SlideShare a Scribd company logo
Seminar
On
Phishing
Attack
Presented By:
Prajakta Shinde
CONTENTS
 Introduction
 What is Phishing
 How does phishing work?
 What the are dangers of phishing attacks?
 Phishing Examples
 The different flavor of Phishing attack
 Types of Phishing
 How do I protect against phishing attacks?
 Causes of Phishing
 Effects of Phishing
 Conclusion
 Reference
INTRODUCTION
 Phishing is the most powerful and popular attack for
hacking into emails and web accounts.
 Cyber criminals use this attack to hack into bank
accounts, Facebook accounts and email account of
innocent people.
 Every year, most of the biggest cyber crime case
involve this attack.
 So we must know what is Phishing and how to
protect your accounts from phishing attack.
WHAT IS PHISHING?
 Phishing is the act of fooling a computer user into
submitting personal information by creating a
counterfeit it website that looks like a real (and
trusted)site.
 It is a hacker technique of "fishing" for passwords
and other secret financial info.
HOW DOES PHISHING WORK?
PHISHING EXAMPLES
PHISHING EXAMPLES
PHISHING EXAMPLES
THE DIFFERENT FLAVOR OF PHISHING ATTACK
TYPES OF PHISHING:
1) Deceptive phishing
2) Spear phishing
3) Whaling
4) Pharming
TYPES OF PHISHING
1. Deceptive phishing:
 Sending a deceptive email, in bulk, with a “call to action” that
demands the recipient click on a link.
 In this case, an attacker attempts to obtain confidential
information from the victims.
 Attackers use the information to steal money or to launch
other attacks.
 E.g A fake email from a bank asking you to click a link and
verify your account details.
TYPES OF PHISHING
2. Spear phishing:
 Spear phishing targets specific individuals instead of a wide
group of people.
 Attackers often research their victims on social media and
other sites.
 That way, they can customize their communications and
appear more authentic.
 Spear phishing is often the first step used to penetrate a
company’s defenses and carry out a targeted attack.
TYPES OF PHISHING
3.Whaling:
 When attackers go after a “big fish” like a CEO,
it’s called whaling.
 These attackers often spend considerable time
profiling the target to find the opportune moment
and means of stealing login credentials.
 Whaling is of particular concern because high-
level executives are able to access a great deal
of company information.
TYPES OF PHISHING
4.Pharming
 Similar to phishing, pharming sends users to a
fraudulent website that appears to be legitimate.
 However, in this case, victims do not even have
to click a malicious link to be taken to the bogus
site.
 Attackers can infect either the user’s computer
or the website’s DNS server and redirect the
user to a fake site even if the correct URL is
typed in.
WHAT THE ARE DANGERS OF PHISHING
ATTACKS?
 Sometimes attackers are satisfied with getting a
victim’s credit card information or other personal
data for financial gain.
 Other times, phishing emails are sent to obtain
employee login information or other details for
use in an advanced attack against a specific
company.
HOW DO I PROTECT AGAINST PHISHING
ATTACKS?
1.User education
 One way to protect your organization from
phishing is user education.
 Education should involve all employees.
 High-level executives are often a target Teach
them how to recognize a phishing email and
what to do when they receive one.
 Simulation exercises are also key for assessing
how your employees react to a staged phishing
attack.
2.Security technology
 No single cyber security technology can
prevent phishing attacks.
 Instead, organizations must take a layered
approach to reduce the number of attacks
and lessen their impact when they do occur.
 Network security technologies that should be
implemented include email and web security,
malware protection, user behavior
monitoring, and access control.
CAUSES OF PHISHING
 Misleading e-mails
 No check of source address
 Vulnerability in browsers
 No strong authentication at websites of banks and
financial institutions
 Limited use of digital signatures
 Non-availability of secure desktop tools
 Lack of user awareness
 Vulnerability in applications
EFFECTS OF PHISHING
 Internet fraud
 Identity theft
 Financial loss to the original institutions
 Difficulties in Law Enforcement Investigations
 Erosion of Public Trust in the Internet.
CONCLUSION
 No single technology will completely stop phishing.
 However, a combination of good organization and
practice, proper application of current technologies, and
improvements in security technology has the potential to
drastically reduce the prevalence of phishing and the
losses suffered from it.
REFERENCE
 www.google.com
 www.wikipedia.com
 www.studymafia.org
 www.slideshare.net
Phishing ppt

More Related Content

What's hot

Phishing
PhishingPhishing
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
Sazed Salman
 
Phishing
PhishingPhishing
Phishing
anjalika sinha
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
Quick Heal Technologies Ltd.
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
krishh sivakrishna
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
Parab Mishra
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation
AniketPandit18
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Bhandari Hìmáñßhü
 
What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?
Quick Heal Technologies Ltd.
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
Fettah Kurtulus
 
Cyber security
Cyber securityCyber security
Cyber security
Rishav Sadhu
 
Phishing
PhishingPhishing
Phishing
Sagar Rai
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
SysCloud
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
Avani Patel
 
