SlideShare une entreprise Scribd logo
1  sur  32
• Pronounced “fishing”
• The word has its Origin from two words “Password
Harvesting” or fishing for Passwords
• Phishing is an online form of pretexting, a kind of
deception in which an attacker pretends to be
someone else in order to obtain sensitive
information from the victim.
• Also known as "brand spoofing“.
• Phishers are phishing artists.
• Phishing is a way of fraudulently acquiring sensitive
information using social engineering and technical
subterfuge.
• It tries to trick users with official-looking messages
− Credit card
− Bank account
− eBay
− PayPal
• Some phishing e-mails also
contain malicious or unwanted
software that can track your
activities or slow your computer
1. Unsolicited requests for sensitive information
2. Content appears genuine
3. Disguised hyperlinks and sender address
4. Email consists of a clickable
image
5. Generic Greetings
6. Use various ruses to entice
recipients to click
What to do if you Receive a
Suspected Phishing Scam
≠ DO NOT click on any links in the scam email.
≠ DO NOT supply any personal information of
any kind as a result of the email
≠ DO NOT reply to the email or attempt to
contact the senders in any way.
≠ DO NOT supply any information on the bogus
website that may appear in your browser if
you have clicked a link in the email.
≠ DO NOT open any
attachments that arrive with the
email.
≠ REPORT the phishing scam.
≠ DELETE the email from your
computer as soon as possible.
 Recognise the scam
 Report the scam
 Stop the scam
 Planning
 Setup
 Attack
 Collection
 Identity Theft and Fraud
 Unawareness among public
 Unawareness of policy
 Technical sophistication
Techniques of
Phishing Scams
1) Man-in-the-middle
Attacks
2) URL Obfuscation Attacks
3) XSS (Cross-site Scripting)
WHY YOUR PERSONAL
ACCOUNT
IS
A TARGET
Phishing – A Cyber
Crime Provisions of
Information
Technology Act, 2000
• Section 66
• Section 66A
• Section 66 C
• Section 66 D
1. Keep antivirus up to date
2. Do not click on hyperlinks in emails
3. Advantage of anti-spam software
4. Get educated
5. Use anti-spam software
6. Firewall
7. Use back-up system
8. Not to enter sensitive information into
pop-up windows
9. Secure the hosts file
10. Protect against DNS pharming
attacks
AMRITA HEMRAJANI (17)
PEARLENE JASAVALA (24)
KHYATI NANDU (38)
SANAYA PATEL (40)
KRISHMA SANDESRA (42)
VATSAL SHAH (50)
Phishing scams in banking ppt

Contenu connexe

Tendances

Web hacking-dvwa-publish-130131073605-phpapp01
Web hacking-dvwa-publish-130131073605-phpapp01Web hacking-dvwa-publish-130131073605-phpapp01
Web hacking-dvwa-publish-130131073605-phpapp01Jalil Mashab-Crew
 
Email phising and spoofing hurting your business
Email phising and spoofing hurting your businessEmail phising and spoofing hurting your business
Email phising and spoofing hurting your businessMithi SkyConnect
 
OWASP Top 10 - Insecure Communication
OWASP Top 10 - Insecure CommunicationOWASP Top 10 - Insecure Communication
OWASP Top 10 - Insecure CommunicationGayan Weerarathna
 
KHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack PreventionKHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack PreventionAPNIC
 
Web PenTest Sample Report
Web PenTest Sample ReportWeb PenTest Sample Report
Web PenTest Sample ReportOctogence
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness Net at Work
 
Social Engineering Attacks & Principles
Social Engineering Attacks & PrinciplesSocial Engineering Attacks & Principles
Social Engineering Attacks & PrinciplesLearningwithRayYT
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing AttacksSysCloud
 
Cyber Security Challenges and Emerging Trends
Cyber Security Challenges and Emerging TrendsCyber Security Challenges and Emerging Trends
Cyber Security Challenges and Emerging Trendsijtsrd
 
REST API Pentester's perspective
REST API Pentester's perspectiveREST API Pentester's perspective
REST API Pentester's perspectiveSecuRing
 
