SlideShare a Scribd company logo
01
Seminar
M.B.E.SOCIETY’S COLLEGE OF ENGINEERING
AMBAJOGAI
Department of Computer Science and Engineering
PHISHING ATTACK
Seminar On
By :
ANIKET PANDIT
Guidance by :
PROF. PRITI PANCHAL
03
Contents
• Introduction
• What is phishing attack
• Typical Scenario of phishing
• History of phishing attack
• Types of phishing attack & it's example
• Phishing statistics in india
• Prevention from phishing attack
• Anti-phishing software
• Punishment & Cyber law
• Conclusion
• Reference
04
Introduction
Phishing is a type of social engineering attack
often used to steal user data, including login
credentials and credit card numbers.
05
What is
Phishing?
The term Phishing can be
defined as an act of attempting
to acquire sensitive information
by pretending to be a
trustworthy entity.
Typical Scenario of Phishing Attacks
06
07
The first phishing attempt is
recorded on America online (AOL).
Hacker attempt to steal login
credentials & personal information
from AOL to resell online.
1990
Th riseof E-commerce encourages
cyber criminals to create spoofed
websites, impersonating popular
domain like ebay & PayPal.
Bitcoin & crypto currency are
launched this increases the creation
of malware as it is easier for cyber
criminals to securely receive
payment from their victims
History of Phishing Attack
2000
2008
2013
2019
Cyber criminals begin
hiding malicious code
inside image files to slip
through user's anti-virus
software
Phishing becomes the
primary technique to
deliver ransomware
08
Types of Phishing Attacks
EMAIL PHISHING
SPEAR PHISHING VOICE PHISHING
CLONE PHISHING
09
Email Phishing &
it's Example
The most widely known form of
phishing, this attack is an attempt
to steal sensitive information via an
email that appears to be from a
legitimate organization.
10
Spear Phishing &
it's Example
These email messages are sent to
specific people within an
organization, usually high-privilege
11
Clone Phishing &
it's Example
In this type of phishing, the attacker
clones a genuine or legitimate email
that you might have received from an
authentic sender but sent from a
spoofed email id
12
Voice Phishing &
it's Example
Vishing—or voice phishing—is the
use of fraudulent phone calls to trick
people into giving money or
revealing personal information.
0 20,000 40,000 60,000
2012
2013
2014
2015
2016
2017
2018
2019
2020
Number of cyber crimes
reported across India
PHISHING ATTACK STATISTICS IN INDIA
13
Around 83% of IT teams in
Indian organizations said the
number of phishing emails
targeting their employees
increased during 2020
83%
Most targeted industry in India,
first quarter of 2021
PHISHING ATTACK STATISTICS IN INDIA
Financial Institution
24.7%
Socila Media
23.7%
SaaS
19.7%
Payment
8.5%
Othe
r
8%
E-commerce
7.6%
Logistics and shipping
5.8%
14
During the first quarter of 2021,
24.9% of phishing attacks
worldwide were directed towards
financial institution
On top of that, social media
accounted for 23.6 percent of
attacks making these two the
highest targeted industries when it
came to phishing during this
period.
• Know what a phishing scam look like
• Don't click on that link
• Don't give your information to
unsecured site
• 
Rotate your password regularly
• 
Install Firewalls
• 
Install Anti-phishing software
PREVENTIONS FROM PHISHING
ATTACK
15
ANTI-PHISHING SOFTWARE
Area 1 Horizon
GreatHorn
IronScale
Cloud based service that offer protection from
phishing on Email & network based vectors
This cloud- native email security service protect from
phishing attack on office 365, email carrying
ransomware
This is a self learning email security platform powered
by AI. It can help you to detect & predict phishing
attacks. 16
Hacking into a computer network, data theft,
introducing and spreading viruses through computer
networks, This is a punishable offence under Section
43 of the Information Technology Act, 2000 with the
maximum punishment for the above offences is
imprisonment of up to 3 years or a fine or Rs.
5,00,000 (Rupees five lac) or both.
PUNISHMENT AND CYBER LAW
17
No single technology will completely stop Phishing
Attacks.
CONCLUSION
However a combination of good organization and
practice, proper application of current
technologies and improvement in security
technology has the potential to drastically reduce
the prevalence of phishing and the losses suffered
from it.
18
www.phishing.org
REFERENCE
Phishing Exposed

