SlideShare a Scribd company logo
1 of 8
Phishing Attack Awareness
and Prevention
By: Sonali Kharade
What is Phishing ?
Phishing is the fraudulent attempt to obtain sensitive information,
or data, such as usernames, passwords and credit card details by
disguising oneself as a trustworthy entity in an electronic
communication.
Types of Phishing attack
How to Recognize and Avoid Phishing Scams
Deceptive phishing is the most common type of phishing. In this case, an attacker attempts to obtain
confidential information from the victims. Attackers use the information to steal money or to launch
other attacks. A fake email from a bank asking you to click a link and verify your account details is an
example of deceptive phishing. Similar to phishing, pharming sends users to a fraudulent website
that appears to be legitimate. However, in this case, victims do not even have to click a
malicious link to be taken to the bogus site. Attackers can infect either the user’s computer or
the website’s DNS server and redirect the user to a fake site even if the correct URL is typed in.
1. Deceptive Phishing
Attack
the most common type of phishing scam
E-mails from recognized sender
steal people’s personal data or login credentials
Care
users should inspect all URLs carefully
generic salutations, grammar mistakes and spelling
errors
Spear phishing targets specific individuals instead of a wide group of people. Attackers often
research their victims on social media and other sites. That way, they can customize their
communications and appear more authentic. Spear phishing is often the first step used to
penetrate a company’s defenses and carry out a targeted attack.
2. Spear Phishing
Attack
the most common on social media sites.
E-mail from recognized sender.
Uses personalized information.
Care
Employees security awareness training
Limit sharing personal and sensitive information
Invest in the automated solutions to analyze emails
How to Recognize and Avoid Phishing Scams
When attackers go after a “big fish” like a CEO, it’s called whaling. These attackers often
spend considerable time profiling the target to find the opportune moment and means of
stealing login credentials. Whaling is of particular concern because high-level executives are
able to access a great deal of company information.
3. Whaling
Attack
Targets higher authorities of an organization.
Uses financial transfer information.
Obtain all W-2 information of employees.
Care
Executive security awareness training
Setting up MFA for financial transaction
How to Recognize and Avoid Phishing Scams
Voice phishing is a form of criminal phone fraud, using social engineering over the telephone
system to gain access to private personal and financial information for the purpose of financial
reward. SMS phishing or smishing is a form of criminal activity using social engineering techniques.
4. Vishing & Smishing
Attack
Targets through phone calls and sms.
Care
Avoid calls from unknown number
Avoid to click on links received from SMS
Don’t give personal information on phone
How to Recognize and Avoid Phishing Scams
1. Never Click on Hyperlinks in Email
Best Practices to Prevent Phishing
2. Never Enter Sensitive Information in a Pop Up Window
3. Verify HTTPS on Address Bar
4. Education on Phishing Attacks
5. Keep Antivirus Protection Current
6. Utilize Anti-Spam & Anti-Spy Software
7. Install and Maintain a Reliable Firewall
8. Protect Against DNS Pharming Attacks
9. Utilize Backup System Copies

More Related Content

What's hot

Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
Aryan Ragu
 

What's hot (20)

Phishing awareness
Phishing awarenessPhishing awareness
Phishing awareness
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing Attacks
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
Social Engineering new.pptx
Social Engineering new.pptxSocial Engineering new.pptx
Social Engineering new.pptx
 
Phising a Threat to Network Security
Phising a Threat to Network SecurityPhising a Threat to Network Security
Phising a Threat to Network Security
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
 
cyber security
cyber securitycyber security
cyber security
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
PHISHING attack
PHISHING attack PHISHING attack
PHISHING attack
 
Phishing
PhishingPhishing
Phishing
 

Similar to Phishing Attack Awareness and Prevention

ICT-phishing
ICT-phishingICT-phishing
ICT-phishing
MH BS
 
December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10
seadeloitte
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
temi
 

Similar to Phishing Attack Awareness and Prevention (20)

Phishing & Pharming Explained.pdf
Phishing & Pharming Explained.pdfPhishing & Pharming Explained.pdf
Phishing & Pharming Explained.pdf
 
What is a phishing attack
What is a phishing attackWhat is a phishing attack
What is a phishing attack
 
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
 
Phish Phry- Analysis paper
Phish Phry- Analysis paper Phish Phry- Analysis paper
Phish Phry- Analysis paper
 
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
ICT-phishing
ICT-phishingICT-phishing
ICT-phishing
 
Cyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptxCyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptx
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
Unit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesUnit iii: Common Hacking Techniques
Unit iii: Common Hacking Techniques
 