Vulnerabilities in modern web applications
Vulnerabilities in modern web applicationsVulnerabilities in modern web applications
Vulnerabilities in modern web applicationsNiyas Nazar
 
PacNOG 23: Introduction to Crypto Jacking
PacNOG 23: Introduction to Crypto JackingPacNOG 23: Introduction to Crypto Jacking
PacNOG 23: Introduction to Crypto JackingAPNIC
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in IndiaYogesh Lolge
 

Tendances (20)

Web hacking-dvwa-publish-130131073605-phpapp01
Web hacking-dvwa-publish-130131073605-phpapp01Web hacking-dvwa-publish-130131073605-phpapp01
Web hacking-dvwa-publish-130131073605-phpapp01
 
Denial of Service Attacks
Denial of Service AttacksDenial of Service Attacks
Denial of Service Attacks
 
Email phising and spoofing hurting your business
Email phising and spoofing hurting your businessEmail phising and spoofing hurting your business
Email phising and spoofing hurting your business
 
Sicurezza in Rete
Sicurezza in ReteSicurezza in Rete
Sicurezza in Rete
 
Security in NodeJS applications
Security in NodeJS applicationsSecurity in NodeJS applications
Security in NodeJS applications
 
OWASP Top 10 - Insecure Communication
OWASP Top 10 - Insecure CommunicationOWASP Top 10 - Insecure Communication
OWASP Top 10 - Insecure Communication
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
KHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack PreventionKHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack Prevention
 
Web PenTest Sample Report
Web PenTest Sample ReportWeb PenTest Sample Report
Web PenTest Sample Report
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Social Engineering Attacks & Principles
Social Engineering Attacks & PrinciplesSocial Engineering Attacks & Principles
Social Engineering Attacks & Principles
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
 
Cyber Security Challenges and Emerging Trends
Cyber Security Challenges and Emerging TrendsCyber Security Challenges and Emerging Trends
Cyber Security Challenges and Emerging Trends
 
REST API Pentester's perspective
REST API Pentester's perspectiveREST API Pentester's perspective
REST API Pentester's perspective
 
Vulnerabilities in modern web applications
Vulnerabilities in modern web applicationsVulnerabilities in modern web applications
Vulnerabilities in modern web applications
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Phishing
PhishingPhishing
Phishing
 
Email Spoofing.pptx
Email Spoofing.pptxEmail Spoofing.pptx
Email Spoofing.pptx
 
PacNOG 23: Introduction to Crypto Jacking
PacNOG 23: Introduction to Crypto JackingPacNOG 23: Introduction to Crypto Jacking
PacNOG 23: Introduction to Crypto Jacking
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
 

En vedette

Shield Your Business Combat Phishing Attacks
Shield Your Business   Combat Phishing AttacksShield Your Business   Combat Phishing Attacks
Shield Your Business Combat Phishing AttacksKarl Kispert
 
Cyberprzestępcy jutra - ile kosztują?
Cyberprzestępcy jutra - ile kosztują?Cyberprzestępcy jutra - ile kosztują?
Cyberprzestępcy jutra - ile kosztują?Logicaltrust pl
 
Phishing Attacks - Are You Ready to Respond?
Phishing Attacks - Are You Ready to Respond?Phishing Attacks - Are You Ready to Respond?
Phishing Attacks - Are You Ready to Respond?Splunk
 
Web Security Threat Report on Spear Phishing Attacks - Symantec
Web Security Threat Report on Spear Phishing Attacks - SymantecWeb Security Threat Report on Spear Phishing Attacks - Symantec
Web Security Threat Report on Spear Phishing Attacks - SymantecCheapSSLsecurity
 
APT x 3 - trzy firmy, trzy wektory ataków, trzy do zera - wybrane studium prz...
APT x 3 - trzy firmy, trzy wektory ataków, trzy do zera - wybrane studium prz...APT x 3 - trzy firmy, trzy wektory ataków, trzy do zera - wybrane studium prz...
APT x 3 - trzy firmy, trzy wektory ataków, trzy do zera - wybrane studium prz...Logicaltrust pl
 
