SlideShare a Scribd company logo
PHISHING A THREAT TO
NETWORK SECURITY
1
OUTLINE……
Introduction
What Is Phishing??
What Kind Of Information
Do The Hackers Want?
How Phishing Is Done?
Techniques Of Phishing
Prevention
Conclusion
2
INTRODUCTION
Origin of word “Phishing” from two words –
‘Password’ & ‘Harvesting’.
3
 There are a number of different phishing
techniques used to obtain personal information
from users.
 As technology becomes more advanced, the
phishing techniques being used are also more
advanced.
 To prevent Internet phishing, users should
have knowledge of various types of phishing
techniques and we should also be aware of
anti-phishing techniques to protect ourselves
from getting phished.
4
PHISHING
 Phishing is a type of deception designed to
steal your valuable personal data, such as
credit card numbers, passwords, account data,
or other information.
5
 Your name, address and
date of birth
 Social Security number
 Driver’s License number
 Credit Card numbers
 ATM cards
 Telephone calling cards
6
SECTORS WHICH PHISHING IS DONE 7
8HOW PHISHING IS DONE ??
http://fbaction.net/
9
10
11
12
Difference between https and http
If You are using Hypertext Transfer Protocol
Secure (HTTPS) Instead of Hypertext Transfer
Protocol (HTTP), then your website is safe and no one
can steal your information.
If No, Then The website You are working with is
not safe….!
• To verify the website you are connecting to is the
genuine website.
• To ensure the privacy of your data during transit.
• To ensure the integrity of your data during transit.
Why do we use TLS or SSL? 13
 Using https, the computers agree
on a “code”
This “code” is running in TLS or
SSL so that no one can steal Your
personal Information.
14Why https is safe?
TYPES OF PHISHING
 Clone phishing
 Spear phishing
 Whaling phishing
15
Clone Phishing
16
Content of original mail (including link) copied
to create duplicate email. But the link may be
replaced with phishers fake or harmful links.
Spear Phishing
Phishing attempts directed at specific
individuals or companies have been termed
Spear Phishing.
Whaling Phishing
Phishing attacks have been directed specifically
at senior executives and other high profile
targets within businesses is known as Whaling
Phishing.
Phishing
Link
manipul
-ation
Key
loggers
Session
hacking
Phone
phishing
17
Link manipulation
18
1)Link manipulation
Link manipulation is the technique
in which the phisher sends fake link
to A website that is usually visited
by the victim or the user.
Two Types Of Fake Links.
Link Which Redirected to Phishers
website.
Malware Links.
19
20
Link Which Redirected to Phishers
website.
Malware Links. 21
22
23
Example
24
HOW TO PREVENT?
 One of the anti-phishing techniques used to prevent
link manipulation is to move the mouse over the link
to view the actual address.
 To check the http”s” connection in address bar ,
meaning its a secure connection.
25
KEY LOGGERS
26
WHY KEYLOGGERS ARE A THREAT?
 key loggers doesn't make any threat to the
system itself
 A key logger is a type of software can record
instant messages, e-mail, and any information
you type at any time using your keyboard.
 As a result, cyber criminals can get PIN codes
and account numbers for e-payment systems,
passwords to online gaming accounts, email
addresses, user names, email passwords etc.
27
HOW TO DETECT AND PREVENT??
 Make entries through the virtual keyboard.
 install an antivirus product and keep its database up to
date.
 Use anti-spyware software's.
28
29SESSION HIJACKING
•Session Hijacking (a.k.a. Session Side jacking) is a form
of Man In The Middle (MITM) attack.
• In which a malicious attacker has access to the transport
layer and can eavesdrop on communications.
•When communications are not protected they can steal
the unique session ID and imitate the victim on the
target site.
•This grants the attacker access to your account and data.
SESSION HIJACKING 30
Example…! 31
Steps in Session Hijacking
1. Place yourself between the victim and the target .
2. Monitor the flow of packets
3. Predict the sequence number
4. Kill the connection to the victim’s machine
5. Take over the session
6. Start injecting packets to the target server
32
Prevention of session hijacking
1.Encription and connectivity.
2.Use anti-virus software.
PHONE
PHISHING
33
Phone phishing
 Mobile Phishing is a social engineering
technique where the attack is invited via mobile
texting rather than email.
 Using Fake Calls and will say to dial something.
 Using fake SMS.
34
Examples of phone phishing 35
So be careful
when you
use Mobile
banking and
all..!
36
Email Spoofing
 Email Trap By Using Fake Email Address.
 This is the trick
Used by spammers.
37
Defensive tips against email spoofing
 Firstly check the salutation
 Take care of grammar
mistakes
 Must check the links in email
 Claiming that an email has
come from reliable source
 Forward spoofed emails to
FTC (Federal Trade
Commission)
38
Prevention Against Phishing Attack
39
1.Never respond to emails that request
personal financial information 40
2.Visit bank’s websites by typing the
URL into the address bar
41
3.Keep a regular check on your
Accounts and Credit cards. 42
4.Be cautious with emails and personal data .
43
5.Keep your computer secure
6.Use anti-spam
software
447.Use anti-
spyware software
8. Use Firewall.
9. Check the website you are
visiting is secure.
10. Always report suspicious
activity
45
11. GET EDUCATED ABOUT
PHISHING PREVENTION ATTACK
“It is better to be safer now, than feel sorry later”
46
47

