SlideShare a Scribd company logo
Narendra Singh
Information Technology
Roll no. 029 (09EARIT032)
6/18/2013 1
Phishing: A Simple way to make fool
• It is the act of tricking someone into giving confidential
information (like passwords and credit card information)
on a fake web page or email form pretending to come
from a legitimate company (like their bank).
• The word „Phishing‟ initially emerged in 1990s. The early
hackers often use „ph‟ to replace „f‟ to produce new words
in
the hacker‟s community, since they usually hack by
phones.
6/18/2013 2
• A message is sent from the
Phishers to the user.
• A user provides confidential
information to a Phishing
server.
• The Phishers obtains the
confidential information from
the server.
• The confidential information
is used to impersonate the
user.
• The Phishers obtains illicit
monetary gain.
6/18/2013 3
• Link Manipulation
• Website Forgery
• Spam
• Key Logger
• Session Hacking
• Phishing through Search Engines
• Phone Phishing
6/18/2013 4
• Rs. 13 lakh imposed on ICICI Bank for phishing scam
ICICI Bank has been fined with Rs. 12.85 lakh on account of a phishing fraud.
This has been the first case filed under the Information Technology Act. Tamil
Nadu IT secretary directed ICICI Bank to pay Rs 12.85 lakh to an Abu Dhabi-
based NRI(Umashankar Sivasubramaniam) within 60 days for the loss
suffered by him due to a phishing fraud.
The petition was filed by Umashankar Sivasubramaniam, who had received
a mail in September 2007 from the bank which asked him to provide his
username and password or his account would be closed. After the reply to this
mail he witnessed a transfer of Rs 6.46 lakh from his account to that of a
company which withdrew Rs 4.6 lakh from an ICICI branch in Mumbai and
retained the balance in its account. ICICI defends itself saying that it is the
responsibility of the customer to be conscious while giving out any kind of
personal information on the web. Internet banking needs to be done very
carefully after full scrutiny by the customer. Internet banking is not a risky
proposition if the customer is conscious enough.
6/18/2013 5
Dec 2011, BANGALORE
Six months ago, Asha , a consultant for NGOs, got a rude
shock. Her husband received an e-mail from her, stating she
was in a financial crisis and needed help. A bank account
number was also provided. She couldn't log into either of her
e-mail accounts.
Her accounts had been hacked . By afternoon, the couple
was flooded with calls of concern. Some persons even
deposited
money in the account number mentioned. This is the now-
increasingly common modus operandi of cyber criminals.
6/18/2013 6
How accounts are hacked?
First, the cyber criminals send a phishing mail that looks
like an alert from the service provider. Once the account
holder replies, the hacker gets all the details he needs to
compromise the account and change the password.
What they do after that?
After the account is hacked, the phishers simply browse the
contacts list and send a common mail. They either say they
are stuck in a far-off place without cash or have plunged in a
deep financial crisis. They seek assistance from the
recipients. Though most persons call up and check, some in
a hurry deposit cash in the account mentioned. This is
withdrawn by the hacker
6/18/2013 7
How to retrieve the account?
Most service providers ask for an alternative e-mail ID
before opening an account. The account owner can log
onto this, go to `abuse' and lodge a complaint about the
hack. Account is usually restored within 24 hours.
What was the actions taken against them?
They got punishment of 2year Jail under the act of IPC
420.
6/18/2013 8
Recently, the users of the Google email services,
“Gmail” purportedly received a legal notice from the Gmail
team which wanted users to refurbish their account name,
password, occupation, birth date and country of residence
with a warning that users who did not update their details
within 7 days of receiving the warning would lose their
account permanently. However, the spokesperson of the
Google denied any such legal notice coming from them and
stated it to be a phishing attack designed to collect personal
information, called „spoofing‟ or „password phishing‟.
6/18/2013 9
6/18/2013 10
6/18/2013 11
• Penalty for damage to computer, computer system, etc.- If
any person without permission of the owner or any other
person who is incharge of a computer, computer system
or computer network,- accesses or secures access to
such computer, computer system or computer network ,
downloads, copies or extracts any data, computer data
base or information from such computer, computer system
or computer network including information or data held or
stored in any removable storage medium.
• damages or causes to be damaged any computer,
computer system or computer network, data, computer
data base or any other programmes residing in such
computer, computer system or computer network;
6/18/2013 12
• Section 66A of the IT Act is a relevant section which
penalizes „sending false and offensive messages through
communication services‟.
• Explanation — For the purpose of this section, terms
“electronic mail” and “electronic mail message” means a
message or information created or transmitted or received
on a computer, computer system, computer resource or
communication device including attachments in text,
images, audio, video and any other electronic record,
which may be transmitted with the message.
6/18/2013 13
• Any person who sends, by means of a computer resource
or a communication device :
a) any information that is grossly offensive or has menacing
character
b) any information which he knows to be false, but for the
purpose of causing annoyance, inconvenience, danger,
obstruction, insult, injury, criminal intimidation, enmity,
hatred or ill will, persistently by making use of such
computer resource or a communication device
• Punishment - Imprisonment for a term which may extend
to three years and with fine.
6/18/2013 14
• Trust Of Authority
• E-mail and webpages can look real
• Use of the same top level domain
• Use of the simplest and least confusing host name
• Misleading e-mails
• No check of source address
• Non-availability of secure desktop tools
• Lack of user awareness
6/18/2013 15
• We should use Security Implications both long and short
term.
• Apply phishing filter in your browser setting.
• Delete all emails and SMS from any stranger luring you
with billion dollar lottery prize, jobs in UK and huge wealth
• Delete all emails/SMS/Phone calls that ask for your
personal information such as user name , passwords ,
Pin, credit codes.
• Delete all spam mail as they contain either virus or
spyware enable spam filters in your mail boxes
• Self awareness is the biggest tool against any kind of
cyber crime.
• www.rupeetimes.com/news/car_loans/fine_worth_rs_13_l
akh_imposed_on_icici_bank_for_phishing_scam_3472.ht
ml
• http://www.esecurityplanet.com/views/article.php/3875866/
Top-Ten-Phishing-Facts.htm
• Jaishankar, K. (2004). ―International perspectives on
crime and justice‖ p. 541-556.
• Bocjj P. (2006). ―The dark side of the Internet: protecting
yourself and your family from online criminals.‖ 2nd ed,
green wood publishing group, pp. 159-161.
• http://articles.timesofindia.indiatimes.com/2009-01-
17/bangalore/28031198_1_e-mail-accounts-cyber-
criminals-cyber-crime
6/18/2013 17
6/18/2013 18