Discreet Business Proposition
Discreet Business PropositionDiscreet Business Proposition
Discreet Business Propositionabphillips30
 
9 dinámica hacer lo correcto o encubrir a un amigo..
9 dinámica hacer lo correcto o encubrir a un amigo..9 dinámica hacer lo correcto o encubrir a un amigo..
9 dinámica hacer lo correcto o encubrir a un amigo..University of Madrid
 
Dossier de prensa fiab alimentaria 2014
Dossier de prensa fiab   alimentaria 2014Dossier de prensa fiab   alimentaria 2014
Dossier de prensa fiab alimentaria 2014FIAB
 
Excellent Varieties and Best Quality In Italian Tiles For Your Total Home Mak...
Excellent Varieties and Best Quality In Italian Tiles For Your Total Home Mak...Excellent Varieties and Best Quality In Italian Tiles For Your Total Home Mak...
Excellent Varieties and Best Quality In Italian Tiles For Your Total Home Mak...EBEES DECOR
 
Especial La Voz de Galicia. A Mariña en fitur 2014. Semana Santa Viveiro
Especial La Voz de Galicia. A Mariña en fitur 2014. Semana Santa ViveiroEspecial La Voz de Galicia. A Mariña en fitur 2014. Semana Santa Viveiro
Especial La Voz de Galicia. A Mariña en fitur 2014. Semana Santa ViveiroCofrades de Viveiro
 
Weiche Flanellhemden in schicken Dessins
Weiche Flanellhemden in schicken DessinsWeiche Flanellhemden in schicken Dessins
Weiche Flanellhemden in schicken DessinsHirmer
 
Iseo Immobiliare | Agenzia Immobiliare Iseo Brescia - Pisogne villa in vendita
Iseo Immobiliare | Agenzia Immobiliare Iseo Brescia - Pisogne villa in venditaIseo Immobiliare | Agenzia Immobiliare Iseo Brescia - Pisogne villa in vendita
Iseo Immobiliare | Agenzia Immobiliare Iseo Brescia - Pisogne villa in venditaiseoimmobiliare
 
Cy A Nuestros Servicios De Consultoria Tributaria Compatibility Mode
Cy A   Nuestros Servicios De Consultoria Tributaria Compatibility ModeCy A   Nuestros Servicios De Consultoria Tributaria Compatibility Mode
Cy A Nuestros Servicios De Consultoria Tributaria Compatibility Moderafaelvarela
 

En vedette (20)

Shield Your Business Combat Phishing Attacks
Shield Your Business   Combat Phishing AttacksShield Your Business   Combat Phishing Attacks
Shield Your Business Combat Phishing Attacks
 
Cyberprzestępcy jutra - ile kosztują?
Cyberprzestępcy jutra - ile kosztują?Cyberprzestępcy jutra - ile kosztują?
Cyberprzestępcy jutra - ile kosztują?
 
Phishing Attacks - Are You Ready to Respond?
Phishing Attacks - Are You Ready to Respond?Phishing Attacks - Are You Ready to Respond?
Phishing Attacks - Are You Ready to Respond?
 
Web Security Threat Report on Spear Phishing Attacks - Symantec
Web Security Threat Report on Spear Phishing Attacks - SymantecWeb Security Threat Report on Spear Phishing Attacks - Symantec
Web Security Threat Report on Spear Phishing Attacks - Symantec
 
APT x 3 - trzy firmy, trzy wektory ataków, trzy do zera - wybrane studium prz...
APT x 3 - trzy firmy, trzy wektory ataków, trzy do zera - wybrane studium prz...APT x 3 - trzy firmy, trzy wektory ataków, trzy do zera - wybrane studium prz...
APT x 3 - trzy firmy, trzy wektory ataków, trzy do zera - wybrane studium prz...
 
Phishing attack till now
Phishing attack till nowPhishing attack till now
Phishing attack till now
 
Discreet Business Proposition
Discreet Business PropositionDiscreet Business Proposition
Discreet Business Proposition
 
9 dinámica hacer lo correcto o encubrir a un amigo..
9 dinámica hacer lo correcto o encubrir a un amigo..9 dinámica hacer lo correcto o encubrir a un amigo..
9 dinámica hacer lo correcto o encubrir a un amigo..
 
