SlideShare une entreprise Scribd logo
1  sur  27
Phishing
By:
Esraa Yaseen Israa El-Jamal
To:
Eng. Abdel Nasser Abdelhadi
Islamic University-Gaza
Faculty of Engineering
Computer Department
Outline
 Definition
 Comparison to Spam
 Facts about Phishing
 Phishing step by step
 What phishers want ?
 Effects of phishing
 Real stories
 How to phish??
 Marks of phishing emails
 How to Avoid?
 I’ve been already phished
” phishing”
Name and definition …
It is the act of tricking someone into giving
confidential information (like passwords and
credit card information) on a fake web page
or email form pretending to come from a
legitimate company (like their bank).
COMPARISON TO SPAM
 The purpose of a phishing message is to acquire sensitive
information about a user. For doing so the message needs to
deceive the intended recipient.
So it doesn’t contains any useful information and hence falls
under the category of spam.
 A spam message tries to sell a product or service, whereas
phishing message needs to look like it is from a legitimate
organization.
 Techniques applied to spam message cant be applied naively
to phishing messages.
Facts about Phishing !
6.1 Billion – Number of phishing e-
mails sent world-wide each month.
$1,200 – Average loss to successfully
phished person.
A new phishing scam is launched
every two minutes.
What kinds of personal
information do the thieves want?
◦ Your name, address and date of birth
◦ Social Security number
◦ Driver’s License number
◦ Credit Card numbers
◦ ATM cards
◦ Telephone calling cards
Industries affected
Major industries affected are:
 Financial Services
 ISPs
 Online retailers
The most websites
frequently attacked
by phishers
eBay Phishing Scam
example
PayPal Phishing Scam
example
Phishing step by step …
Effects of Phishing
Internet fraud
Identity theft
Financial loss to the original institutions
Erosion of Public Trust in the Internet.
Real stories
How to phish
some web site??
Be clever
!
Be clever !
Be clever !
Be clever !
How to avoid phishing?
 Think before you open, Never open suspicious
emails.
 Ensure that the web browser has the latest security
patch applied.
 Install latest anti-virus packages.
 Verify the accounts and transactions regularly
Never submit credentials on forms embedded in
emails.
 Inspect the address bar and SSL certificate.
Good or Bad Site?
Good or Bad Site?
If I’ve been already phished
??
 Take immediate action to protect your identity
and all of your online accounts.
 Treat the situation like you lost your wallet or
purse. Immediately contact all of your financial
institutions, preferably by phone, and inform them
of the situation.
Go to every web site where you may have stored
credit card and/or bank numbers and change the
password at each web site
 Choose a strong password that is significantly
different from your old passwords.
 Forward spam that is phishing for information to
spam@uce.gov and visit FTC’s
References
 http://www.phishing.org/phishing-
techniques/
 http://en.wikipedia.org/wiki/Phishing
 http://www.youtube.com
 http://sarasota.ifas.ufl.edu/FCS/phish_
stories.pdf
Questions
Thanks
for

Contenu connexe

Tendances

PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
vineetkathan
 

Tendances (20)

Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniques
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing
PhishingPhishing
Phishing
 
Phishing attack till now
Phishing attack till nowPhishing attack till now
Phishing attack till now
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Intro phishing
Intro phishingIntro phishing
Intro phishing
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing Attacks
 
Phishing Technology
Phishing TechnologyPhishing Technology
Phishing Technology
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?
 
Phishing and hacking
Phishing and hackingPhishing and hacking
Phishing and hacking
 
Phishing
PhishingPhishing
Phishing
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
 
Phising a Threat to Network Security
Phising a Threat to Network SecurityPhising a Threat to Network Security
Phising a Threat to Network Security
 
Phishing
PhishingPhishing
Phishing
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Seminaar Report of Phishing VIII Sem
Seminaar Report of Phishing VIII SemSeminaar Report of Phishing VIII Sem
Seminaar Report of Phishing VIII Sem
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
 

En vedette

Phishing
PhishingPhishing
Phishing
Syahida
 

En vedette (12)

Phishing
PhishingPhishing
Phishing
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
A presentation on Phishing
A presentation on PhishingA presentation on Phishing
A presentation on Phishing
 
Phishing
PhishingPhishing
Phishing
 
Strategies to handle Phishing attacks
Strategies to handle Phishing attacksStrategies to handle Phishing attacks
Strategies to handle Phishing attacks
 
Careers in Security
Careers in SecurityCareers in Security
Careers in Security
 
Hacking the Web
Hacking the WebHacking the Web
Hacking the Web
 
Phishing
PhishingPhishing
Phishing
 
10 Event Technology Trends to Watch in 2016
10 Event Technology Trends to Watch in 201610 Event Technology Trends to Watch in 2016
10 Event Technology Trends to Watch in 2016
 