More Related Content

What's hot

Phishing
PhishingPhishing
Phishing
shivli0769
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
harpinderkaur123
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
chiewmingli
 
Phishing
PhishingPhishing
Phishing
Esraa Yaseen
 
Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharks
Nalneesh Gaur
 
Phishing
PhishingPhishing
Phishing
Archit Mohanty
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
Preeti Papneja
 
Strategies to handle Phishing attacks
Strategies to handle Phishing attacksStrategies to handle Phishing attacks
Strategies to handle Phishing attacks
Sreejith.D. Menon
 
Introduction to phishing
Introduction to phishingIntroduction to phishing
Introduction to phishing
Raviteja Chowdary Adusumalli
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark World
Avishek Datta
 
Phishing
PhishingPhishing
Phishing
Kiran Patil
 
Phishing
PhishingPhishing
Phishing
Sagar Rai
 
Phishing and hacking
Phishing and hackingPhishing and hacking
Phishing and hacking
Md. Mehadi Hassan Bappy
 
Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniques
Sushil Kumar
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
temi
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
bensonoo
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
Sachin Saini
 
What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?
Quick Heal Technologies Ltd.
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
Aryan Ragu
 
Phishing
PhishingPhishing
Phishing
Arpit Patel
 

What's hot (20)

Phishing
PhishingPhishing
Phishing
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Phishing
PhishingPhishing
Phishing
 
Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharks
 
Phishing
PhishingPhishing
Phishing
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Strategies to handle Phishing attacks
Strategies to handle Phishing attacksStrategies to handle Phishing attacks
Strategies to handle Phishing attacks
 
