SlideShare a Scribd company logo
1 of 16
www.linkedin.com/mrchittaranjandas
Seminar
On
Phishing
CONTENT
• INTRODUCTION
• PHISHING TECHNIQUES
• PHISHING EXAMPLES
• TYPES OF PHISHING
• CAUSES OF PHISHING
• ANTI PHISHING
• EFFECTS OF PHISHING
• DEFEND AGAINST PHISHING ATTACKS
• CONCLUSION
• REFERENCE
INTRODUCTION
• PHISHING IS THE ACT OF ATTEMPTING TO ACQUIRE
INFORMATION SUCH AS USERNAME, PASSWORD
AND CREDIT CARD DETAILS AS A TRUSTWORTHY
ENTITY IN AN ELECTRONIC COMMUNICATION.
• COMMUNICATIONS PURPORTING TO BE FROM
POPULAR SOCIAL WEB SITES ,AUCTION SITES,
ONLINE PAYMENT PROCESS OR IT ADMINISTRATORS
ARE COMMONLY USED TO LURE THE
UNSUSPECTING PUBLIC .PHISHING EMAILS MAY
CONTAIN LINKS TO WEBSITES THAT ARE INFECTED
WITH MALWARE.
PHISHING TECHNIQUES
• LINK MANIPULATION
• FILTER EVASION
• WEBSITE FORGERY
• PHONE PHISHING
PHISHING EXAMPLES
• IN THIS EXAMPLE, TARGETED AT SOUTH TRUST BANK USERS,
THE PHISHER HAS USED AN IMAGE TO MAKE IT HARDER FOR
ANTI-PHISHING FILTERS TO DETECT BY SCANNING FOR TEXT
COMMONLY USED IN PHISHING EMAILS.
PHISHING EXAMPLES
TYPES OF PHISHING
• DECEPTIVE - SENDING A DECEPTIVE EMAIL, IN BULK, WITH A
“CALL TO ACTION” THAT DEMANDS THE RECIPIENT CLICK ON A
LINK.
 MALWARE-BASED - RUNNING MALICIOUS SOFTWARE ON
THE USER’S MACHINE. VARIOUS FORMS OF MALWARE-BASED
PHISHING ARE:
 KEY LOGGERS & SCREEN LOGGERS
 SESSION HIJACKERS
 WEB TROJANS
 DATA THEFT
TYPES OF PHISHING
 DNS-BASED - PHISHING THAT INTERFERES WITH THE
INTEGRITY OF THE LOOKUP PROCESS FOR A DOMAIN NAME.
FORMS OF DNS-BASED PHISHING ARE:
 HOSTS FILE POISONING
 POLLUTING USER’S DNS CACHE
 PROXY SERVER COMPROMISE
 MAN-IN-THE-MIDDLE PHISHING - PHISHER
POSITIONS HIMSELF BETWEEN THE USER AND THE
LEGITIMATE SITE.
TYPES OF PHISHING
 CONTENT-INJECTION – INSERTING MALICIOUS CONTENT INTO LEGITIMATE SITE.
THREE PRIMARY TYPES OF CONTENT-INJECTION PHISHING:
 HACKERS CAN COMPROMISE A SERVER THROUGH A SECURITY VULNERABILITY AND
REPLACE OR AUGMENT THE LEGITIMATE CONTENT WITH MALICIOUS CONTENT.
 MALICIOUS CONTENT CAN BE INSERTED INTO A SITE THROUGH A CROSS-SITE
SCRIPTING VULNERABILITY.
 MALICIOUS ACTIONS CAN BE PERFORMED ON A SITE THROUGH A SQL INJECTION
VULNERABILITY.
CAUSES OF PHISHING
 MISLEADING E-MAILS
 NO CHECK OF SOURCE ADDRESS
 VULNERABILITY IN BROWSERS
 NO STRONG AUTHENTICATION AT WEBSITES OF BANKS AND
FINANCIAL INSTITUTIONS
 LIMITED USE OF DIGITAL SIGNATURES
 NON-AVAILABILITY OF SECURE DESKTOP TOOLS
 LACK OF USER AWARENESS
 VULNERABILITY IN APPLICATIONS
ANTI PHISHING
• A. SOCIAL RESPONSES
• B. TECHNICAL APPROACHES
• 1. HELPING TO IDENTIFY LEGITIMATE WEBSITES.
• 2. BROWSERS ALERTING USERS TO FRAUDULENT
WEBSITES.
• 3. ELIMINATING PHISHING MAIL.
• 4. MONITORING AND TAKEDOWN.
• C. LEGAL APPROACHES
EFFECTS OF PHISHING
 INTERNET FRAUD
 IDENTITY THEFT
 FINANCIAL LOSS TO THE ORIGINAL
INSTITUTIONS
 DIFFICULTIES IN LAW ENFORCEMENT
INVESTIGATIONS
 EROSION OF PUBLIC TRUST IN THE INTERNET.
DEFEND AGAINST PHISHING
ATTACKS
• PREVENTING A PHISHING ATTACK BEFORE IT BEGINS
• DETECTING A PHISHING ATTACK
• PREVENTING THE DELIVERY OF PHISHING MESSAGES
• PREVENTING DECEPTION IN PHISHING MESSAGES AND
SITES
• COUNTER MEASURES
• INTERFERING WITH THE USE OF COMPROMISED
INFORMATION
CONCLUSION
• NO SINGLE TECHNOLOGY WILL COMPLETELY STOP
PHISHING.
• HOWEVER, A COMBINATION OF GOOD ORGANIZATION
AND PRACTICE, PROPER APPLICATION OF CURRENT
TECHNOLOGIES, AND IMPROVEMENTS IN SECURITY
TECHNOLOGY HAS THE POTENTIAL TO DRASTICALLY
REDUCE THE PREVALENCE OF PHISHING AND THE
LOSSES SUFFERED FROM IT.
REFERENCE
• WWW.FACEBOOK.COM/ROCKSTARCHITTA
• WWW.TWITTER.COM/ROCKSTARCHITTA
• WWW.INSTAGRAM.COM/ROCKSTARCHITTA
• WWW.LINKEDIN.COM/MRCHITTARANJANDAS
THANKS

