SlideShare a Scribd company logo
PHISHING
.
PHISHING
• In computing, phishing is a form of social engineering.
• It is characterized by attempts to fraudulently acquire sensitive
information, such as passwords and credit card details, by
masquerading as a trustworthy person or business in an
apparently official electronic communication, such as an e-mail or
an instant message.
SOCIAL ENGINEERING
• It is the psychological manipulation of people into performing actions or
divulging confidential information
• A type of confidence trick for the purpose of information gathering fraud or
system access
TYPES OF PHISHING ATTACKS
• Deceptive phishing or Email phishing
• Clone phishing
• Voice, SMS and calendar phishing
• Spear Phishing
• Whaling
• Pharming
DECEPTIVE PHISHING
• Deceptive phishing or also known as email phishing is the most common type
of phishing.
• In this case, an attacker attempts to obtain confidential information from the
victims.
• Attackers use the information to steal money or to launch other attacks.
• A fake email from a bank asking you to click a link and verify your account
details is an example of deceptive phishing.
SPEAR PHISHING
• Spear phishing targets specific individuals instead of a wide group of people.
• Attackers often research their victims on social media and other sites.
• That way, they can customize their communications and appear more
authentic.
• Spear phishing is often the first step used to penetrate a company’s defenses
and carry out a targeted attack.
WHALING
• Whaling also known as CEO fraud
• When attackers go after a “big fish” like a CEO, it’s called whaling.
• These attackers often spend considerable time profiling the target to find the
opportune moment and means of stealing login credentials.
• Whaling is of particular concern because high-level executives are able to
access a great deal of company information.
PHARMING
• Pharming also called page hijacking is similar to phishing, pharming sends
users to a fraudulent website that appears to be legitimate.
• However, in this case, victims do not even have to click a malicious link to be
taken to the fake site.
• Attackers can infect either the user’s computer or the website’s DNS server
and redirect the user to a fake site even if the correct URL is typed in.
CLONE PHISHING
• Clone phishing is a type of attack where a legitimate email with an
attachment or link is copied and modified to contain malicious content.
• The modified email is then sent from a fake address made to look like it's from
the original sender.
VOICE, SMS AND CALENDAR PHISHING
• Voice phishing or vishing is a type of attack done through phone calls, the attackers spoof
the calling phone number to appear as if it is coming from a legitimate bank or institution
• Vishing takes advantage of the public's lower awareness and trust in voice telephony
compared to email phishing.
• SMS phishingor smishing is a type of phishing attack that uses text messages from a cell
phone or smartphone to deliver a bait message.
• The victim is usually asked to click a link, call a phone number, or contact an email address
provided by the attacker.
• Calendar phishing involves sending fake calendar invitations with phishing links.
• These invitations often mimic common event requests and can easily be added to calendars
automatically
SIGNS OF A PHISHING
• It may contain unfamiliar tones or greetings
• Grammar and spelling mistakes
• Inconsistencies in Email addresses, links and domain names
• Threats or a sense of urgency
• Suspicious attachments
• Request for credentials payment information or other personal details
WAYS TO PREVENT PHISHING ATTACKS
• Proper awareness about phishing
• Don’t click on the suspicious attachments and links
• Don’t give information to unsecured sites
• Get free anti- phishing add on
• Rotate passwords regularly
• Update your system regularly
• Install firewalls
• Don’t be tempted by site pop-ups
• Have a security platform to spot signs of attack
THANKYOU

More Related Content

Similar to phishing.pptx

Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
aleeya91
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptx
Stephen Jesukanth Martin
 
Phishing
PhishingPhishing
Phishing
AmirIzzudin1
 
Phishing and prevention
Phishing and preventionPhishing and prevention
Phishing and prevention
Stephen Hasford
 
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awarenessOWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
MaherHamza9
 
Information security training Phishing
Information security training PhishingInformation security training Phishing
Information security training Phishing
Atl Edu
 