More Related Content

What's hot

Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniques
Sushil Kumar
 
Anti phishing presentation
Anti phishing presentationAnti phishing presentation
Anti phishing presentation
BokangMalunga
 
Phishing
PhishingPhishing
Phishing
PhishingPhishing
Phishing
anjalika sinha
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing Attacks
Jagan Mohan
 
Phishing
PhishingPhishing
Phishing
Sagar Rai
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
bensonoo
 
Phishing awareness
Phishing awarenessPhishing awareness
Phishing awareness
PhishingBox
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
Sachin Saini
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
ControlScan, Inc.
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threat
sourav newatia
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
Nikolaos Georgitsopoulos
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
shindept123
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
Jen Ruhman
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation
AniketPandit18
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human Behavior
James Krusic
 
Social engineering
Social engineeringSocial engineering
Social engineering
Robert Hood
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark World
Avishek Datta
 
Social engineering
Social engineering Social engineering
Social engineering
Abdelhamid Limami
 

What's hot (20)

Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniques
 
Anti phishing presentation
Anti phishing presentationAnti phishing presentation
Anti phishing presentation
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing Attacks
 
Phishing
PhishingPhishing
Phishing
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Phishing awareness
Phishing awarenessPhishing awareness
Phishing awareness
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threat
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human Behavior
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark World
 
Phising
PhisingPhising
Phising
 
Social engineering
Social engineering Social engineering
Social engineering
 

Viewers also liked

Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber SecurityAnand Kater
 
Let's legalize Gambling in India
Let's legalize Gambling in IndiaLet's legalize Gambling in India
Let's legalize Gambling in IndiaAlankar Das
 
phising netiqueta
phising netiquetaphising netiqueta
phising netiqueta
ticteresabravo
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
Simon Salter
 
Forms in nature.upload to slideshare
Forms in nature.upload to slideshareForms in nature.upload to slideshare
Forms in nature.upload to slideshareclarizadave
 
Social Action and Art Education: A Curriculum for Change
Social Action and Art Education: A Curriculum for ChangeSocial Action and Art Education: A Curriculum for Change
Social Action and Art Education: A Curriculum for Changepiqahamin
 
Pitstop - One stop solution to resource management
Pitstop - One stop solution to resource managementPitstop - One stop solution to resource management
Pitstop - One stop solution to resource management
Anushree Prasanna Kumar
 
Article review
Article reviewArticle review
Article reviewpiqahamin
 
公器不私用 - 企业实时通讯新世代 (先作科技有限公司 谢权华先生)
公器不私用 - 企业实时通讯新世代 (先作科技有限公司 谢权华先生)公器不私用 - 企业实时通讯新世代 (先作科技有限公司 谢权华先生)
公器不私用 - 企业实时通讯新世代 (先作科技有限公司 谢权华先生)
ITSolutionDirectory
 
Consuntivo 2014 dell'economia regionale
Consuntivo 2014 dell'economia regionaleConsuntivo 2014 dell'economia regionale
Consuntivo 2014 dell'economia regionale
Unione regionale Camere commercio Emilia-Romagna
 