Introduction to phishing
Introduction to phishingIntroduction to phishing
Introduction to phishing
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark World
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
Phishing and hacking
Phishing and hackingPhishing and hacking
Phishing and hacking
 
Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniques
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
Phishing
PhishingPhishing
Phishing
 

Similar to Seminaar Report of Phishing VIII Sem

Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
Kandarp Shah
 
Cyber.ppt
Cyber.pptCyber.ppt
CYBER CRIMES AND IT ACT.pptx
CYBER CRIMES AND IT ACT.pptxCYBER CRIMES AND IT ACT.pptx
CYBER CRIMES AND IT ACT.pptx
HetaDesai13
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Deepak Shrivastava
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
Aman Bhargava
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
Aalbert Albert
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
Anusha Kadayyanmath
 
2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx
Sanil Shrivastava
 
Cyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptxCyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptx
SahilMishra81
 
Cyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptxCyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptx
SahilMishra81
 
Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime ppt
Asish Verma
 
18 computers and the law
18   computers and the law18   computers and the law
18 computers and the law
Khan Yousafzai
 
PHISHING attack
PHISHING attack PHISHING attack
PHISHING attack
Shubh Thakkar
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
santosh26kumar2003
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
Yogesh Lolge
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
Rubi Orbeta
 
Cyber Safety ppt.pptx
Cyber Safety ppt.pptxCyber Safety ppt.pptx
Cyber Safety ppt.pptx
CGC Technical campus,Mohali
 
Webinar: How to avoid the 12 Scams of Christmas
Webinar: How to avoid the 12 Scams of ChristmasWebinar: How to avoid the 12 Scams of Christmas
Webinar: How to avoid the 12 Scams of Christmas
AbilityNet
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptx
PrinceKumar851167
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
Dr. Arun Verma
 

Similar to Seminaar Report of Phishing VIII Sem (20)

Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
Cyber.ppt
Cyber.pptCyber.ppt
Cyber.ppt
 
CYBER CRIMES AND IT ACT.pptx
CYBER CRIMES AND IT ACT.pptxCYBER CRIMES AND IT ACT.pptx
CYBER CRIMES AND IT ACT.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx2.Cyber law and Crime.pptx
2.Cyber law and Crime.pptx
 
Cyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptxCyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptx
 
Cyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptxCyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptx
 
Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime ppt
 
18 computers and the law
18   computers and the law18   computers and the law
18 computers and the law
 
PHISHING attack
PHISHING attack PHISHING attack
PHISHING attack
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Cyber Safety ppt.pptx
Cyber Safety ppt.pptxCyber Safety ppt.pptx
Cyber Safety ppt.pptx
 
Webinar: How to avoid the 12 Scams of Christmas
Webinar: How to avoid the 12 Scams of ChristmasWebinar: How to avoid the 12 Scams of Christmas
Webinar: How to avoid the 12 Scams of Christmas
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptx
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
 

Recently uploaded

SECURING BUILDING PERMIT CITY OF CALOOCAN.pdf
SECURING BUILDING PERMIT CITY OF CALOOCAN.pdfSECURING BUILDING PERMIT CITY OF CALOOCAN.pdf
SECURING BUILDING PERMIT CITY OF CALOOCAN.pdf
eloprejohn333
 
Practical eLearning Makeovers for Everyone
Practical eLearning Makeovers for EveryonePractical eLearning Makeovers for Everyone
Practical eLearning Makeovers for Everyone
Bianca Woods
 
AHMED TALAAT ARCHITECTURE PORTFOLIO .pdf
AHMED TALAAT ARCHITECTURE PORTFOLIO .pdfAHMED TALAAT ARCHITECTURE PORTFOLIO .pdf
AHMED TALAAT ARCHITECTURE PORTFOLIO .pdf
talaatahm
 
Impact of Fonts: in Web and Apps Design
Impact of Fonts:  in Web and Apps DesignImpact of Fonts:  in Web and Apps Design
Impact of Fonts: in Web and Apps Design
contactproperweb2014
 