Day 2
Day 2Day 2
Day 2
sefreed
 
Phishing work
Phishing workPhishing work
Phishing work
AhmadThaqifAimanAhma
 
phishing technique.pptx
phishing technique.pptxphishing technique.pptx
phishing technique.pptx
ECE6054PRIYADHARSHIN
 
Phishing & Pharming Explained.pdf
Phishing & Pharming Explained.pdfPhishing & Pharming Explained.pdf
Phishing & Pharming Explained.pdf
Evs, Lahore
 
Exploring Phishing Attacks.pptx
Exploring Phishing Attacks.pptxExploring Phishing Attacks.pptx
Exploring Phishing Attacks.pptx
RatnaPrakash5
 
Introduction to phishing
Introduction to phishingIntroduction to phishing
Introduction to phishing
Raviteja Chowdary Adusumalli
 
Threaths and risks
Threaths and risksThreaths and risks
Threaths and risks
HHSome
 
Threaths and risks
Threaths and risksThreaths and risks
Threaths and risks
HHSome
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
JoshuaWisniewski3
 
Blue and White Minimal Professional Business Project Presentation .pptx
Blue and White Minimal Professional Business Project Presentation .pptxBlue and White Minimal Professional Business Project Presentation .pptx
Blue and White Minimal Professional Business Project Presentation .pptx
jennblair0830
 
Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017
Alexandru Turcu
 
Phis
PhisPhis
HACKING VS PHISHING.pptx
HACKING VS PHISHING.pptxHACKING VS PHISHING.pptx
HACKING VS PHISHING.pptx
Prince Morte
 
HACKING VS PHISHING.pptx
HACKING VS PHISHING.pptxHACKING VS PHISHING.pptx
HACKING VS PHISHING.pptx
Prince Morte
 

Similar to phishing.pptx (20)

Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptx
 
Phishing
PhishingPhishing
Phishing
 
Phishing and prevention
Phishing and preventionPhishing and prevention
Phishing and prevention
 
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awarenessOWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
 
Information security training Phishing
Information security training PhishingInformation security training Phishing
Information security training Phishing
 
Day 2
Day 2Day 2
Day 2
 
Phishing work
Phishing workPhishing work
Phishing work
 
phishing technique.pptx
phishing technique.pptxphishing technique.pptx
phishing technique.pptx
 
Phishing & Pharming Explained.pdf
Phishing & Pharming Explained.pdfPhishing & Pharming Explained.pdf
Phishing & Pharming Explained.pdf
 
Exploring Phishing Attacks.pptx
Exploring Phishing Attacks.pptxExploring Phishing Attacks.pptx
Exploring Phishing Attacks.pptx
 
Introduction to phishing
Introduction to phishingIntroduction to phishing
Introduction to phishing
 
Threaths and risks
Threaths and risksThreaths and risks
Threaths and risks
 
Threaths and risks
Threaths and risksThreaths and risks
Threaths and risks
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Blue and White Minimal Professional Business Project Presentation .pptx
Blue and White Minimal Professional Business Project Presentation .pptxBlue and White Minimal Professional Business Project Presentation .pptx
Blue and White Minimal Professional Business Project Presentation .pptx
 
Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017
 
Phis
PhisPhis
Phis
 
HACKING VS PHISHING.pptx
HACKING VS PHISHING.pptxHACKING VS PHISHING.pptx
HACKING VS PHISHING.pptx
 
HACKING VS PHISHING.pptx
HACKING VS PHISHING.pptxHACKING VS PHISHING.pptx
HACKING VS PHISHING.pptx
 

Recently uploaded

Carrer goals.pptx and their importance in real life
Carrer goals.pptx  and their importance in real lifeCarrer goals.pptx  and their importance in real life
Carrer goals.pptx and their importance in real life
artemacademy2
 
The Intersection between Competition and Data Privacy – CAPEL – June 2024 OEC...
The Intersection between Competition and Data Privacy – CAPEL – June 2024 OEC...The Intersection between Competition and Data Privacy – CAPEL – June 2024 OEC...
The Intersection between Competition and Data Privacy – CAPEL – June 2024 OEC...
OECD Directorate for Financial and Enterprise Affairs
 