Tcpo2 electrode maintenance
Tcpo2 electrode maintenance Tcpo2 electrode maintenance
Tcpo2 electrode maintenance
Perimed
 
Gave Dingen Doen (GDD) Breda - Pitch Vincent over VoxVote
Gave Dingen Doen (GDD) Breda - Pitch Vincent over VoxVoteGave Dingen Doen (GDD) Breda - Pitch Vincent over VoxVote
Gave Dingen Doen (GDD) Breda - Pitch Vincent over VoxVote
eBay for Business
 
Using art in pre-registration nurse education
Using art in pre-registration nurse educationUsing art in pre-registration nurse education
Using art in pre-registration nurse educationpiqahamin
 
Le Camere dell'Economia - Da quarant'anni in rete per lo sviluppo
Le Camere dell'Economia - Da quarant'anni in rete per lo sviluppoLe Camere dell'Economia - Da quarant'anni in rete per lo sviluppo
Le Camere dell'Economia - Da quarant'anni in rete per lo sviluppo
Unione regionale Camere commercio Emilia-Romagna
 
CALMing the High Cost of Educational Resources: How CSUSM is Creating Alterna...
CALMing the High Cost of Educational Resources: How CSUSM is Creating Alterna...CALMing the High Cost of Educational Resources: How CSUSM is Creating Alterna...
CALMing the High Cost of Educational Resources: How CSUSM is Creating Alterna...
Carmen Mitchell
 
Reconceptualizing the Role of Creativity in Art Education Theory and Practice
Reconceptualizing the Role of Creativity in Art Education Theory and PracticeReconceptualizing the Role of Creativity in Art Education Theory and Practice
Reconceptualizing the Role of Creativity in Art Education Theory and Practicepiqahamin
 

Viewers also liked (19)

Cyber security
Cyber securityCyber security
Cyber security
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
 
Let's legalize Gambling in India
Let's legalize Gambling in IndiaLet's legalize Gambling in India
Let's legalize Gambling in India
 
phising netiqueta
phising netiquetaphising netiqueta
phising netiqueta
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Social Analytics
Social AnalyticsSocial Analytics
Social Analytics
 
Forms in nature.upload to slideshare
Forms in nature.upload to slideshareForms in nature.upload to slideshare
Forms in nature.upload to slideshare
 
Araling Panlipunan
Araling PanlipunanAraling Panlipunan
Araling Panlipunan
 
Social Action and Art Education: A Curriculum for Change
Social Action and Art Education: A Curriculum for ChangeSocial Action and Art Education: A Curriculum for Change
Social Action and Art Education: A Curriculum for Change
 
Pitstop - One stop solution to resource management
Pitstop - One stop solution to resource managementPitstop - One stop solution to resource management
Pitstop - One stop solution to resource management
 
Article review
Article reviewArticle review
Article review
 
公器不私用 - 企业实时通讯新世代 (先作科技有限公司 谢权华先生)
公器不私用 - 企业实时通讯新世代 (先作科技有限公司 谢权华先生)公器不私用 - 企业实时通讯新世代 (先作科技有限公司 谢权华先生)
公器不私用 - 企业实时通讯新世代 (先作科技有限公司 谢权华先生)
 
Consuntivo 2014 dell'economia regionale
Consuntivo 2014 dell'economia regionaleConsuntivo 2014 dell'economia regionale
Consuntivo 2014 dell'economia regionale
 
Tcpo2 electrode maintenance
Tcpo2 electrode maintenance Tcpo2 electrode maintenance
Tcpo2 electrode maintenance
 
Gave Dingen Doen (GDD) Breda - Pitch Vincent over VoxVote
Gave Dingen Doen (GDD) Breda - Pitch Vincent over VoxVoteGave Dingen Doen (GDD) Breda - Pitch Vincent over VoxVote
Gave Dingen Doen (GDD) Breda - Pitch Vincent over VoxVote
 
Using art in pre-registration nurse education
Using art in pre-registration nurse educationUsing art in pre-registration nurse education
Using art in pre-registration nurse education
 
Le Camere dell'Economia - Da quarant'anni in rete per lo sviluppo
Le Camere dell'Economia - Da quarant'anni in rete per lo sviluppoLe Camere dell'Economia - Da quarant'anni in rete per lo sviluppo
Le Camere dell'Economia - Da quarant'anni in rete per lo sviluppo
 
CALMing the High Cost of Educational Resources: How CSUSM is Creating Alterna...
CALMing the High Cost of Educational Resources: How CSUSM is Creating Alterna...CALMing the High Cost of Educational Resources: How CSUSM is Creating Alterna...
CALMing the High Cost of Educational Resources: How CSUSM is Creating Alterna...
 
