SlideShare une entreprise Scribd logo
1  sur  12
PHISHING
What is ‘Phishing’ ?


Phishing is the act of attempting to acquire
valuable information such as usernames,
passwords, credit cards details, account data,
etc by pretending as a trustworthy entity in an
electronic communication.
History of Phishing
Phreaking    + Fishing = Phishing
        Phreaking = Making phone calls for free back in
70’s.
     Fishing = Use bait to lure the target.
Phishing in 1995

 Target : AOL users (America Online Users)
 Purpose : Getting account passwords.
 Threat level : Low.
 Techniques : Similar name, social engineering.
History Of Phishing (cont.)
 Phishing in 2001
 Target : Ebayers and major banks.
 Purpose : Getting credit card numbers, accounts.
 Threat level : Medium.
 Techniques : Same in 1995.
 Phishing in 2007
 Target : Paypal, banks, ebay.
 Purpose : Bank accounts.
 Threat level : High.
 Techniques : Browser vulnerabilities.
Why they Phish?
Phishing    is like playing the odds
  - simple to do and high gain for little work.
  - no real knowledge necessary
  - 4.5 people out of 10 fall for it.
Most is for financial gain

   - Money
   - Account information.
   - Identity theft.
 Some do it to spread malicious programs that in turn
carry out others attacks.
Techniques of Phishing
Spear  Phishing.
Clone Phishing.
Whaling.
Link Manipulation.
Filter Evasion.
Website Forgery.
Phone Phishing.
Targets and Victims…
Phishers are mainly targeting the customers of
banks and online payment services.
The others sectors are :-
Health care.
Lotteries/ Contests.
Money transfer.
Worlds events.
Employment opportunities.
Damaged caused by Phishing…
20,00,000  emails are sent.
5% get to the end user – 1,00,000.
5% click on the phishing link – 5,000.
2% enter data into the phishing site – 100.
$1,200 from each person who enters data.
Potential reward - $1,20,000.

     In 2005, The David Levi phishing gang from
UK was caught. It operated for 12 months with 6
members and made over $3,60,000 from 160
people using an Ebay Phishing Scam.
How to detect Phishing?

Bad Grammar.
Generic Salutations.
Account Information request / threats from
companies we don’t use.
Hovering over links/ long URL service.
Unknown senders.
Anti – Phishing Steps

3P’s – Proclaim, Protect, Pursue.
 Proclaim in all correspondence the use of an
official mark.
Protect all messages, web pages with the mark.
Pursue all imposters
Possible Solution
Keep   the browser updated.
Keep the anti-virus updated.
Use a firewall and keep it turned on.
Use digitally signed documents only.
Never respond to an email asking for personal
information.
Never click on a link on the email. Retype the
address in a new window.
Presented By:-


 SAYANTAN SUR
   BCA(H) – 2



  THANK YOU

Contenu connexe

Tendances

Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
Atlantic Training, LLC.
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
R_Yanus
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
Fred Beck MBA, CPA
 

Tendances (20)

Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing Attacks
 
Phishing
PhishingPhishing
Phishing
 
What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Prevention
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Email phising and spoofing hurting your business
Email phising and spoofing hurting your businessEmail phising and spoofing hurting your business
Email phising and spoofing hurting your business
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Phishing attack
Phishing attackPhishing attack
Phishing attack
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
Social engineering
Social engineering Social engineering
Social engineering
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 

En vedette (6)

Thriving in the social media jungle for internet marketing association 2013
Thriving in the social media jungle for internet marketing association 2013Thriving in the social media jungle for internet marketing association 2013
Thriving in the social media jungle for internet marketing association 2013
 
HOW I BROKE THE CONFEDERATE CODE (137 YEARS TOO LATE)
HOW I BROKE THE CONFEDERATE CODE (137 YEARS TOO LATE)HOW I BROKE THE CONFEDERATE CODE (137 YEARS TOO LATE)
HOW I BROKE THE CONFEDERATE CODE (137 YEARS TOO LATE)
 
RAZORPOINT SECURITY GLOSSARY
RAZORPOINT SECURITY GLOSSARYRAZORPOINT SECURITY GLOSSARY
RAZORPOINT SECURITY GLOSSARY
 
Next gen summit social media networking
Next gen summit social media networkingNext gen summit social media networking
Next gen summit social media networking
 
Network Security
Network SecurityNetwork Security
Network Security
 
Visual Studio IDE
Visual Studio IDEVisual Studio IDE
Visual Studio IDE
 

Similaire à Phising

Blue and White Minimal Professional Business Project Presentation .pptx
Blue and White Minimal Professional Business Project Presentation .pptxBlue and White Minimal Professional Business Project Presentation .pptx
Blue and White Minimal Professional Business Project Presentation .pptx
jennblair0830
 