原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
gpww3sf4
 
Pro-competitive Industrial Policy – OECD – June 2024 OECD discussion
Pro-competitive Industrial Policy – OECD – June 2024 OECD discussionPro-competitive Industrial Policy – OECD – June 2024 OECD discussion
Pro-competitive Industrial Policy – OECD – June 2024 OECD discussion
OECD Directorate for Financial and Enterprise Affairs
 
Pro-competitive Industrial Policy – LANE – June 2024 OECD discussion
Pro-competitive Industrial Policy – LANE – June 2024 OECD discussionPro-competitive Industrial Policy – LANE – June 2024 OECD discussion
Pro-competitive Industrial Policy – LANE – June 2024 OECD discussion
OECD Directorate for Financial and Enterprise Affairs
 
BRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdf
BRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdfBRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdf
BRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdf
Robin Haunschild
 
Gamify it until you make it Improving Agile Development and Operations with ...
Gamify it until you make it  Improving Agile Development and Operations with ...Gamify it until you make it  Improving Agile Development and Operations with ...
Gamify it until you make it Improving Agile Development and Operations with ...
Ben Linders
 
IEEE CIS Webinar Sustainable futures.pdf
IEEE CIS Webinar Sustainable futures.pdfIEEE CIS Webinar Sustainable futures.pdf
IEEE CIS Webinar Sustainable futures.pdf
Claudio Gallicchio
 
Artificial Intelligence, Data and Competition – SCHREPEL – June 2024 OECD dis...
Artificial Intelligence, Data and Competition – SCHREPEL – June 2024 OECD dis...Artificial Intelligence, Data and Competition – SCHREPEL – June 2024 OECD dis...
Artificial Intelligence, Data and Competition – SCHREPEL – June 2024 OECD dis...
OECD Directorate for Financial and Enterprise Affairs
 
Artificial Intelligence, Data and Competition – LIM – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – LIM – June 2024 OECD discussionArtificial Intelligence, Data and Competition – LIM – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – LIM – June 2024 OECD discussion
OECD Directorate for Financial and Enterprise Affairs
 
Proposal: The Ark Project and The BEEP Inc
Proposal: The Ark Project and The BEEP IncProposal: The Ark Project and The BEEP Inc
Proposal: The Ark Project and The BEEP Inc
Raheem Muhammad
 
Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...
Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...
Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...
OECD Directorate for Financial and Enterprise Affairs
 
The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...
The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...
The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...
OECD Directorate for Financial and Enterprise Affairs
 
The Intersection between Competition and Data Privacy – KEMP – June 2024 OECD...
The Intersection between Competition and Data Privacy – KEMP – June 2024 OECD...The Intersection between Competition and Data Privacy – KEMP – June 2024 OECD...
The Intersection between Competition and Data Privacy – KEMP – June 2024 OECD...
OECD Directorate for Financial and Enterprise Affairs
 
Why Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdf
Why Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdfWhy Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdf
Why Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdf
Ben Linders
 
Using-Presentation-Software-to-the-Fullf.pptx
Using-Presentation-Software-to-the-Fullf.pptxUsing-Presentation-Software-to-the-Fullf.pptx
Using-Presentation-Software-to-the-Fullf.pptx
kainatfatyma9
 
Disaster Management project for holidays homework and other uses
Disaster Management project for holidays homework and other usesDisaster Management project for holidays homework and other uses
Disaster Management project for holidays homework and other uses
RIDHIMAGARG21
 
Artificial Intelligence, Data and Competition – OECD – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – OECD – June 2024 OECD discussionArtificial Intelligence, Data and Competition – OECD – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – OECD – June 2024 OECD discussion
OECD Directorate for Financial and Enterprise Affairs
 
ServiceNow CIS-ITSM Exam Dumps & Questions [2024]
ServiceNow CIS-ITSM Exam Dumps & Questions [2024]ServiceNow CIS-ITSM Exam Dumps & Questions [2024]
ServiceNow CIS-ITSM Exam Dumps & Questions [2024]
SkillCertProExams
 