Top Interior Designers in Bangalore.pdf1
Top Interior Designers in Bangalore.pdf1Top Interior Designers in Bangalore.pdf1
Top Interior Designers in Bangalore.pdf1
Decomart Studio
 
Technoblade The Legacy of a Minecraft Legend.
Technoblade The Legacy of a Minecraft Legend.Technoblade The Legacy of a Minecraft Legend.
Technoblade The Legacy of a Minecraft Legend.
Techno Merch
 
UNIT IV-VISUAL STYLE AND MOBILE INTERFACES.pptx
UNIT IV-VISUAL STYLE AND MOBILE INTERFACES.pptxUNIT IV-VISUAL STYLE AND MOBILE INTERFACES.pptx
UNIT IV-VISUAL STYLE AND MOBILE INTERFACES.pptx
GOWSIKRAJA PALANISAMY
 
Storytelling For The Web: Integrate Storytelling in your Design Process
Storytelling For The Web: Integrate Storytelling in your Design ProcessStorytelling For The Web: Integrate Storytelling in your Design Process
Storytelling For The Web: Integrate Storytelling in your Design Process
Chiara Aliotta
 
Game Concept Presentation for Ukrainian Mythology Based Game With Designs
Game Concept Presentation for Ukrainian Mythology Based Game With DesignsGame Concept Presentation for Ukrainian Mythology Based Game With Designs
Game Concept Presentation for Ukrainian Mythology Based Game With Designs
184804
 
Virtual Tour Application Powerpoint for museum of edinburgh
Virtual Tour Application Powerpoint for museum of edinburghVirtual Tour Application Powerpoint for museum of edinburgh
Virtual Tour Application Powerpoint for museum of edinburgh
millarj46
 
CocaCola_Brand_equity_package_2012__.pdf
CocaCola_Brand_equity_package_2012__.pdfCocaCola_Brand_equity_package_2012__.pdf
CocaCola_Brand_equity_package_2012__.pdf
PabloMartelLpez
 
定制美国西雅图城市大学毕业证学历证书原版一模一样
定制美国西雅图城市大学毕业证学历证书原版一模一样定制美国西雅图城市大学毕业证学历证书原版一模一样
定制美国西雅图城市大学毕业证学历证书原版一模一样
qo1as76n
 
ZAPATILLAS 2 X 110 ABRIL.pdf compra economico
ZAPATILLAS 2 X 110 ABRIL.pdf compra economicoZAPATILLAS 2 X 110 ABRIL.pdf compra economico
ZAPATILLAS 2 X 110 ABRIL.pdf compra economico
jhonguerrerobarturen
 
EASY TUTORIAL OF HOW TO USE CAPCUT BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE CAPCUT BY: FEBLESS HERNANEEASY TUTORIAL OF HOW TO USE CAPCUT BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE CAPCUT BY: FEBLESS HERNANE
Febless Hernane
 
International Upcycling Research Network advisory board meeting 4
International Upcycling Research Network advisory board meeting 4International Upcycling Research Network advisory board meeting 4
International Upcycling Research Network advisory board meeting 4
Kyungeun Sung
 
Divertidamente SLIDE.pptxufururururuhrurid8dj
Divertidamente SLIDE.pptxufururururuhrurid8djDivertidamente SLIDE.pptxufururururuhrurid8dj
Divertidamente SLIDE.pptxufururururuhrurid8dj
lunaemel03
 
Heuristics Evaluation - How to Guide.pdf
Heuristics Evaluation - How to Guide.pdfHeuristics Evaluation - How to Guide.pdf
Heuristics Evaluation - How to Guide.pdf
Jaime Brown
 
一比一原版(LSBU毕业证书)伦敦南岸大学毕业证如何办理
一比一原版(LSBU毕业证书)伦敦南岸大学毕业证如何办理一比一原版(LSBU毕业证书)伦敦南岸大学毕业证如何办理
一比一原版(LSBU毕业证书)伦敦南岸大学毕业证如何办理
k7nm6tk
 
