonal and financial informationorsending funds toattackers. ▰ Themost common formis touseemailto providea linktowhatappears tobe a legitimatesite butis actuallya malicious site controlledbytheattacker . 3
  • 4. “The fraudulent practice of sending 4 emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers. As per Oxford dictionary “Phishing” is:
  • 5. EXAMPLES OFPHISHING ATTACKS ▰ RBI(Reserve Bank of India) phishing scam ▻Users received an email, disguised as originating from the RBI, which promised them a prize money of 10Lakhs within 48 hours. ▰ Google under phishing attacks ▻Users received a legal notice which wanted them to refurbish their personal information with a warning that users who did not update their details within 30 days would lose their account 5
  • 6. COMMON PHISHINGTECHNIQUES ▰ Deceptivephishing ▻Emailmessages claiming tocome from recognized sources ask youtoverifyyour account,re-enterinformationormake a payment. ▰ Malware-basedphishing ▻Malwarecan bepresentas an email attachmentora downloadable filefroma website fora particularissue. 6
  • 7. COMMON PHISHING TECHNIQUES(Contd..) ▰ DNS based phishing(“Pharming”) ▻Fraudsters hijack a website’s domain name and use itto direct users to an impostersite. ▰ Man-in-the-middlephishing ▻Hacker willbeinbetweentheuser andthe website.Wheneveruser enterstheir informationhackers willtakethe informationwithoutcausing interruption totheusers. 7
  • 8. COMMON PHISHING TECHNIQUES(Contd..) information. 8 ▰ Search Enginephishing ▻Phishers willcreatewebpages forfake products, getthepages indexedbysearch engines,and waitforcustomers toenter theirconfidential information. ▰ Content-injectionphishing ▻Hackers willreplacetheoriginal content withthefakecontentinthewebsitewhich misdirects theuser togive theirsensitive
  • 9. CAUSES OFPHISHING ▰ Unawareness amongpublic ▻Therehasbeenlack of awareness regardingthephishing attacks among the common masses. ▰ Unawareness ofpolicy ▻Thefraudsters oftencount on victim’s unawareness of Bank/financial institutionpolicies and procedures forcontacting customers, particularlyfor issues relatingtoaccount maintenanceand fraudinvestigation. ▰ Technicalsophistication ▻URLobfuscation is used byphisherstomakephishing emailsandwebsites om appear morelegitimate.e.g. PayPals.com instead of PayPal.c 9
  • 10. EFFECTS OFPHISHING Phishing is a seriouscrimeinthecyber world.Due toPhishing, theremaybe: ▰ Financialloss ▰ Dataloss ▰ Blacklisting ofinstitutions ▰ Introduction of malwareandviruses intoa PC oracomputersystem ▰ Illegal use of user’sdetails ▰ Misuse of yoursocial securitynumberetc ▰Thephisher can also takea user’s account details and open a newaccount on thenameof theuser forfinancialgain. 10
  • 11. PROTECTIONAGAINST PHISHING ▰ Two-factorauthentication ▻In this process youlogin witha password anda secret codereceived on yourmobile. ▰ HTTPS Protocol ▻HTTPS is a moresecure protocol thanHTTP . These websites are equipped withSSL (secure socket layer)thatcreates a securechannel forinformationtransition. 11
  • 12. PROTECTIONAGAINST PHISHING(Contd..) ▰ Websitereliability ▻Beforeenteringlogin details users should check thepadlockappeared on thetoporbottomof webpage. ▰ Hyperlinkinmails ▻Neverclick hyperlinkinmailsfrom unknown orunverifiedsources. 12
  • 13. PROTECTIONAGAINST PHISHING(Contd..) ▰ Anti-phishingtoolbar ▻These toolbars runquickchecks on thesites thatyou arevisiting and compare themtolists of knownphishing sites. ▰ Firewalls ▻Firewalls check wherethetraffic is coming from,whetheritis an acceptable domainnameor Internetprotocol. 13
  • 14. CONCLUSION Phishing will never be completely eradicated. However , a combinationof good organization and practice, proper application technologies, and improvements of current in security technology has the potential to drastically reduce the prevalence of phishing and the losses suffered from it. User education remains the strongest and at the same time, the weakest link to phishing countermeasures. 14
  • 15. REFERENCES ▰ Paper titled“AReviewon Phishing Attacks and Various AntiPhishing Techniques”(InternationalJournal of ComputerApplications) ▰ Paper titled“Phishing Attacks and Defenses”(International Journal ofSecurity and Its Applications Vol.10) ▰ https://en.wikipedia.org/wiki/Phishing ▰ https://www.tripwire.com/state-of-security/security-awareness 15