PPT on Phishing
PPT on PhishingPPT on Phishing
PPT on Phishing
Pankaj Yadav
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Vivek Agarwal
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
bhavya mohindru
 

What's hot (20)

Phishing
PhishingPhishing
Phishing
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Phishing
PhishingPhishing
Phishing
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Phishing
PhishingPhishing
Phishing
 
What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cyber security
Cyber securityCyber security
Cyber security
 
Phishing
PhishingPhishing
Phishing
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
PPT on Phishing
PPT on PhishingPPT on Phishing
PPT on Phishing
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Similar to Phishing ppt

Cyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptxCyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptx
jenanityanand4
 
Phising a Threat to Network Security
Phising a Threat to Network SecurityPhising a Threat to Network Security
Phising a Threat to Network Security
anjuselina
 
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2Conf
 
E Mail Phishing Prevention and Detection
E Mail Phishing Prevention and DetectionE Mail Phishing Prevention and Detection
E Mail Phishing Prevention and Detection
ijtsrd
 
December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10
seadeloitte
 
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
IRJET Journal
 
Phishing website method
Phishing website methodPhishing website method
Phishing website method
arelyf_7
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
shindept123
 
Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Prevention
sonalikharade3
 
Data Security: A Guide To Whale Phishing
Data Security: A Guide To Whale PhishingData Security: A Guide To Whale Phishing
Data Security: A Guide To Whale Phishing
Phil Astell
 
Prevent phishing scams
Prevent phishing scamsPrevent phishing scams
Prevent phishing scams
ronpoul
 
Prevent phishing scams
Prevent phishing scamsPrevent phishing scams
Prevent phishing scams
ronpoul
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
RapidSSLOnline.com
 
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Okan YILDIZ
 
Software Frauds or Ethical Issues.ppt
Software Frauds or Ethical Issues.pptSoftware Frauds or Ethical Issues.ppt
Software Frauds or Ethical Issues.ppt
PramodAlfred
 
phishingppt-160209144204.pdf
phishingppt-160209144204.pdfphishingppt-160209144204.pdf
phishingppt-160209144204.pdf
vinayakjadhav94
 
A COMPREHENSIVE SURVEY OF PHISHING ATTACKS AND DEFENCES: HUMAN FACTORS, TRAIN...
A COMPREHENSIVE SURVEY OF PHISHING ATTACKS AND DEFENCES: HUMAN FACTORS, TRAIN...A COMPREHENSIVE SURVEY OF PHISHING ATTACKS AND DEFENCES: HUMAN FACTORS, TRAIN...
A COMPREHENSIVE SURVEY OF PHISHING ATTACKS AND DEFENCES: HUMAN FACTORS, TRAIN...
IJNSA Journal
 

Similar to Phishing ppt (20)

Cyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptxCyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptx
 
Phising a Threat to Network Security
Phising a Threat to Network SecurityPhising a Threat to Network Security
Phising a Threat to Network Security
 
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
 
E Mail Phishing Prevention and Detection
E Mail Phishing Prevention and DetectionE Mail Phishing Prevention and Detection
E Mail Phishing Prevention and Detection
 
December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10
 
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing website method
Phishing website methodPhishing website method
Phishing website method
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Prevention
 
Data Security: A Guide To Whale Phishing
Data Security: A Guide To Whale PhishingData Security: A Guide To Whale Phishing
Data Security: A Guide To Whale Phishing
 
Prevent phishing scams
Prevent phishing scamsPrevent phishing scams
Prevent phishing scams
 
Prevent phishing scams
Prevent phishing scamsPrevent phishing scams
Prevent phishing scams
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
 
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
 
Software Frauds or Ethical Issues.ppt
Software Frauds or Ethical Issues.pptSoftware Frauds or Ethical Issues.ppt
Software Frauds or Ethical Issues.ppt
 
phishingppt-160209144204.pdf
phishingppt-160209144204.pdfphishingppt-160209144204.pdf
phishingppt-160209144204.pdf
 
A COMPREHENSIVE SURVEY OF PHISHING ATTACKS AND DEFENCES: HUMAN FACTORS, TRAIN...
A COMPREHENSIVE SURVEY OF PHISHING ATTACKS AND DEFENCES: HUMAN FACTORS, TRAIN...A COMPREHENSIVE SURVEY OF PHISHING ATTACKS AND DEFENCES: HUMAN FACTORS, TRAIN...
A COMPREHENSIVE SURVEY OF PHISHING ATTACKS AND DEFENCES: HUMAN FACTORS, TRAIN...
 