一比一原版(UW毕业证)西雅图华盛顿大学毕业证如何办理
一比一原版(UW毕业证)西雅图华盛顿大学毕业证如何办理一比一原版(UW毕业证)西雅图华盛顿大学毕业证如何办理
一比一原版(UW毕业证)西雅图华盛顿大学毕业证如何办理
kecekev
 
UNIT V ACTIONS AND COMMANDS, FORMS AND CONTROLS.pptx
UNIT V ACTIONS AND COMMANDS, FORMS AND CONTROLS.pptxUNIT V ACTIONS AND COMMANDS, FORMS AND CONTROLS.pptx
UNIT V ACTIONS AND COMMANDS, FORMS AND CONTROLS.pptx
GOWSIKRAJA PALANISAMY
 

Recently uploaded (20)

SECURING BUILDING PERMIT CITY OF CALOOCAN.pdf
SECURING BUILDING PERMIT CITY OF CALOOCAN.pdfSECURING BUILDING PERMIT CITY OF CALOOCAN.pdf
SECURING BUILDING PERMIT CITY OF CALOOCAN.pdf
 
Practical eLearning Makeovers for Everyone
Practical eLearning Makeovers for EveryonePractical eLearning Makeovers for Everyone
Practical eLearning Makeovers for Everyone
 
AHMED TALAAT ARCHITECTURE PORTFOLIO .pdf
AHMED TALAAT ARCHITECTURE PORTFOLIO .pdfAHMED TALAAT ARCHITECTURE PORTFOLIO .pdf
AHMED TALAAT ARCHITECTURE PORTFOLIO .pdf
 
Impact of Fonts: in Web and Apps Design
Impact of Fonts:  in Web and Apps DesignImpact of Fonts:  in Web and Apps Design
Impact of Fonts: in Web and Apps Design
 
Top Interior Designers in Bangalore.pdf1
Top Interior Designers in Bangalore.pdf1Top Interior Designers in Bangalore.pdf1
Top Interior Designers in Bangalore.pdf1
 
Technoblade The Legacy of a Minecraft Legend.
Technoblade The Legacy of a Minecraft Legend.Technoblade The Legacy of a Minecraft Legend.
Technoblade The Legacy of a Minecraft Legend.
 
UNIT IV-VISUAL STYLE AND MOBILE INTERFACES.pptx
UNIT IV-VISUAL STYLE AND MOBILE INTERFACES.pptxUNIT IV-VISUAL STYLE AND MOBILE INTERFACES.pptx
UNIT IV-VISUAL STYLE AND MOBILE INTERFACES.pptx
 
Storytelling For The Web: Integrate Storytelling in your Design Process
Storytelling For The Web: Integrate Storytelling in your Design ProcessStorytelling For The Web: Integrate Storytelling in your Design Process
Storytelling For The Web: Integrate Storytelling in your Design Process
 
Game Concept Presentation for Ukrainian Mythology Based Game With Designs
Game Concept Presentation for Ukrainian Mythology Based Game With DesignsGame Concept Presentation for Ukrainian Mythology Based Game With Designs
Game Concept Presentation for Ukrainian Mythology Based Game With Designs
 
Virtual Tour Application Powerpoint for museum of edinburgh
Virtual Tour Application Powerpoint for museum of edinburghVirtual Tour Application Powerpoint for museum of edinburgh
Virtual Tour Application Powerpoint for museum of edinburgh
 
CocaCola_Brand_equity_package_2012__.pdf
CocaCola_Brand_equity_package_2012__.pdfCocaCola_Brand_equity_package_2012__.pdf
CocaCola_Brand_equity_package_2012__.pdf
 
定制美国西雅图城市大学毕业证学历证书原版一模一样
定制美国西雅图城市大学毕业证学历证书原版一模一样定制美国西雅图城市大学毕业证学历证书原版一模一样
定制美国西雅图城市大学毕业证学历证书原版一模一样
 
ZAPATILLAS 2 X 110 ABRIL.pdf compra economico
ZAPATILLAS 2 X 110 ABRIL.pdf compra economicoZAPATILLAS 2 X 110 ABRIL.pdf compra economico
ZAPATILLAS 2 X 110 ABRIL.pdf compra economico
 