Phishing
PhishingPhishing
Phishing
 
Developing an Intranet Strategy
Developing an Intranet StrategyDeveloping an Intranet Strategy
Developing an Intranet Strategy
 
Mastering The Fourth Industrial Revolution
Mastering The Fourth Industrial Revolution Mastering The Fourth Industrial Revolution
Mastering The Fourth Industrial Revolution
 

Similaire à Phishing

Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
aleeya91
 
PhishingandPharming
PhishingandPharmingPhishingandPharming
PhishingandPharming
Dawn Hicks
 
1 jun st online pay_pal platform not compromised
1 jun st online pay_pal platform not compromised1 jun st online pay_pal platform not compromised
1 jun st online pay_pal platform not compromised
Bridget Kow
 

Similaire à Phishing (20)

Unit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptxUnit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptx
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008
 
cybercrime_presentation - Copy.ppt
cybercrime_presentation - Copy.pptcybercrime_presentation - Copy.ppt
cybercrime_presentation - Copy.ppt
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
 
Internet Phishing
Internet PhishingInternet Phishing
Internet Phishing
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
Frauds and scams
Frauds and scamsFrauds and scams
Frauds and scams
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
What is a phishing attack
What is a phishing attackWhat is a phishing attack
What is a phishing attack
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
 
Id Theft
Id TheftId Theft
Id Theft
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
Phishing 1 vp
Phishing 1 vpPhishing 1 vp
Phishing 1 vp
 
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
 
Internet scams
Internet scamsInternet scams
Internet scams
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
 
Phishing
PhishingPhishing
Phishing
 
PhishingandPharming
PhishingandPharmingPhishingandPharming
PhishingandPharming
 
Is this a scam.pdf
Is this a scam.pdfIs this a scam.pdf
Is this a scam.pdf
 
1 jun st online pay_pal platform not compromised
1 jun st online pay_pal platform not compromised1 jun st online pay_pal platform not compromised
1 jun st online pay_pal platform not compromised
 

Dernier

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Dernier (20)

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 

Phishing

  • 1. Phishing By: Esraa Yaseen Israa El-Jamal To: Eng. Abdel Nasser Abdelhadi Islamic University-Gaza Faculty of Engineering Computer Department
  • 2. Outline  Definition  Comparison to Spam  Facts about Phishing  Phishing step by step  What phishers want ?  Effects of phishing  Real stories  How to phish??  Marks of phishing emails  How to Avoid?  I’ve been already phished
  • 3. ” phishing” Name and definition … It is the act of tricking someone into giving confidential information (like passwords and credit card information) on a fake web page or email form pretending to come from a legitimate company (like their bank).
  • 4. COMPARISON TO SPAM  The purpose of a phishing message is to acquire sensitive information about a user. For doing so the message needs to deceive the intended recipient. So it doesn’t contains any useful information and hence falls under the category of spam.  A spam message tries to sell a product or service, whereas phishing message needs to look like it is from a legitimate organization.  Techniques applied to spam message cant be applied naively to phishing messages.
  • 5. Facts about Phishing ! 6.1 Billion – Number of phishing e- mails sent world-wide each month. $1,200 – Average loss to successfully phished person. A new phishing scam is launched every two minutes.
  • 6. What kinds of personal information do the thieves want? ◦ Your name, address and date of birth ◦ Social Security number ◦ Driver’s License number ◦ Credit Card numbers ◦ ATM cards ◦ Telephone calling cards
  • 7. Industries affected Major industries affected are:  Financial Services  ISPs  Online retailers
  • 8. The most websites frequently attacked by phishers
  • 11. Phishing step by step …
  • 12. Effects of Phishing Internet fraud Identity theft Financial loss to the original institutions Erosion of Public Trust in the Internet.
  • 14. How to phish some web site??
  • 15.
  • 16.
  • 21. How to avoid phishing?  Think before you open, Never open suspicious emails.  Ensure that the web browser has the latest security patch applied.  Install latest anti-virus packages.  Verify the accounts and transactions regularly Never submit credentials on forms embedded in emails.  Inspect the address bar and SSL certificate.
  • 22. Good or Bad Site?
  • 23. Good or Bad Site?
  • 24. If I’ve been already phished ??  Take immediate action to protect your identity and all of your online accounts.  Treat the situation like you lost your wallet or purse. Immediately contact all of your financial institutions, preferably by phone, and inform them of the situation. Go to every web site where you may have stored credit card and/or bank numbers and change the password at each web site  Choose a strong password that is significantly different from your old passwords.  Forward spam that is phishing for information to spam@uce.gov and visit FTC’s
  • 25. References  http://www.phishing.org/phishing- techniques/  http://en.wikipedia.org/wiki/Phishing  http://www.youtube.com  http://sarasota.ifas.ufl.edu/FCS/phish_ stories.pdf