More from shindept123

Synopsis of online student feedback system(cse)
Synopsis of online student feedback system(cse)Synopsis of online student feedback system(cse)
Synopsis of online student feedback system(cse)
shindept123
 
Ppt on online leave planner
Ppt on online leave plannerPpt on online leave planner
Ppt on online leave planner
shindept123
 
Payroll managemen tsystem
Payroll managemen tsystemPayroll managemen tsystem
Payroll managemen tsystem
shindept123
 
Student feedback system
Student feedback systemStudent feedback system
Student feedback system
shindept123
 
Farmers buddy ppt
Farmers buddy pptFarmers buddy ppt
Farmers buddy ppt
shindept123
 
Chap 1-language processor
Chap 1-language processorChap 1-language processor
Chap 1-language processor
shindept123
 

More from shindept123 (6)

Synopsis of online student feedback system(cse)
Synopsis of online student feedback system(cse)Synopsis of online student feedback system(cse)
Synopsis of online student feedback system(cse)
 
Ppt on online leave planner
Ppt on online leave plannerPpt on online leave planner
Ppt on online leave planner
 
Payroll managemen tsystem
Payroll managemen tsystemPayroll managemen tsystem
Payroll managemen tsystem
 
Student feedback system
Student feedback systemStudent feedback system
Student feedback system
 
Farmers buddy ppt
Farmers buddy pptFarmers buddy ppt
Farmers buddy ppt
 
Chap 1-language processor
Chap 1-language processorChap 1-language processor
Chap 1-language processor
 

Recently uploaded

block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 

Recently uploaded (20)

block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 

Phishing ppt

  • 2. CONTENTS  Introduction  What is Phishing  How does phishing work?  What the are dangers of phishing attacks?  Phishing Examples  The different flavor of Phishing attack  Types of Phishing  How do I protect against phishing attacks?  Causes of Phishing  Effects of Phishing  Conclusion  Reference
  • 3. INTRODUCTION  Phishing is the most powerful and popular attack for hacking into emails and web accounts.  Cyber criminals use this attack to hack into bank accounts, Facebook accounts and email account of innocent people.  Every year, most of the biggest cyber crime case involve this attack.  So we must know what is Phishing and how to protect your accounts from phishing attack.
  • 4. WHAT IS PHISHING?  Phishing is the act of fooling a computer user into submitting personal information by creating a counterfeit it website that looks like a real (and trusted)site.  It is a hacker technique of "fishing" for passwords and other secret financial info.
  • 9. THE DIFFERENT FLAVOR OF PHISHING ATTACK
  • 10. TYPES OF PHISHING: 1) Deceptive phishing 2) Spear phishing 3) Whaling 4) Pharming
  • 11. TYPES OF PHISHING 1. Deceptive phishing:  Sending a deceptive email, in bulk, with a “call to action” that demands the recipient click on a link.  In this case, an attacker attempts to obtain confidential information from the victims.  Attackers use the information to steal money or to launch other attacks.  E.g A fake email from a bank asking you to click a link and verify your account details.
  • 12. TYPES OF PHISHING 2. Spear phishing:  Spear phishing targets specific individuals instead of a wide group of people.  Attackers often research their victims on social media and other sites.  That way, they can customize their communications and appear more authentic.  Spear phishing is often the first step used to penetrate a company’s defenses and carry out a targeted attack.
  • 13. TYPES OF PHISHING 3.Whaling:  When attackers go after a “big fish” like a CEO, it’s called whaling.  These attackers often spend considerable time profiling the target to find the opportune moment and means of stealing login credentials.  Whaling is of particular concern because high- level executives are able to access a great deal of company information.
  • 14. TYPES OF PHISHING 4.Pharming  Similar to phishing, pharming sends users to a fraudulent website that appears to be legitimate.  However, in this case, victims do not even have to click a malicious link to be taken to the bogus site.  Attackers can infect either the user’s computer or the website’s DNS server and redirect the user to a fake site even if the correct URL is typed in.
  • 15. WHAT THE ARE DANGERS OF PHISHING ATTACKS?  Sometimes attackers are satisfied with getting a victim’s credit card information or other personal data for financial gain.  Other times, phishing emails are sent to obtain employee login information or other details for use in an advanced attack against a specific company.
  • 16. HOW DO I PROTECT AGAINST PHISHING ATTACKS? 1.User education  One way to protect your organization from phishing is user education.  Education should involve all employees.  High-level executives are often a target Teach them how to recognize a phishing email and what to do when they receive one.  Simulation exercises are also key for assessing how your employees react to a staged phishing attack.
  • 17. 2.Security technology  No single cyber security technology can prevent phishing attacks.  Instead, organizations must take a layered approach to reduce the number of attacks and lessen their impact when they do occur.  Network security technologies that should be implemented include email and web security, malware protection, user behavior monitoring, and access control.
  • 18. CAUSES OF PHISHING  Misleading e-mails  No check of source address  Vulnerability in browsers  No strong authentication at websites of banks and financial institutions  Limited use of digital signatures  Non-availability of secure desktop tools  Lack of user awareness  Vulnerability in applications
  • 19. EFFECTS OF PHISHING  Internet fraud  Identity theft  Financial loss to the original institutions  Difficulties in Law Enforcement Investigations  Erosion of Public Trust in the Internet.
  • 20. CONCLUSION  No single technology will completely stop phishing.  However, a combination of good organization and practice, proper application of current technologies, and improvements in security technology has the potential to drastically reduce the prevalence of phishing and the losses suffered from it.
  • 21. REFERENCE  www.google.com  www.wikipedia.com  www.studymafia.org  www.slideshare.net