EASY TUTORIAL OF HOW TO USE CAPCUT BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE CAPCUT BY: FEBLESS HERNANEEASY TUTORIAL OF HOW TO USE CAPCUT BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE CAPCUT BY: FEBLESS HERNANE
 
International Upcycling Research Network advisory board meeting 4
International Upcycling Research Network advisory board meeting 4International Upcycling Research Network advisory board meeting 4
International Upcycling Research Network advisory board meeting 4
 
Divertidamente SLIDE.pptxufururururuhrurid8dj
Divertidamente SLIDE.pptxufururururuhrurid8djDivertidamente SLIDE.pptxufururururuhrurid8dj
Divertidamente SLIDE.pptxufururururuhrurid8dj
 
Heuristics Evaluation - How to Guide.pdf
Heuristics Evaluation - How to Guide.pdfHeuristics Evaluation - How to Guide.pdf
Heuristics Evaluation - How to Guide.pdf
 
一比一原版(LSBU毕业证书)伦敦南岸大学毕业证如何办理
一比一原版(LSBU毕业证书)伦敦南岸大学毕业证如何办理一比一原版(LSBU毕业证书)伦敦南岸大学毕业证如何办理
一比一原版(LSBU毕业证书)伦敦南岸大学毕业证如何办理
 
一比一原版(UW毕业证)西雅图华盛顿大学毕业证如何办理
一比一原版(UW毕业证)西雅图华盛顿大学毕业证如何办理一比一原版(UW毕业证)西雅图华盛顿大学毕业证如何办理
一比一原版(UW毕业证)西雅图华盛顿大学毕业证如何办理
 
UNIT V ACTIONS AND COMMANDS, FORMS AND CONTROLS.pptx
UNIT V ACTIONS AND COMMANDS, FORMS AND CONTROLS.pptxUNIT V ACTIONS AND COMMANDS, FORMS AND CONTROLS.pptx
UNIT V ACTIONS AND COMMANDS, FORMS AND CONTROLS.pptx
 