Reconceptualizing the Role of Creativity in Art Education Theory and Practice
Reconceptualizing the Role of Creativity in Art Education Theory and PracticeReconceptualizing the Role of Creativity in Art Education Theory and Practice
Reconceptualizing the Role of Creativity in Art Education Theory and Practice
 

Similar to Phising a Threat to Network Security

Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
shindept123
 
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2Conf
 
Cyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptxCyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptx
jenanityanand4
 
E Mail Phishing Prevention and Detection
E Mail Phishing Prevention and DetectionE Mail Phishing Prevention and Detection
E Mail Phishing Prevention and Detection
ijtsrd
 
phishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptxphishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptx
ErrorError22
 
December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10
seadeloitte
 
Web spoofing hacking
Web spoofing hackingWeb spoofing hacking
Web spoofing hackingjignesh khunt
 
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awarenessOWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
MaherHamza9
 
Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Prevention
sonalikharade3
 
Phishing technique tanish khilani
Phishing technique tanish  khilani Phishing technique tanish  khilani
Phishing technique tanish khilani
Tanish Khilani
 
Phishing.pdf
Phishing.pdfPhishing.pdf
Phishing.pdf
MariGogokhia
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
IRJET Journal
 
Phishing and hacking
Phishing and hackingPhishing and hacking
Phishing and hacking
Md. Mehadi Hassan Bappy
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
Aswani34
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
Ankita Shirke
 
Phishing & Pharming Explained.pdf
Phishing & Pharming Explained.pdfPhishing & Pharming Explained.pdf
Phishing & Pharming Explained.pdf
Evs, Lahore
 

Similar to Phising a Threat to Network Security (20)

Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Cyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptxCyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptx
 
E Mail Phishing Prevention and Detection
E Mail Phishing Prevention and DetectionE Mail Phishing Prevention and Detection
E Mail Phishing Prevention and Detection
 
phishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptxphishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptx
 
December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10
 
Pp8
Pp8Pp8
Pp8
 
Web spoofing hacking
Web spoofing hackingWeb spoofing hacking
Web spoofing hacking
 
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awarenessOWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
 
Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Prevention
 
Phishing technique tanish khilani
Phishing technique tanish  khilani Phishing technique tanish  khilani
Phishing technique tanish khilani
 
Phishing.pdf
Phishing.pdfPhishing.pdf
Phishing.pdf
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
 
Phishing and hacking
Phishing and hackingPhishing and hacking
Phishing and hacking
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
 
Phishing & Pharming Explained.pdf
Phishing & Pharming Explained.pdfPhishing & Pharming Explained.pdf
Phishing & Pharming Explained.pdf
 

Recently uploaded

Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 

Recently uploaded (20)

Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 

Phising a Threat to Network Security

  • 1. PHISHING A THREAT TO NETWORK SECURITY 1
  • 2. OUTLINE…… Introduction What Is Phishing?? What Kind Of Information Do The Hackers Want? How Phishing Is Done? Techniques Of Phishing Prevention Conclusion 2
  • 3. INTRODUCTION Origin of word “Phishing” from two words – ‘Password’ & ‘Harvesting’. 3
  • 4.  There are a number of different phishing techniques used to obtain personal information from users.  As technology becomes more advanced, the phishing techniques being used are also more advanced.  To prevent Internet phishing, users should have knowledge of various types of phishing techniques and we should also be aware of anti-phishing techniques to protect ourselves from getting phished. 4
  • 5. PHISHING  Phishing is a type of deception designed to steal your valuable personal data, such as credit card numbers, passwords, account data, or other information. 5
  • 6.  Your name, address and date of birth  Social Security number  Driver’s License number  Credit Card numbers  ATM cards  Telephone calling cards 6
  • 10. 10
  • 11. 11
  • 12. 12 Difference between https and http If You are using Hypertext Transfer Protocol Secure (HTTPS) Instead of Hypertext Transfer Protocol (HTTP), then your website is safe and no one can steal your information. If No, Then The website You are working with is not safe….!
  • 13. • To verify the website you are connecting to is the genuine website. • To ensure the privacy of your data during transit. • To ensure the integrity of your data during transit. Why do we use TLS or SSL? 13
  • 14.  Using https, the computers agree on a “code” This “code” is running in TLS or SSL so that no one can steal Your personal Information. 14Why https is safe?
  • 15. TYPES OF PHISHING  Clone phishing  Spear phishing  Whaling phishing 15
  • 16. Clone Phishing 16 Content of original mail (including link) copied to create duplicate email. But the link may be replaced with phishers fake or harmful links. Spear Phishing Phishing attempts directed at specific individuals or companies have been termed Spear Phishing. Whaling Phishing Phishing attacks have been directed specifically at senior executives and other high profile targets within businesses is known as Whaling Phishing.
  • 19. 1)Link manipulation Link manipulation is the technique in which the phisher sends fake link to A website that is usually visited by the victim or the user. Two Types Of Fake Links. Link Which Redirected to Phishers website. Malware Links. 19
  • 20. 20 Link Which Redirected to Phishers website.
  • 22. 22
  • 24. 24
  • 25. HOW TO PREVENT?  One of the anti-phishing techniques used to prevent link manipulation is to move the mouse over the link to view the actual address.  To check the http”s” connection in address bar , meaning its a secure connection. 25
  • 27. WHY KEYLOGGERS ARE A THREAT?  key loggers doesn't make any threat to the system itself  A key logger is a type of software can record instant messages, e-mail, and any information you type at any time using your keyboard.  As a result, cyber criminals can get PIN codes and account numbers for e-payment systems, passwords to online gaming accounts, email addresses, user names, email passwords etc. 27
  • 28. HOW TO DETECT AND PREVENT??  Make entries through the virtual keyboard.  install an antivirus product and keep its database up to date.  Use anti-spyware software's. 28
  • 30. •Session Hijacking (a.k.a. Session Side jacking) is a form of Man In The Middle (MITM) attack. • In which a malicious attacker has access to the transport layer and can eavesdrop on communications. •When communications are not protected they can steal the unique session ID and imitate the victim on the target site. •This grants the attacker access to your account and data. SESSION HIJACKING 30
  • 32. Steps in Session Hijacking 1. Place yourself between the victim and the target . 2. Monitor the flow of packets 3. Predict the sequence number 4. Kill the connection to the victim’s machine 5. Take over the session 6. Start injecting packets to the target server 32 Prevention of session hijacking 1.Encription and connectivity. 2.Use anti-virus software.
  • 34. Phone phishing  Mobile Phishing is a social engineering technique where the attack is invited via mobile texting rather than email.  Using Fake Calls and will say to dial something.  Using fake SMS. 34
  • 35. Examples of phone phishing 35
  • 36. So be careful when you use Mobile banking and all..! 36
  • 37. Email Spoofing  Email Trap By Using Fake Email Address.  This is the trick Used by spammers. 37
  • 38. Defensive tips against email spoofing  Firstly check the salutation  Take care of grammar mistakes  Must check the links in email  Claiming that an email has come from reliable source  Forward spoofed emails to FTC (Federal Trade Commission) 38
  • 40. 1.Never respond to emails that request personal financial information 40
  • 41. 2.Visit bank’s websites by typing the URL into the address bar 41
  • 42. 3.Keep a regular check on your Accounts and Credit cards. 42
  • 43. 4.Be cautious with emails and personal data . 43 5.Keep your computer secure
  • 45. 8. Use Firewall. 9. Check the website you are visiting is secure. 10. Always report suspicious activity 45
  • 46. 11. GET EDUCATED ABOUT PHISHING PREVENTION ATTACK “It is better to be safer now, than feel sorry later” 46
  • 47. 47