SlideShare a Scribd company logo
• Pronounced “fishing”
• The word has its Origin from two words “Password
Harvesting” or fishing for Passwords
• Phishing is an online form of pretexting, a kind of
deception in which an attacker pretends to be
someone else in order to obtain sensitive
information from the victim.
• Also known as "brand spoofing“.
• Phishers are phishing artists.
• Phishing is a way of fraudulently acquiring sensitive
information using social engineering and technical
subterfuge.
• It tries to trick users with official-looking messages
− Credit card
− Bank account
− eBay
− PayPal
• Some phishing e-mails also
contain malicious or unwanted
software that can track your
activities or slow your computer
1. Unsolicited requests for sensitive information
2. Content appears genuine
3. Disguised hyperlinks and sender address
4. Email consists of a clickable
image
5. Generic Greetings
6. Use various ruses to entice
recipients to click
What to do if you Receive a
Suspected Phishing Scam
≠ DO NOT click on any links in the scam email.
≠ DO NOT supply any personal information of
any kind as a result of the email
≠ DO NOT reply to the email or attempt to
contact the senders in any way.
≠ DO NOT supply any information on the bogus
website that may appear in your browser if
you have clicked a link in the email.
≠ DO NOT open any
attachments that arrive with the
email.
≠ REPORT the phishing scam.
≠ DELETE the email from your
computer as soon as possible.
 Recognise the scam
 Report the scam
 Stop the scam
 Planning
 Setup
 Attack
 Collection
 Identity Theft and Fraud
 Unawareness among public
 Unawareness of policy
 Technical sophistication
Techniques of
Phishing Scams
1) Man-in-the-middle
Attacks
2) URL Obfuscation Attacks
3) XSS (Cross-site Scripting)
WHY YOUR PERSONAL
ACCOUNT
IS
A TARGET
Phishing – A Cyber
Crime Provisions of
Information
Technology Act, 2000
• Section 66
• Section 66A
• Section 66 C
• Section 66 D
1. Keep antivirus up to date
2. Do not click on hyperlinks in emails
3. Advantage of anti-spam software
4. Get educated
5. Use anti-spam software
6. Firewall
7. Use back-up system
8. Not to enter sensitive information into
pop-up windows
9. Secure the hosts file
10. Protect against DNS pharming
attacks
AMRITA HEMRAJANI (17)
PEARLENE JASAVALA (24)
KHYATI NANDU (38)
SANAYA PATEL (40)
KRISHMA SANDESRA (42)
VATSAL SHAH (50)
Phishing scams in banking ppt

More Related Content

What's hot

Bank frauds
Bank fraudsBank frauds
Bank frauds
Pooja Rani
 
forensic accounting india
forensic accounting indiaforensic accounting india
forensic accounting indiaMayank Garg
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
Nikolaos Georgitsopoulos
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
Goutama Bachtiar
 
Types of fraud in Accounting
Types of fraud in AccountingTypes of fraud in Accounting
Types of fraud in Accounting
Muhammad Qasim
 
Fraud Awareness For Managers
Fraud Awareness For ManagersFraud Awareness For Managers
Fraud Awareness For Managersrickycfe
 
Scams and-fraud-presentation
Scams and-fraud-presentationScams and-fraud-presentation
Scams and-fraud-presentation
Roel Palmaers
 
Frauds in banking
Frauds in banking Frauds in banking
Frauds in banking
Vinayak Halapeti
 
Fraud Risk and Control
Fraud Risk and ControlFraud Risk and Control
Fraud Risk and Control
WeaverCPAs
 
Anti Money Laundering
Anti Money Laundering Anti Money Laundering
Anti Money Laundering Besart Qerimi
 
How To: Prevent Loan Application Fraud
How To: Prevent Loan Application FraudHow To: Prevent Loan Application Fraud
How To: Prevent Loan Application Fraud
Geo Coelho
 
Anti money laundering
Anti money launderingAnti money laundering
Anti money laundering
Uttma Shukla
 
Forensic Auditing Show
Forensic Auditing ShowForensic Auditing Show
Forensic Auditing Show
vikas_k
 
The ANTI-MONEYLAUNDERING LEGAL FRAMEWORK
The ANTI-MONEYLAUNDERING LEGAL FRAMEWORK The ANTI-MONEYLAUNDERING LEGAL FRAMEWORK
The ANTI-MONEYLAUNDERING LEGAL FRAMEWORK
Melissa Cammarata
 