More Related Content

What's hot

Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasuresJorge Sebastiao
 
Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniquesSushil Kumar
 
Phishing - A modern web attack
Phishing -  A modern web attackPhishing -  A modern web attack
Phishing - A modern web attackKarthik
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafeCheapSSLsecurity
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks pptAryan Ragu
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing AttacksJagan Mohan
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanControlScan, Inc.
 
Phishing detection & protection scheme
Phishing detection & protection schemePhishing detection & protection scheme
Phishing detection & protection schemeMussavir Shaikh
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N Gbensonoo
 
Phishing Seminar By M Nadeem Qazi(MnQazi) pptx
Phishing Seminar By M Nadeem Qazi(MnQazi) pptxPhishing Seminar By M Nadeem Qazi(MnQazi) pptx
Phishing Seminar By M Nadeem Qazi(MnQazi) pptxM Nadeem Qazi
 
Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Preventionsonalikharade3
 

What's hot (20)

Phishing Technology
Phishing TechnologyPhishing Technology
Phishing Technology
 
Phishing
PhishingPhishing
Phishing
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniques
 
Phishing - A modern web attack
Phishing -  A modern web attackPhishing -  A modern web attack
Phishing - A modern web attack
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You Safe
 
Phishing
PhishingPhishing
Phishing
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing Attacks
 
What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Phishing
PhishingPhishing
Phishing
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
 
Phishing detection & protection scheme
Phishing detection & protection schemePhishing detection & protection scheme
Phishing detection & protection scheme
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Phishing & Pharming
Phishing & PharmingPhishing & Pharming
Phishing & Pharming
 
Phishing Seminar By M Nadeem Qazi(MnQazi) pptx
Phishing Seminar By M Nadeem Qazi(MnQazi) pptxPhishing Seminar By M Nadeem Qazi(MnQazi) pptx
Phishing Seminar By M Nadeem Qazi(MnQazi) pptx
 
Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Prevention
 
Phishing Incident Response Playbook
Phishing Incident Response PlaybookPhishing Incident Response Playbook
Phishing Incident Response Playbook
 

Similar to Phishing technology by chitta

phishing-technology-730-J1A0e1Q.pptx
phishing-technology-730-J1A0e1Q.pptxphishing-technology-730-J1A0e1Q.pptx
phishing-technology-730-J1A0e1Q.pptxMaheshDhope1
 
phishingppt-160209144204.pdf
phishingppt-160209144204.pdfphishingppt-160209144204.pdf
phishingppt-160209144204.pdfvinayakjadhav94
 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commercesadaf tst
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresIRJET Journal
 
NIS-CH 1-PART 1 (1).pptx
NIS-CH 1-PART 1 (1).pptxNIS-CH 1-PART 1 (1).pptx
NIS-CH 1-PART 1 (1).pptxchandutidake
 