Seminaar Report of Phishing VIII Sem

  • 1. Narendra Singh Information Technology Roll no. 029 (09EARIT032) 6/18/2013 1 Phishing: A Simple way to make fool
  • 2. • It is the act of tricking someone into giving confidential information (like passwords and credit card information) on a fake web page or email form pretending to come from a legitimate company (like their bank). • The word „Phishing‟ initially emerged in 1990s. The early hackers often use „ph‟ to replace „f‟ to produce new words in the hacker‟s community, since they usually hack by phones. 6/18/2013 2
  • 3. • A message is sent from the Phishers to the user. • A user provides confidential information to a Phishing server. • The Phishers obtains the confidential information from the server. • The confidential information is used to impersonate the user. • The Phishers obtains illicit monetary gain. 6/18/2013 3
  • 4. • Link Manipulation • Website Forgery • Spam • Key Logger • Session Hacking • Phishing through Search Engines • Phone Phishing 6/18/2013 4
  • 5. • Rs. 13 lakh imposed on ICICI Bank for phishing scam ICICI Bank has been fined with Rs. 12.85 lakh on account of a phishing fraud. This has been the first case filed under the Information Technology Act. Tamil Nadu IT secretary directed ICICI Bank to pay Rs 12.85 lakh to an Abu Dhabi- based NRI(Umashankar Sivasubramaniam) within 60 days for the loss suffered by him due to a phishing fraud. The petition was filed by Umashankar Sivasubramaniam, who had received a mail in September 2007 from the bank which asked him to provide his username and password or his account would be closed. After the reply to this mail he witnessed a transfer of Rs 6.46 lakh from his account to that of a company which withdrew Rs 4.6 lakh from an ICICI branch in Mumbai and retained the balance in its account. ICICI defends itself saying that it is the responsibility of the customer to be conscious while giving out any kind of personal information on the web. Internet banking needs to be done very carefully after full scrutiny by the customer. Internet banking is not a risky proposition if the customer is conscious enough. 6/18/2013 5
  • 6. Dec 2011, BANGALORE Six months ago, Asha , a consultant for NGOs, got a rude shock. Her husband received an e-mail from her, stating she was in a financial crisis and needed help. A bank account number was also provided. She couldn't log into either of her e-mail accounts. Her accounts had been hacked . By afternoon, the couple was flooded with calls of concern. Some persons even deposited money in the account number mentioned. This is the now- increasingly common modus operandi of cyber criminals. 6/18/2013 6
  • 7. How accounts are hacked? First, the cyber criminals send a phishing mail that looks like an alert from the service provider. Once the account holder replies, the hacker gets all the details he needs to compromise the account and change the password. What they do after that? After the account is hacked, the phishers simply browse the contacts list and send a common mail. They either say they are stuck in a far-off place without cash or have plunged in a deep financial crisis. They seek assistance from the recipients. Though most persons call up and check, some in a hurry deposit cash in the account mentioned. This is withdrawn by the hacker 6/18/2013 7
  • 8. How to retrieve the account? Most service providers ask for an alternative e-mail ID before opening an account. The account owner can log onto this, go to `abuse' and lodge a complaint about the hack. Account is usually restored within 24 hours. What was the actions taken against them? They got punishment of 2year Jail under the act of IPC 420. 6/18/2013 8
  • 9. Recently, the users of the Google email services, “Gmail” purportedly received a legal notice from the Gmail team which wanted users to refurbish their account name, password, occupation, birth date and country of residence with a warning that users who did not update their details within 7 days of receiving the warning would lose their account permanently. However, the spokesperson of the Google denied any such legal notice coming from them and stated it to be a phishing attack designed to collect personal information, called „spoofing‟ or „password phishing‟. 6/18/2013 9
  • 12. • Penalty for damage to computer, computer system, etc.- If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network,- accesses or secures access to such computer, computer system or computer network , downloads, copies or extracts any data, computer data base or information from such computer, computer system or computer network including information or data held or stored in any removable storage medium. • damages or causes to be damaged any computer, computer system or computer network, data, computer data base or any other programmes residing in such computer, computer system or computer network; 6/18/2013 12
  • 13. • Section 66A of the IT Act is a relevant section which penalizes „sending false and offensive messages through communication services‟. • Explanation — For the purpose of this section, terms “electronic mail” and “electronic mail message” means a message or information created or transmitted or received on a computer, computer system, computer resource or communication device including attachments in text, images, audio, video and any other electronic record, which may be transmitted with the message. 6/18/2013 13
  • 14. • Any person who sends, by means of a computer resource or a communication device : a) any information that is grossly offensive or has menacing character b) any information which he knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred or ill will, persistently by making use of such computer resource or a communication device • Punishment - Imprisonment for a term which may extend to three years and with fine. 6/18/2013 14
  • 15. • Trust Of Authority • E-mail and webpages can look real • Use of the same top level domain • Use of the simplest and least confusing host name • Misleading e-mails • No check of source address • Non-availability of secure desktop tools • Lack of user awareness 6/18/2013 15
  • 16. • We should use Security Implications both long and short term. • Apply phishing filter in your browser setting. • Delete all emails and SMS from any stranger luring you with billion dollar lottery prize, jobs in UK and huge wealth • Delete all emails/SMS/Phone calls that ask for your personal information such as user name , passwords , Pin, credit codes. • Delete all spam mail as they contain either virus or spyware enable spam filters in your mail boxes • Self awareness is the biggest tool against any kind of cyber crime.
  • 17. • www.rupeetimes.com/news/car_loans/fine_worth_rs_13_l akh_imposed_on_icici_bank_for_phishing_scam_3472.ht ml • http://www.esecurityplanet.com/views/article.php/3875866/ Top-Ten-Phishing-Facts.htm • Jaishankar, K. (2004). ―International perspectives on crime and justice‖ p. 541-556. • Bocjj P. (2006). ―The dark side of the Internet: protecting yourself and your family from online criminals.‖ 2nd ed, green wood publishing group, pp. 159-161. • http://articles.timesofindia.indiatimes.com/2009-01- 17/bangalore/28031198_1_e-mail-accounts-cyber- criminals-cyber-crime 6/18/2013 17