Basics of Anti-Money Laundering : A Really Quick Primer
Basics of Anti-Money Laundering : A Really Quick PrimerBasics of Anti-Money Laundering : A Really Quick Primer
Basics of Anti-Money Laundering : A Really Quick Primer
complianceonline123
 
Anti-money Laundering
Anti-money LaunderingAnti-money Laundering
Anti-money Laundering
Pushpendra singh
 
Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharks
Nalneesh Gaur
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
bensonoo
 
Fraud risk management training - Elsam Management Consultants
Fraud risk management training - Elsam Management ConsultantsFraud risk management training - Elsam Management Consultants
Fraud risk management training - Elsam Management Consultants
EMAC Consulting Group
 

What's hot (20)

Bank frauds
Bank fraudsBank frauds
Bank frauds
 
forensic accounting india
forensic accounting indiaforensic accounting india
forensic accounting india
 
Cyber fraud in banks
Cyber fraud in banksCyber fraud in banks
Cyber fraud in banks
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
 
Types of fraud in Accounting
Types of fraud in AccountingTypes of fraud in Accounting
Types of fraud in Accounting
 
Fraud Awareness For Managers
Fraud Awareness For ManagersFraud Awareness For Managers
Fraud Awareness For Managers
 
Scams and-fraud-presentation
Scams and-fraud-presentationScams and-fraud-presentation
Scams and-fraud-presentation
 
Frauds in banking
Frauds in banking Frauds in banking
Frauds in banking
 
Fraud Risk and Control
Fraud Risk and ControlFraud Risk and Control
Fraud Risk and Control
 
Anti Money Laundering
Anti Money Laundering Anti Money Laundering
Anti Money Laundering
 
How To: Prevent Loan Application Fraud
How To: Prevent Loan Application FraudHow To: Prevent Loan Application Fraud
How To: Prevent Loan Application Fraud
 
Anti money laundering
Anti money launderingAnti money laundering
Anti money laundering
 
Forensic Auditing Show
Forensic Auditing ShowForensic Auditing Show
Forensic Auditing Show
 
The ANTI-MONEYLAUNDERING LEGAL FRAMEWORK
The ANTI-MONEYLAUNDERING LEGAL FRAMEWORK The ANTI-MONEYLAUNDERING LEGAL FRAMEWORK
The ANTI-MONEYLAUNDERING LEGAL FRAMEWORK
 
Basics of Anti-Money Laundering : A Really Quick Primer
Basics of Anti-Money Laundering : A Really Quick PrimerBasics of Anti-Money Laundering : A Really Quick Primer
Basics of Anti-Money Laundering : A Really Quick Primer
 
Anti-money Laundering
Anti-money LaunderingAnti-money Laundering
Anti-money Laundering
 
Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharks
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Fraud risk management training - Elsam Management Consultants
Fraud risk management training - Elsam Management ConsultantsFraud risk management training - Elsam Management Consultants
Fraud risk management training - Elsam Management Consultants
 

Viewers also liked

Shield Your Business Combat Phishing Attacks
Shield Your Business   Combat Phishing AttacksShield Your Business   Combat Phishing Attacks
Shield Your Business Combat Phishing Attacks
Karl Kispert
 
Cyberprzestępcy jutra - ile kosztują?
Cyberprzestępcy jutra - ile kosztują?Cyberprzestępcy jutra - ile kosztują?
Cyberprzestępcy jutra - ile kosztują?
Logicaltrust pl
 
Phishing Attacks - Are You Ready to Respond?
Phishing Attacks - Are You Ready to Respond?Phishing Attacks - Are You Ready to Respond?
Phishing Attacks - Are You Ready to Respond?
Splunk
 
Web Security Threat Report on Spear Phishing Attacks - Symantec
Web Security Threat Report on Spear Phishing Attacks - SymantecWeb Security Threat Report on Spear Phishing Attacks - Symantec
Web Security Threat Report on Spear Phishing Attacks - Symantec
CheapSSLsecurity
 
APT x 3 - trzy firmy, trzy wektory ataków, trzy do zera - wybrane studium prz...
APT x 3 - trzy firmy, trzy wektory ataków, trzy do zera - wybrane studium prz...APT x 3 - trzy firmy, trzy wektory ataków, trzy do zera - wybrane studium prz...
APT x 3 - trzy firmy, trzy wektory ataków, trzy do zera - wybrane studium prz...
Logicaltrust pl
 
Phishing attack till now
Phishing attack till nowPhishing attack till now
Phishing attack till now
elakkiya poongunran
 