怎么办理(lincoln学位证书)英国林肯大学毕业证文凭学位证书原版一模一样
怎么办理(lincoln学位证书)英国林肯大学毕业证文凭学位证书原版一模一样怎么办理(lincoln学位证书)英国林肯大学毕业证文凭学位证书原版一模一样
怎么办理(lincoln学位证书)英国林肯大学毕业证文凭学位证书原版一模一样
kekzed
 

Recently uploaded (20)

Carrer goals.pptx and their importance in real life
Carrer goals.pptx  and their importance in real lifeCarrer goals.pptx  and their importance in real life
Carrer goals.pptx and their importance in real life
 
The Intersection between Competition and Data Privacy – CAPEL – June 2024 OEC...
The Intersection between Competition and Data Privacy – CAPEL – June 2024 OEC...The Intersection between Competition and Data Privacy – CAPEL – June 2024 OEC...
The Intersection between Competition and Data Privacy – CAPEL – June 2024 OEC...
 
原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
 
Pro-competitive Industrial Policy – OECD – June 2024 OECD discussion
Pro-competitive Industrial Policy – OECD – June 2024 OECD discussionPro-competitive Industrial Policy – OECD – June 2024 OECD discussion
Pro-competitive Industrial Policy – OECD – June 2024 OECD discussion
 
Pro-competitive Industrial Policy – LANE – June 2024 OECD discussion
Pro-competitive Industrial Policy – LANE – June 2024 OECD discussionPro-competitive Industrial Policy – LANE – June 2024 OECD discussion
Pro-competitive Industrial Policy – LANE – June 2024 OECD discussion
 
BRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdf
BRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdfBRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdf
BRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdf
 
Gamify it until you make it Improving Agile Development and Operations with ...
Gamify it until you make it  Improving Agile Development and Operations with ...Gamify it until you make it  Improving Agile Development and Operations with ...
Gamify it until you make it Improving Agile Development and Operations with ...
 
IEEE CIS Webinar Sustainable futures.pdf
IEEE CIS Webinar Sustainable futures.pdfIEEE CIS Webinar Sustainable futures.pdf
IEEE CIS Webinar Sustainable futures.pdf
 
Artificial Intelligence, Data and Competition – SCHREPEL – June 2024 OECD dis...
Artificial Intelligence, Data and Competition – SCHREPEL – June 2024 OECD dis...Artificial Intelligence, Data and Competition – SCHREPEL – June 2024 OECD dis...
Artificial Intelligence, Data and Competition – SCHREPEL – June 2024 OECD dis...
 
Artificial Intelligence, Data and Competition – LIM – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – LIM – June 2024 OECD discussionArtificial Intelligence, Data and Competition – LIM – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – LIM – June 2024 OECD discussion
 
Proposal: The Ark Project and The BEEP Inc
Proposal: The Ark Project and The BEEP IncProposal: The Ark Project and The BEEP Inc
Proposal: The Ark Project and The BEEP Inc
 
Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...
Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...
Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...
 
The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...
The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...
The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...
 
The Intersection between Competition and Data Privacy – KEMP – June 2024 OECD...
The Intersection between Competition and Data Privacy – KEMP – June 2024 OECD...The Intersection between Competition and Data Privacy – KEMP – June 2024 OECD...
The Intersection between Competition and Data Privacy – KEMP – June 2024 OECD...
 
Why Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdf
Why Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdfWhy Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdf
Why Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdf
 
Using-Presentation-Software-to-the-Fullf.pptx
Using-Presentation-Software-to-the-Fullf.pptxUsing-Presentation-Software-to-the-Fullf.pptx
Using-Presentation-Software-to-the-Fullf.pptx
 
Disaster Management project for holidays homework and other uses
Disaster Management project for holidays homework and other usesDisaster Management project for holidays homework and other uses
Disaster Management project for holidays homework and other uses
 
Artificial Intelligence, Data and Competition – OECD – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – OECD – June 2024 OECD discussionArtificial Intelligence, Data and Competition – OECD – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – OECD – June 2024 OECD discussion
 