Cyber Crime and Prevention Tips
Cyber Crime and Prevention TipsCyber Crime and Prevention Tips
Cyber Crime and Prevention TipsTayyab Farooq
 
Edu 3 arya. s 24 Cyber privacy
Edu 3 arya. s 24 Cyber privacy Edu 3 arya. s 24 Cyber privacy
Edu 3 arya. s 24 Cyber privacy ARYAS87
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldAvishek Datta
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017SurfWatch Labs
 
Protecting Your Business from Cybercrime - Cybersecurity 101
Protecting Your Business from Cybercrime - Cybersecurity 101Protecting Your Business from Cybercrime - Cybersecurity 101
Protecting Your Business from Cybercrime - Cybersecurity 101David J Rosenthal
 
Websecurity fundamentals for beginners
Websecurity fundamentals for beginnersWebsecurity fundamentals for beginners
Websecurity fundamentals for beginnersSamvel Gevorgyan
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsGDSCCVR
 

Similar to Phishing technology by chitta (20)

phishing-technology-730-J1A0e1Q.pptx
phishing-technology-730-J1A0e1Q.pptxphishing-technology-730-J1A0e1Q.pptx
phishing-technology-730-J1A0e1Q.pptx
 
phishingppt-160209144204.pdf
phishingppt-160209144204.pdfphishingppt-160209144204.pdf
phishingppt-160209144204.pdf
 
CYBER SECURITY _ PHISHING
CYBER SECURITY _ PHISHINGCYBER SECURITY _ PHISHING
CYBER SECURITY _ PHISHING
 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commerce
 
Cyber Threats
Cyber ThreatsCyber Threats
Cyber Threats
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
 
Social engineering
Social engineering Social engineering
Social engineering
 
NIS-CH 1-PART 1 (1).pptx
NIS-CH 1-PART 1 (1).pptxNIS-CH 1-PART 1 (1).pptx
NIS-CH 1-PART 1 (1).pptx
 
Cyber Crime and Prevention Tips
Cyber Crime and Prevention TipsCyber Crime and Prevention Tips
Cyber Crime and Prevention Tips
 
Edu 3 arya. s 24 Cyber privacy
Edu 3 arya. s 24 Cyber privacy Edu 3 arya. s 24 Cyber privacy
Edu 3 arya. s 24 Cyber privacy
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark World
 
Panama-Paper-Leak
Panama-Paper-LeakPanama-Paper-Leak
Panama-Paper-Leak
 
Panama Papers Leak and Precautions Law firms should take
Panama Papers Leak and Precautions Law firms should takePanama Papers Leak and Precautions Law firms should take
Panama Papers Leak and Precautions Law firms should take
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Protecting Your Business from Cybercrime - Cybersecurity 101
Protecting Your Business from Cybercrime - Cybersecurity 101Protecting Your Business from Cybercrime - Cybersecurity 101
Protecting Your Business from Cybercrime - Cybersecurity 101
 
Websecurity fundamentals for beginners
Websecurity fundamentals for beginnersWebsecurity fundamentals for beginners
Websecurity fundamentals for beginners
 
Phishing
PhishingPhishing
Phishing
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study Jams
 

Recently uploaded

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 

Recently uploaded (20)