Discreet Business Proposition
Discreet Business PropositionDiscreet Business Proposition
Discreet Business Propositionabphillips30
 
9 dinámica hacer lo correcto o encubrir a un amigo..
9 dinámica hacer lo correcto o encubrir a un amigo..9 dinámica hacer lo correcto o encubrir a un amigo..
9 dinámica hacer lo correcto o encubrir a un amigo..
University of Madrid
 
Dossier de prensa fiab alimentaria 2014
Dossier de prensa fiab   alimentaria 2014Dossier de prensa fiab   alimentaria 2014
Dossier de prensa fiab alimentaria 2014FIAB
 
Excellent Varieties and Best Quality In Italian Tiles For Your Total Home Mak...
Excellent Varieties and Best Quality In Italian Tiles For Your Total Home Mak...Excellent Varieties and Best Quality In Italian Tiles For Your Total Home Mak...
Excellent Varieties and Best Quality In Italian Tiles For Your Total Home Mak...
EBEES DECOR
 
Sexo salvaje
Sexo salvajeSexo salvaje
Sexo salvaje
UNAM en línea
 
Grow MN Central Region 2012
Grow MN Central Region 2012Grow MN Central Region 2012
Grow MN Central Region 2012
Minnesota Chamber of Commerce
 
Especial La Voz de Galicia. A Mariña en fitur 2014. Semana Santa Viveiro
Especial La Voz de Galicia. A Mariña en fitur 2014. Semana Santa ViveiroEspecial La Voz de Galicia. A Mariña en fitur 2014. Semana Santa Viveiro
Especial La Voz de Galicia. A Mariña en fitur 2014. Semana Santa Viveiro
Cofrades de Viveiro
 
Weiche Flanellhemden in schicken Dessins
Weiche Flanellhemden in schicken DessinsWeiche Flanellhemden in schicken Dessins
Weiche Flanellhemden in schicken DessinsHirmer
 
Iseo Immobiliare | Agenzia Immobiliare Iseo Brescia - Pisogne villa in vendita
Iseo Immobiliare | Agenzia Immobiliare Iseo Brescia - Pisogne villa in venditaIseo Immobiliare | Agenzia Immobiliare Iseo Brescia - Pisogne villa in vendita
Iseo Immobiliare | Agenzia Immobiliare Iseo Brescia - Pisogne villa in vendita
iseoimmobiliare
 
Un Nuevo Mundo 2.0
Un Nuevo Mundo 2.0Un Nuevo Mundo 2.0
Un Nuevo Mundo 2.0
Pedro Atienza
 
Cy A Nuestros Servicios De Consultoria Tributaria Compatibility Mode
Cy A   Nuestros Servicios De Consultoria Tributaria Compatibility ModeCy A   Nuestros Servicios De Consultoria Tributaria Compatibility Mode
Cy A Nuestros Servicios De Consultoria Tributaria Compatibility Moderafaelvarela
 
Social hiring
Social hiringSocial hiring
Social hiring
Badri Ravi
 

Viewers also liked (20)

Shield Your Business Combat Phishing Attacks
Shield Your Business   Combat Phishing AttacksShield Your Business   Combat Phishing Attacks
Shield Your Business Combat Phishing Attacks
 
Cyberprzestępcy jutra - ile kosztują?
Cyberprzestępcy jutra - ile kosztują?Cyberprzestępcy jutra - ile kosztują?
Cyberprzestępcy jutra - ile kosztują?
 
Phishing Attacks - Are You Ready to Respond?
Phishing Attacks - Are You Ready to Respond?Phishing Attacks - Are You Ready to Respond?
Phishing Attacks - Are You Ready to Respond?
 
Web Security Threat Report on Spear Phishing Attacks - Symantec
Web Security Threat Report on Spear Phishing Attacks - SymantecWeb Security Threat Report on Spear Phishing Attacks - Symantec
Web Security Threat Report on Spear Phishing Attacks - Symantec
 
APT x 3 - trzy firmy, trzy wektory ataków, trzy do zera - wybrane studium prz...
APT x 3 - trzy firmy, trzy wektory ataków, trzy do zera - wybrane studium prz...APT x 3 - trzy firmy, trzy wektory ataków, trzy do zera - wybrane studium prz...
APT x 3 - trzy firmy, trzy wektory ataków, trzy do zera - wybrane studium prz...
 