ServiceNow CIS-ITSM Exam Dumps & Questions [2024]
ServiceNow CIS-ITSM Exam Dumps & Questions [2024]ServiceNow CIS-ITSM Exam Dumps & Questions [2024]
ServiceNow CIS-ITSM Exam Dumps & Questions [2024]
 
怎么办理(lincoln学位证书)英国林肯大学毕业证文凭学位证书原版一模一样
怎么办理(lincoln学位证书)英国林肯大学毕业证文凭学位证书原版一模一样怎么办理(lincoln学位证书)英国林肯大学毕业证文凭学位证书原版一模一样
怎么办理(lincoln学位证书)英国林肯大学毕业证文凭学位证书原版一模一样
 

phishing.pptx

  • 2. PHISHING • In computing, phishing is a form of social engineering. • It is characterized by attempts to fraudulently acquire sensitive information, such as passwords and credit card details, by masquerading as a trustworthy person or business in an apparently official electronic communication, such as an e-mail or an instant message.
  • 3. SOCIAL ENGINEERING • It is the psychological manipulation of people into performing actions or divulging confidential information • A type of confidence trick for the purpose of information gathering fraud or system access
  • 4. TYPES OF PHISHING ATTACKS • Deceptive phishing or Email phishing • Clone phishing • Voice, SMS and calendar phishing • Spear Phishing • Whaling • Pharming
  • 5. DECEPTIVE PHISHING • Deceptive phishing or also known as email phishing is the most common type of phishing. • In this case, an attacker attempts to obtain confidential information from the victims. • Attackers use the information to steal money or to launch other attacks. • A fake email from a bank asking you to click a link and verify your account details is an example of deceptive phishing.
  • 6. SPEAR PHISHING • Spear phishing targets specific individuals instead of a wide group of people. • Attackers often research their victims on social media and other sites. • That way, they can customize their communications and appear more authentic. • Spear phishing is often the first step used to penetrate a company’s defenses and carry out a targeted attack.
  • 7. WHALING • Whaling also known as CEO fraud • When attackers go after a “big fish” like a CEO, it’s called whaling. • These attackers often spend considerable time profiling the target to find the opportune moment and means of stealing login credentials. • Whaling is of particular concern because high-level executives are able to access a great deal of company information.
  • 8. PHARMING • Pharming also called page hijacking is similar to phishing, pharming sends users to a fraudulent website that appears to be legitimate. • However, in this case, victims do not even have to click a malicious link to be taken to the fake site. • Attackers can infect either the user’s computer or the website’s DNS server and redirect the user to a fake site even if the correct URL is typed in.
  • 9. CLONE PHISHING • Clone phishing is a type of attack where a legitimate email with an attachment or link is copied and modified to contain malicious content. • The modified email is then sent from a fake address made to look like it's from the original sender.
  • 10. VOICE, SMS AND CALENDAR PHISHING • Voice phishing or vishing is a type of attack done through phone calls, the attackers spoof the calling phone number to appear as if it is coming from a legitimate bank or institution • Vishing takes advantage of the public's lower awareness and trust in voice telephony compared to email phishing. • SMS phishingor smishing is a type of phishing attack that uses text messages from a cell phone or smartphone to deliver a bait message. • The victim is usually asked to click a link, call a phone number, or contact an email address provided by the attacker. • Calendar phishing involves sending fake calendar invitations with phishing links. • These invitations often mimic common event requests and can easily be added to calendars automatically
  • 11. SIGNS OF A PHISHING • It may contain unfamiliar tones or greetings • Grammar and spelling mistakes • Inconsistencies in Email addresses, links and domain names • Threats or a sense of urgency • Suspicious attachments • Request for credentials payment information or other personal details
  • 12. WAYS TO PREVENT PHISHING ATTACKS • Proper awareness about phishing • Don’t click on the suspicious attachments and links • Don’t give information to unsecured sites • Get free anti- phishing add on • Rotate passwords regularly • Update your system regularly • Install firewalls • Don’t be tempted by site pop-ups • Have a security platform to spot signs of attack