Social engineering
Phishing Attacks (IEEE subject)
Books
Websites
19
20
Thank You

More Related Content

What's hot

Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
shindept123
 
Phishing
PhishingPhishing
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
bensonoo
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Ramesh Upadhaya
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
Nikolaos Georgitsopoulos
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Chitra Mudunuru
 
PPT on Phishing
PPT on PhishingPPT on Phishing
PPT on Phishing
Pankaj Yadav
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
Jorge Sebastiao
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Vivek Agarwal
 
Cyber security
Cyber securityCyber security
Cyber security
Harsh verma
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
Sachin Saini
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
Alisha Korpal
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
SysCloud
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
yazad dumasia
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
Rubal Sagwal
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentationpooja_doshi
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
shindept123
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Akash Dhiman
 

What's hot (20)

Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Phishing
PhishingPhishing
Phishing
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
PPT on Phishing
PPT on PhishingPPT on Phishing
PPT on Phishing
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Phishing
PhishingPhishing
Phishing
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 

Similar to Phishing attack seminar presentation

Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
IRJET Journal
 
Cybercrime & Cybersecurity
Cybercrime & CybersecurityCybercrime & Cybersecurity
Cybercrime & Cybersecurity
RitamaJana
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurity
Mark Albala
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
Mark Albala
 
IRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing SitesIRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing Sites
IRJET Journal
 
Trends in cyber crime
Trends in cyber crimeTrends in cyber crime
Trends in cyber crime
Manish Singh
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
wlynn1
 
Digital Fraud Prevention and Detection Techniques in 2024
Digital Fraud Prevention and Detection Techniques in 2024Digital Fraud Prevention and Detection Techniques in 2024
Digital Fraud Prevention and Detection Techniques in 2024
FTx Identity
 
Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?
Ainsha Noordin (Umie)
 
Cyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfCyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdf
kirtigoyal328
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
IRJET Journal
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Tech and Law Center
 
Cybersecurity - Webinar Session
Cybersecurity - Webinar SessionCybersecurity - Webinar Session
Cybersecurity - Webinar Session
Kalilur Rahman
 
Cyber-Defenders-2020
Cyber-Defenders-2020Cyber-Defenders-2020
Cyber-Defenders-2020
Takayuki Yamazaki
 
CYBERCRIME VICTIMS
CYBERCRIME VICTIMSCYBERCRIME VICTIMS
CYBERCRIME VICTIMS
Shashwata Sahu
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
Goutama Bachtiar
 
Ict forensics and audit bb
Ict forensics and  audit bbIct forensics and  audit bb
Ict forensics and audit bb
marukanda
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importance
manoharparakh
 
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdf
Brafton
 
Study on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing ToolsStudy on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing Tools
IRJET Journal
 

Similar to Phishing attack seminar presentation (20)

Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
 
Cybercrime & Cybersecurity
Cybercrime & CybersecurityCybercrime & Cybersecurity
Cybercrime & Cybersecurity
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurity
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
IRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing SitesIRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing Sites
 
Trends in cyber crime
Trends in cyber crimeTrends in cyber crime
Trends in cyber crime
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
 
Digital Fraud Prevention and Detection Techniques in 2024
Digital Fraud Prevention and Detection Techniques in 2024Digital Fraud Prevention and Detection Techniques in 2024
Digital Fraud Prevention and Detection Techniques in 2024
 
Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?
 
Cyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfCyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdf
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 
Cybersecurity - Webinar Session
Cybersecurity - Webinar SessionCybersecurity - Webinar Session
Cybersecurity - Webinar Session
 
Cyber-Defenders-2020
Cyber-Defenders-2020Cyber-Defenders-2020
Cyber-Defenders-2020
 
CYBERCRIME VICTIMS
CYBERCRIME VICTIMSCYBERCRIME VICTIMS
CYBERCRIME VICTIMS
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
 
Ict forensics and audit bb
Ict forensics and  audit bbIct forensics and  audit bb
Ict forensics and audit bb
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importance
 
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdf
 
Study on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing ToolsStudy on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing Tools
 