Phishing attack till now
Phishing attack till nowPhishing attack till now
Phishing attack till now
 
Discreet Business Proposition
Discreet Business PropositionDiscreet Business Proposition
Discreet Business Proposition
 
9 dinámica hacer lo correcto o encubrir a un amigo..
9 dinámica hacer lo correcto o encubrir a un amigo..9 dinámica hacer lo correcto o encubrir a un amigo..
9 dinámica hacer lo correcto o encubrir a un amigo..
 
Dossier de prensa fiab alimentaria 2014
Dossier de prensa fiab   alimentaria 2014Dossier de prensa fiab   alimentaria 2014
Dossier de prensa fiab alimentaria 2014
 
Excellent Varieties and Best Quality In Italian Tiles For Your Total Home Mak...
Excellent Varieties and Best Quality In Italian Tiles For Your Total Home Mak...Excellent Varieties and Best Quality In Italian Tiles For Your Total Home Mak...
Excellent Varieties and Best Quality In Italian Tiles For Your Total Home Mak...
 
Sexo salvaje
Sexo salvajeSexo salvaje
Sexo salvaje
 
Grow MN Central Region 2012
Grow MN Central Region 2012Grow MN Central Region 2012
Grow MN Central Region 2012
 
Gacetilla de prensa 20 05-2014
Gacetilla de prensa 20 05-2014Gacetilla de prensa 20 05-2014
Gacetilla de prensa 20 05-2014
 
Especial La Voz de Galicia. A Mariña en fitur 2014. Semana Santa Viveiro
Especial La Voz de Galicia. A Mariña en fitur 2014. Semana Santa ViveiroEspecial La Voz de Galicia. A Mariña en fitur 2014. Semana Santa Viveiro
Especial La Voz de Galicia. A Mariña en fitur 2014. Semana Santa Viveiro
 
Treball diasdeclase 3rb
Treball diasdeclase 3rbTreball diasdeclase 3rb
Treball diasdeclase 3rb
 
Weiche Flanellhemden in schicken Dessins
Weiche Flanellhemden in schicken DessinsWeiche Flanellhemden in schicken Dessins
Weiche Flanellhemden in schicken Dessins
 
Iseo Immobiliare | Agenzia Immobiliare Iseo Brescia - Pisogne villa in vendita
Iseo Immobiliare | Agenzia Immobiliare Iseo Brescia - Pisogne villa in venditaIseo Immobiliare | Agenzia Immobiliare Iseo Brescia - Pisogne villa in vendita
Iseo Immobiliare | Agenzia Immobiliare Iseo Brescia - Pisogne villa in vendita
 
Un Nuevo Mundo 2.0
Un Nuevo Mundo 2.0Un Nuevo Mundo 2.0
Un Nuevo Mundo 2.0
 
Cy A Nuestros Servicios De Consultoria Tributaria Compatibility Mode
Cy A   Nuestros Servicios De Consultoria Tributaria Compatibility ModeCy A   Nuestros Servicios De Consultoria Tributaria Compatibility Mode
Cy A Nuestros Servicios De Consultoria Tributaria Compatibility Mode
 
Social hiring
Social hiringSocial hiring
Social hiring
 

Similar to Phishing scams in banking ppt

Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks pptAryan Ragu
 
IT2252_Presentation_Group03.pptx
IT2252_Presentation_Group03.pptxIT2252_Presentation_Group03.pptx
IT2252_Presentation_Group03.pptx
NLFunnyFunky
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)aleeya91
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
Sachin Saini
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
Lourdes Paloma Gimenez
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptx
Stephen Jesukanth Martin
 
Spear Phishing Attacks
Spear Phishing AttacksSpear Phishing Attacks
Spear Phishing Attacks
IsaacDavid27
 
Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & PrivacyAlexine Marier
 
Phishing
PhishingPhishing
Phishing
Arpit Patel
 
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awarenessOWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
MaherHamza9
 
PHISHING attack
PHISHING attack PHISHING attack
PHISHING attack
Shubh Thakkar
 
HACKING AND PHISHING
HACKING AND PHISHINGHACKING AND PHISHING
HACKING AND PHISHING
santhuana sg
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraudRadiant Minds
 
Phishing
PhishingPhishing
Phishing
Sagar Rai
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
Tanvir Amin
 
Phishing
PhishingPhishing
Phishing
Archit Mohanty
 

Similar to Phishing scams in banking ppt (20)

Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
IT2252_Presentation_Group03.pptx
IT2252_Presentation_Group03.pptxIT2252_Presentation_Group03.pptx
IT2252_Presentation_Group03.pptx
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptx
 