December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10
 
Phishing 1 vp
Phishing 1 vpPhishing 1 vp
Phishing 1 vp
 
What is a Vishing Attack and How to Keep Yourself Secure.pdf
What is a Vishing Attack and How to Keep Yourself Secure.pdfWhat is a Vishing Attack and How to Keep Yourself Secure.pdf
What is a Vishing Attack and How to Keep Yourself Secure.pdf
 
Cyber security ATTACK on Retired Personnel, MITIGATION and Best Practices
Cyber security ATTACK on Retired Personnel, MITIGATION and Best PracticesCyber security ATTACK on Retired Personnel, MITIGATION and Best Practices
Cyber security ATTACK on Retired Personnel, MITIGATION and Best Practices
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Phishing
PhishingPhishing
Phishing
 
Phishing Awareness Eduaction
Phishing Awareness EduactionPhishing Awareness Eduaction
Phishing Awareness Eduaction
 

More from sonalikharade3 (6)

EDITORS
EDITORSEDITORS
EDITORS
 
SIMULATING A SIMPLE MACHINE (smaco)
SIMULATING A SIMPLE MACHINE (smaco)SIMULATING A SIMPLE MACHINE (smaco)
SIMULATING A SIMPLE MACHINE (smaco)
 
Introduction to system programming
Introduction to system programmingIntroduction to system programming
Introduction to system programming
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
 
COMPILER DESIGN OPTIONS
COMPILER DESIGN OPTIONSCOMPILER DESIGN OPTIONS
COMPILER DESIGN OPTIONS
 
Linker and Loader
Linker and Loader Linker and Loader
Linker and Loader
 

Recently uploaded

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 

Recently uploaded (20)

Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 

Phishing Attack Awareness and Prevention

  • 1. Phishing Attack Awareness and Prevention By: Sonali Kharade
  • 2. What is Phishing ? Phishing is the fraudulent attempt to obtain sensitive information, or data, such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication.
  • 4. How to Recognize and Avoid Phishing Scams Deceptive phishing is the most common type of phishing. In this case, an attacker attempts to obtain confidential information from the victims. Attackers use the information to steal money or to launch other attacks. A fake email from a bank asking you to click a link and verify your account details is an example of deceptive phishing. Similar to phishing, pharming sends users to a fraudulent website that appears to be legitimate. However, in this case, victims do not even have to click a malicious link to be taken to the bogus site. Attackers can infect either the user’s computer or the website’s DNS server and redirect the user to a fake site even if the correct URL is typed in. 1. Deceptive Phishing Attack the most common type of phishing scam E-mails from recognized sender steal people’s personal data or login credentials Care users should inspect all URLs carefully generic salutations, grammar mistakes and spelling errors
  • 5. Spear phishing targets specific individuals instead of a wide group of people. Attackers often research their victims on social media and other sites. That way, they can customize their communications and appear more authentic. Spear phishing is often the first step used to penetrate a company’s defenses and carry out a targeted attack. 2. Spear Phishing Attack the most common on social media sites. E-mail from recognized sender. Uses personalized information. Care Employees security awareness training Limit sharing personal and sensitive information Invest in the automated solutions to analyze emails How to Recognize and Avoid Phishing Scams
  • 6. When attackers go after a “big fish” like a CEO, it’s called whaling. These attackers often spend considerable time profiling the target to find the opportune moment and means of stealing login credentials. Whaling is of particular concern because high-level executives are able to access a great deal of company information. 3. Whaling Attack Targets higher authorities of an organization. Uses financial transfer information. Obtain all W-2 information of employees. Care Executive security awareness training Setting up MFA for financial transaction How to Recognize and Avoid Phishing Scams
  • 7. Voice phishing is a form of criminal phone fraud, using social engineering over the telephone system to gain access to private personal and financial information for the purpose of financial reward. SMS phishing or smishing is a form of criminal activity using social engineering techniques. 4. Vishing & Smishing Attack Targets through phone calls and sms. Care Avoid calls from unknown number Avoid to click on links received from SMS Don’t give personal information on phone How to Recognize and Avoid Phishing Scams
  • 8. 1. Never Click on Hyperlinks in Email Best Practices to Prevent Phishing 2. Never Enter Sensitive Information in a Pop Up Window 3. Verify HTTPS on Address Bar 4. Education on Phishing Attacks 5. Keep Antivirus Protection Current 6. Utilize Anti-Spam & Anti-Spy Software 7. Install and Maintain a Reliable Firewall 8. Protect Against DNS Pharming Attacks 9. Utilize Backup System Copies