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 

Phishing technology by chitta

  • 2. CONTENT • INTRODUCTION • PHISHING TECHNIQUES • PHISHING EXAMPLES • TYPES OF PHISHING • CAUSES OF PHISHING • ANTI PHISHING • EFFECTS OF PHISHING • DEFEND AGAINST PHISHING ATTACKS • CONCLUSION • REFERENCE
  • 3. INTRODUCTION • PHISHING IS THE ACT OF ATTEMPTING TO ACQUIRE INFORMATION SUCH AS USERNAME, PASSWORD AND CREDIT CARD DETAILS AS A TRUSTWORTHY ENTITY IN AN ELECTRONIC COMMUNICATION. • COMMUNICATIONS PURPORTING TO BE FROM POPULAR SOCIAL WEB SITES ,AUCTION SITES, ONLINE PAYMENT PROCESS OR IT ADMINISTRATORS ARE COMMONLY USED TO LURE THE UNSUSPECTING PUBLIC .PHISHING EMAILS MAY CONTAIN LINKS TO WEBSITES THAT ARE INFECTED WITH MALWARE.
  • 4. PHISHING TECHNIQUES • LINK MANIPULATION • FILTER EVASION • WEBSITE FORGERY • PHONE PHISHING
  • 5. PHISHING EXAMPLES • IN THIS EXAMPLE, TARGETED AT SOUTH TRUST BANK USERS, THE PHISHER HAS USED AN IMAGE TO MAKE IT HARDER FOR ANTI-PHISHING FILTERS TO DETECT BY SCANNING FOR TEXT COMMONLY USED IN PHISHING EMAILS.
  • 7. TYPES OF PHISHING • DECEPTIVE - SENDING A DECEPTIVE EMAIL, IN BULK, WITH A “CALL TO ACTION” THAT DEMANDS THE RECIPIENT CLICK ON A LINK.  MALWARE-BASED - RUNNING MALICIOUS SOFTWARE ON THE USER’S MACHINE. VARIOUS FORMS OF MALWARE-BASED PHISHING ARE:  KEY LOGGERS & SCREEN LOGGERS  SESSION HIJACKERS  WEB TROJANS  DATA THEFT
  • 8. TYPES OF PHISHING  DNS-BASED - PHISHING THAT INTERFERES WITH THE INTEGRITY OF THE LOOKUP PROCESS FOR A DOMAIN NAME. FORMS OF DNS-BASED PHISHING ARE:  HOSTS FILE POISONING  POLLUTING USER’S DNS CACHE  PROXY SERVER COMPROMISE  MAN-IN-THE-MIDDLE PHISHING - PHISHER POSITIONS HIMSELF BETWEEN THE USER AND THE LEGITIMATE SITE.
  • 9. TYPES OF PHISHING  CONTENT-INJECTION – INSERTING MALICIOUS CONTENT INTO LEGITIMATE SITE. THREE PRIMARY TYPES OF CONTENT-INJECTION PHISHING:  HACKERS CAN COMPROMISE A SERVER THROUGH A SECURITY VULNERABILITY AND REPLACE OR AUGMENT THE LEGITIMATE CONTENT WITH MALICIOUS CONTENT.  MALICIOUS CONTENT CAN BE INSERTED INTO A SITE THROUGH A CROSS-SITE SCRIPTING VULNERABILITY.  MALICIOUS ACTIONS CAN BE PERFORMED ON A SITE THROUGH A SQL INJECTION VULNERABILITY.
  • 10. CAUSES OF PHISHING  MISLEADING E-MAILS  NO CHECK OF SOURCE ADDRESS  VULNERABILITY IN BROWSERS  NO STRONG AUTHENTICATION AT WEBSITES OF BANKS AND FINANCIAL INSTITUTIONS  LIMITED USE OF DIGITAL SIGNATURES  NON-AVAILABILITY OF SECURE DESKTOP TOOLS  LACK OF USER AWARENESS  VULNERABILITY IN APPLICATIONS
  • 11. ANTI PHISHING • A. SOCIAL RESPONSES • B. TECHNICAL APPROACHES • 1. HELPING TO IDENTIFY LEGITIMATE WEBSITES. • 2. BROWSERS ALERTING USERS TO FRAUDULENT WEBSITES. • 3. ELIMINATING PHISHING MAIL. • 4. MONITORING AND TAKEDOWN. • C. LEGAL APPROACHES
  • 12. EFFECTS OF PHISHING  INTERNET FRAUD  IDENTITY THEFT  FINANCIAL LOSS TO THE ORIGINAL INSTITUTIONS  DIFFICULTIES IN LAW ENFORCEMENT INVESTIGATIONS  EROSION OF PUBLIC TRUST IN THE INTERNET.
  • 13. DEFEND AGAINST PHISHING ATTACKS • PREVENTING A PHISHING ATTACK BEFORE IT BEGINS • DETECTING A PHISHING ATTACK • PREVENTING THE DELIVERY OF PHISHING MESSAGES • PREVENTING DECEPTION IN PHISHING MESSAGES AND SITES • COUNTER MEASURES • INTERFERING WITH THE USE OF COMPROMISED INFORMATION
  • 14. CONCLUSION • NO SINGLE TECHNOLOGY WILL COMPLETELY STOP PHISHING. • HOWEVER, A COMBINATION OF GOOD ORGANIZATION AND PRACTICE, PROPER APPLICATION OF CURRENT TECHNOLOGIES, AND IMPROVEMENTS IN SECURITY TECHNOLOGY HAS THE POTENTIAL TO DRASTICALLY REDUCE THE PREVALENCE OF PHISHING AND THE LOSSES SUFFERED FROM IT.
  • 15. REFERENCE • WWW.FACEBOOK.COM/ROCKSTARCHITTA • WWW.TWITTER.COM/ROCKSTARCHITTA • WWW.INSTAGRAM.COM/ROCKSTARCHITTA • WWW.LINKEDIN.COM/MRCHITTARANJANDAS