Pp8
Pp8Pp8
Pp8
 
Spear Phishing Attacks
Spear Phishing AttacksSpear Phishing Attacks
Spear Phishing Attacks
 
Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & Privacy
 
Phishing
PhishingPhishing
Phishing
 
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awarenessOWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
 
PHISHING attack
PHISHING attack PHISHING attack
PHISHING attack
 
HACKING AND PHISHING
HACKING AND PHISHINGHACKING AND PHISHING
HACKING AND PHISHING
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
 
Phishing
PhishingPhishing
Phishing
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
Phishing
PhishingPhishing
Phishing
 

More from Krishma Sandesra

silver bullion market
silver bullion marketsilver bullion market
silver bullion market
Krishma Sandesra
 

More from Krishma Sandesra (10)

silver bullion market
silver bullion marketsilver bullion market
silver bullion market
 
entry barriers for banks
entry barriers for banksentry barriers for banks
entry barriers for banks
 
Monetary policy of rbi
Monetary policy of rbiMonetary policy of rbi
Monetary policy of rbi
 
Jp morgan final ppt
Jp morgan final pptJp morgan final ppt
Jp morgan final ppt
 
Festivals of india old
Festivals of india oldFestivals of india old
Festivals of india old
 
Crm final ppt
Crm final pptCrm final ppt
Crm final ppt
 
Tisco
Tisco Tisco
Tisco
 
Crm final ppt
Crm final pptCrm final ppt
Crm final ppt
 
Monetary policy of rbi
Monetary policy of rbiMonetary policy of rbi
Monetary policy of rbi
 
Em ppt
Em pptEm ppt
Em ppt
 

Recently uploaded

Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 

Recently uploaded (20)

Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 

Phishing scams in banking ppt

  • 1.
  • 2.
  • 3. • Pronounced “fishing” • The word has its Origin from two words “Password Harvesting” or fishing for Passwords • Phishing is an online form of pretexting, a kind of deception in which an attacker pretends to be someone else in order to obtain sensitive information from the victim. • Also known as "brand spoofing“. • Phishers are phishing artists.
  • 4.
  • 5. • Phishing is a way of fraudulently acquiring sensitive information using social engineering and technical subterfuge. • It tries to trick users with official-looking messages − Credit card − Bank account − eBay − PayPal • Some phishing e-mails also contain malicious or unwanted software that can track your activities or slow your computer
  • 6. 1. Unsolicited requests for sensitive information 2. Content appears genuine 3. Disguised hyperlinks and sender address
  • 7. 4. Email consists of a clickable image 5. Generic Greetings 6. Use various ruses to entice recipients to click
  • 8.
  • 9.
  • 10. What to do if you Receive a Suspected Phishing Scam ≠ DO NOT click on any links in the scam email. ≠ DO NOT supply any personal information of any kind as a result of the email ≠ DO NOT reply to the email or attempt to contact the senders in any way. ≠ DO NOT supply any information on the bogus website that may appear in your browser if you have clicked a link in the email.
  • 11. ≠ DO NOT open any attachments that arrive with the email. ≠ REPORT the phishing scam. ≠ DELETE the email from your computer as soon as possible.
  • 12.
  • 13.  Recognise the scam  Report the scam  Stop the scam
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.  Planning  Setup  Attack  Collection  Identity Theft and Fraud
  • 19.
  • 20.  Unawareness among public  Unawareness of policy  Technical sophistication
  • 21.
  • 22. Techniques of Phishing Scams 1) Man-in-the-middle Attacks 2) URL Obfuscation Attacks 3) XSS (Cross-site Scripting)
  • 23.
  • 25. Phishing – A Cyber Crime Provisions of Information Technology Act, 2000 • Section 66 • Section 66A • Section 66 C • Section 66 D
  • 26. 1. Keep antivirus up to date 2. Do not click on hyperlinks in emails 3. Advantage of anti-spam software
  • 27. 4. Get educated 5. Use anti-spam software 6. Firewall 7. Use back-up system
  • 28. 8. Not to enter sensitive information into pop-up windows 9. Secure the hosts file 10. Protect against DNS pharming attacks
  • 29.
  • 30.
  • 31. AMRITA HEMRAJANI (17) PEARLENE JASAVALA (24) KHYATI NANDU (38) SANAYA PATEL (40) KRISHMA SANDESRA (42) VATSAL SHAH (50)