Recently uploaded

Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
Kamal Acharya
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
MuhammadTufail242431
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
abh.arya
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 

Recently uploaded (20)

Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 

Phishing attack seminar presentation

  • 1. 01 Seminar M.B.E.SOCIETY’S COLLEGE OF ENGINEERING AMBAJOGAI Department of Computer Science and Engineering
  • 2. PHISHING ATTACK Seminar On By : ANIKET PANDIT Guidance by : PROF. PRITI PANCHAL
  • 3. 03 Contents • Introduction • What is phishing attack • Typical Scenario of phishing • History of phishing attack • Types of phishing attack & it's example • Phishing statistics in india • Prevention from phishing attack • Anti-phishing software • Punishment & Cyber law • Conclusion • Reference
  • 4. 04 Introduction Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers.
  • 5. 05 What is Phishing? The term Phishing can be defined as an act of attempting to acquire sensitive information by pretending to be a trustworthy entity.
  • 6. Typical Scenario of Phishing Attacks 06
  • 7. 07 The first phishing attempt is recorded on America online (AOL). Hacker attempt to steal login credentials & personal information from AOL to resell online. 1990 Th riseof E-commerce encourages cyber criminals to create spoofed websites, impersonating popular domain like ebay & PayPal. Bitcoin & crypto currency are launched this increases the creation of malware as it is easier for cyber criminals to securely receive payment from their victims History of Phishing Attack 2000 2008 2013 2019 Cyber criminals begin hiding malicious code inside image files to slip through user's anti-virus software Phishing becomes the primary technique to deliver ransomware
  • 8. 08 Types of Phishing Attacks EMAIL PHISHING SPEAR PHISHING VOICE PHISHING CLONE PHISHING
  • 9. 09 Email Phishing & it's Example The most widely known form of phishing, this attack is an attempt to steal sensitive information via an email that appears to be from a legitimate organization.
  • 10. 10 Spear Phishing & it's Example These email messages are sent to specific people within an organization, usually high-privilege
  • 11. 11 Clone Phishing & it's Example In this type of phishing, the attacker clones a genuine or legitimate email that you might have received from an authentic sender but sent from a spoofed email id
  • 12. 12 Voice Phishing & it's Example Vishing—or voice phishing—is the use of fraudulent phone calls to trick people into giving money or revealing personal information.
  • 13. 0 20,000 40,000 60,000 2012 2013 2014 2015 2016 2017 2018 2019 2020 Number of cyber crimes reported across India PHISHING ATTACK STATISTICS IN INDIA 13 Around 83% of IT teams in Indian organizations said the number of phishing emails targeting their employees increased during 2020 83%
  • 14. Most targeted industry in India, first quarter of 2021 PHISHING ATTACK STATISTICS IN INDIA Financial Institution 24.7% Socila Media 23.7% SaaS 19.7% Payment 8.5% Othe r 8% E-commerce 7.6% Logistics and shipping 5.8% 14 During the first quarter of 2021, 24.9% of phishing attacks worldwide were directed towards financial institution On top of that, social media accounted for 23.6 percent of attacks making these two the highest targeted industries when it came to phishing during this period.
  • 15. • Know what a phishing scam look like • Don't click on that link • Don't give your information to unsecured site •  Rotate your password regularly •  Install Firewalls •  Install Anti-phishing software PREVENTIONS FROM PHISHING ATTACK 15
  • 16. ANTI-PHISHING SOFTWARE Area 1 Horizon GreatHorn IronScale Cloud based service that offer protection from phishing on Email & network based vectors This cloud- native email security service protect from phishing attack on office 365, email carrying ransomware This is a self learning email security platform powered by AI. It can help you to detect & predict phishing attacks. 16
  • 17. Hacking into a computer network, data theft, introducing and spreading viruses through computer networks, This is a punishable offence under Section 43 of the Information Technology Act, 2000 with the maximum punishment for the above offences is imprisonment of up to 3 years or a fine or Rs. 5,00,000 (Rupees five lac) or both. PUNISHMENT AND CYBER LAW 17
  • 18. No single technology will completely stop Phishing Attacks. CONCLUSION However a combination of good organization and practice, proper application of current technologies and improvement in security technology has the potential to drastically reduce the prevalence of phishing and the losses suffered from it. 18