Dossier de prensa fiab alimentaria 2014
Dossier de prensa fiab   alimentaria 2014Dossier de prensa fiab   alimentaria 2014
Dossier de prensa fiab alimentaria 2014
 
Excellent Varieties and Best Quality In Italian Tiles For Your Total Home Mak...
Excellent Varieties and Best Quality In Italian Tiles For Your Total Home Mak...Excellent Varieties and Best Quality In Italian Tiles For Your Total Home Mak...
Excellent Varieties and Best Quality In Italian Tiles For Your Total Home Mak...
 
Sexo salvaje
Sexo salvajeSexo salvaje
Sexo salvaje
 
Grow MN Central Region 2012
Grow MN Central Region 2012Grow MN Central Region 2012
Grow MN Central Region 2012
 
Gacetilla de prensa 20 05-2014
Gacetilla de prensa 20 05-2014Gacetilla de prensa 20 05-2014
Gacetilla de prensa 20 05-2014
 
Especial La Voz de Galicia. A Mariña en fitur 2014. Semana Santa Viveiro
Especial La Voz de Galicia. A Mariña en fitur 2014. Semana Santa ViveiroEspecial La Voz de Galicia. A Mariña en fitur 2014. Semana Santa Viveiro
Especial La Voz de Galicia. A Mariña en fitur 2014. Semana Santa Viveiro
 
Treball diasdeclase 3rb
Treball diasdeclase 3rbTreball diasdeclase 3rb
Treball diasdeclase 3rb
 
Weiche Flanellhemden in schicken Dessins
Weiche Flanellhemden in schicken DessinsWeiche Flanellhemden in schicken Dessins
Weiche Flanellhemden in schicken Dessins
 
Iseo Immobiliare | Agenzia Immobiliare Iseo Brescia - Pisogne villa in vendita
Iseo Immobiliare | Agenzia Immobiliare Iseo Brescia - Pisogne villa in venditaIseo Immobiliare | Agenzia Immobiliare Iseo Brescia - Pisogne villa in vendita
Iseo Immobiliare | Agenzia Immobiliare Iseo Brescia - Pisogne villa in vendita
 
Un Nuevo Mundo 2.0
Un Nuevo Mundo 2.0Un Nuevo Mundo 2.0
Un Nuevo Mundo 2.0
 
Cy A Nuestros Servicios De Consultoria Tributaria Compatibility Mode
Cy A   Nuestros Servicios De Consultoria Tributaria Compatibility ModeCy A   Nuestros Servicios De Consultoria Tributaria Compatibility Mode
Cy A Nuestros Servicios De Consultoria Tributaria Compatibility Mode
 
Social hiring
Social hiringSocial hiring
Social hiring
 

Similaire à Phishing scams in banking ppt

IT2252_Presentation_Group03.pptx
IT2252_Presentation_Group03.pptxIT2252_Presentation_Group03.pptx
IT2252_Presentation_Group03.pptxNLFunnyFunky
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)aleeya91
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureLourdes Paloma Gimenez
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxStephen Jesukanth Martin
 
Spear Phishing Attacks
Spear Phishing AttacksSpear Phishing Attacks
Spear Phishing AttacksIsaacDavid27
 
Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & PrivacyAlexine Marier
 
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awarenessOWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awarenessMaherHamza9
 
HACKING AND PHISHING
HACKING AND PHISHINGHACKING AND PHISHING
HACKING AND PHISHINGsanthuana sg
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraudRadiant Minds
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptxTanvir Amin
 

Similaire à Phishing scams in banking ppt (20)

IT2252_Presentation_Group03.pptx
IT2252_Presentation_Group03.pptxIT2252_Presentation_Group03.pptx
IT2252_Presentation_Group03.pptx
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptx
 
Pp8
Pp8Pp8
Pp8
 
Spear Phishing Attacks
Spear Phishing AttacksSpear Phishing Attacks
Spear Phishing Attacks
 
Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & Privacy
 
Phishing
PhishingPhishing
Phishing
 
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awarenessOWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
 
PHISHING attack
PHISHING attack PHISHING attack
PHISHING attack
 
HACKING AND PHISHING
HACKING AND PHISHINGHACKING AND PHISHING
HACKING AND PHISHING
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
 
Phishing
PhishingPhishing
Phishing
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 

Plus de Krishma Sandesra (10)

silver bullion market
silver bullion marketsilver bullion market
silver bullion market
 
entry barriers for banks
entry barriers for banksentry barriers for banks
entry barriers for banks
 
Monetary policy of rbi
Monetary policy of rbiMonetary policy of rbi
Monetary policy of rbi
 
Jp morgan final ppt
Jp morgan final pptJp morgan final ppt
Jp morgan final ppt
 
Festivals of india old
Festivals of india oldFestivals of india old
Festivals of india old
 
Crm final ppt
Crm final pptCrm final ppt
Crm final ppt
 
Tisco
Tisco Tisco
Tisco
 
Crm final ppt
Crm final pptCrm final ppt
Crm final ppt
 
Monetary policy of rbi
Monetary policy of rbiMonetary policy of rbi
Monetary policy of rbi
 
Em ppt
Em pptEm ppt
Em ppt
 

Dernier

Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxdhanalakshmis0310
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 

Dernier (20)

Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 

Phishing scams in banking ppt

  • 1.
  • 2.
  • 3. • Pronounced “fishing” • The word has its Origin from two words “Password Harvesting” or fishing for Passwords • Phishing is an online form of pretexting, a kind of deception in which an attacker pretends to be someone else in order to obtain sensitive information from the victim. • Also known as "brand spoofing“. • Phishers are phishing artists.
  • 4.
  • 5. • Phishing is a way of fraudulently acquiring sensitive information using social engineering and technical subterfuge. • It tries to trick users with official-looking messages − Credit card − Bank account − eBay − PayPal • Some phishing e-mails also contain malicious or unwanted software that can track your activities or slow your computer
  • 6. 1. Unsolicited requests for sensitive information 2. Content appears genuine 3. Disguised hyperlinks and sender address
  • 7. 4. Email consists of a clickable image 5. Generic Greetings 6. Use various ruses to entice recipients to click
  • 8.
  • 9.
  • 10. What to do if you Receive a Suspected Phishing Scam ≠ DO NOT click on any links in the scam email. ≠ DO NOT supply any personal information of any kind as a result of the email ≠ DO NOT reply to the email or attempt to contact the senders in any way. ≠ DO NOT supply any information on the bogus website that may appear in your browser if you have clicked a link in the email.
  • 11. ≠ DO NOT open any attachments that arrive with the email. ≠ REPORT the phishing scam. ≠ DELETE the email from your computer as soon as possible.
  • 12.
  • 13.  Recognise the scam  Report the scam  Stop the scam
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.  Planning  Setup  Attack  Collection  Identity Theft and Fraud
  • 19.
  • 20.  Unawareness among public  Unawareness of policy  Technical sophistication
  • 21.
  • 22. Techniques of Phishing Scams 1) Man-in-the-middle Attacks 2) URL Obfuscation Attacks 3) XSS (Cross-site Scripting)
  • 23.
  • 25. Phishing – A Cyber Crime Provisions of Information Technology Act, 2000 • Section 66 • Section 66A • Section 66 C • Section 66 D
  • 26. 1. Keep antivirus up to date 2. Do not click on hyperlinks in emails 3. Advantage of anti-spam software
  • 27. 4. Get educated 5. Use anti-spam software 6. Firewall 7. Use back-up system
  • 28. 8. Not to enter sensitive information into pop-up windows 9. Secure the hosts file 10. Protect against DNS pharming attacks
  • 29.
  • 30.
  • 31. AMRITA HEMRAJANI (17) PEARLENE JASAVALA (24) KHYATI NANDU (38) SANAYA PATEL (40) KRISHMA SANDESRA (42) VATSAL SHAH (50)