ICT-phishing
ICT-phishingICT-phishing
ICT-phishing
MH BS
 
December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10
seadeloitte
 

Similaire à Phising (20)

Phishing-Updated
Phishing-UpdatedPhishing-Updated
Phishing-Updated
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing 1 vp
Phishing 1 vpPhishing 1 vp
Phishing 1 vp
 
Phishing
PhishingPhishing
Phishing
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud
 
Internet Phishing
Internet Phishing�Internet Phishing�
Internet Phishing
 
Phishing
PhishingPhishing
Phishing
 
Cyber Security Motivation
Cyber Security MotivationCyber Security Motivation
Cyber Security Motivation
 
Blue and White Minimal Professional Business Project Presentation .pptx
Blue and White Minimal Professional Business Project Presentation .pptxBlue and White Minimal Professional Business Project Presentation .pptx
Blue and White Minimal Professional Business Project Presentation .pptx
 
Phishing
PhishingPhishing
Phishing
 
Phish Phry- Analysis paper
Phish Phry- Analysis paper Phish Phry- Analysis paper
Phish Phry- Analysis paper
 
ICT-phishing
ICT-phishingICT-phishing
ICT-phishing
 
Phishing.pdf
Phishing.pdfPhishing.pdf
Phishing.pdf
 
Computer 4 ict
Computer 4 ictComputer 4 ict
Computer 4 ict
 
What is a phishing attack
What is a phishing attackWhat is a phishing attack
What is a phishing attack
 
December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10
 
Phishing & Pharming Explained.pdf
Phishing & Pharming Explained.pdfPhishing & Pharming Explained.pdf
Phishing & Pharming Explained.pdf
 

Plus de Sayantan Sur (10)

Image Encryption and Compression
Image Encryption and Compression Image Encryption and Compression
Image Encryption and Compression
 
Stack using Linked List
Stack using Linked ListStack using Linked List
Stack using Linked List
 
Stack using Array
Stack using ArrayStack using Array
Stack using Array
 
Array menu
Array menuArray menu
Array menu
 
Double linked list
Double linked listDouble linked list
Double linked list
 
Single linked list
Single linked listSingle linked list
Single linked list
 
Circular linked list
Circular linked listCircular linked list
Circular linked list
 
Decision Support System(DSS)
Decision Support System(DSS)Decision Support System(DSS)
Decision Support System(DSS)
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
International Terrorism
International Terrorism International Terrorism
International Terrorism
 

Dernier

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Dernier (20)

Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 

Phising

  • 2. What is ‘Phishing’ ? Phishing is the act of attempting to acquire valuable information such as usernames, passwords, credit cards details, account data, etc by pretending as a trustworthy entity in an electronic communication.
  • 3. History of Phishing Phreaking + Fishing = Phishing Phreaking = Making phone calls for free back in 70’s. Fishing = Use bait to lure the target. Phishing in 1995 Target : AOL users (America Online Users) Purpose : Getting account passwords. Threat level : Low. Techniques : Similar name, social engineering.
  • 4. History Of Phishing (cont.)  Phishing in 2001  Target : Ebayers and major banks.  Purpose : Getting credit card numbers, accounts.  Threat level : Medium.  Techniques : Same in 1995.  Phishing in 2007  Target : Paypal, banks, ebay.  Purpose : Bank accounts.  Threat level : High.  Techniques : Browser vulnerabilities.
  • 5. Why they Phish? Phishing is like playing the odds - simple to do and high gain for little work. - no real knowledge necessary - 4.5 people out of 10 fall for it. Most is for financial gain - Money - Account information. - Identity theft.  Some do it to spread malicious programs that in turn carry out others attacks.
  • 6. Techniques of Phishing Spear Phishing. Clone Phishing. Whaling. Link Manipulation. Filter Evasion. Website Forgery. Phone Phishing.
  • 7. Targets and Victims… Phishers are mainly targeting the customers of banks and online payment services. The others sectors are :- Health care. Lotteries/ Contests. Money transfer. Worlds events. Employment opportunities.
  • 8. Damaged caused by Phishing… 20,00,000 emails are sent. 5% get to the end user – 1,00,000. 5% click on the phishing link – 5,000. 2% enter data into the phishing site – 100. $1,200 from each person who enters data. Potential reward - $1,20,000. In 2005, The David Levi phishing gang from UK was caught. It operated for 12 months with 6 members and made over $3,60,000 from 160 people using an Ebay Phishing Scam.
  • 9. How to detect Phishing? Bad Grammar. Generic Salutations. Account Information request / threats from companies we don’t use. Hovering over links/ long URL service. Unknown senders.
  • 10. Anti – Phishing Steps 3P’s – Proclaim, Protect, Pursue.  Proclaim in all correspondence the use of an official mark. Protect all messages, web pages with the mark. Pursue all imposters
  • 11. Possible Solution Keep the browser updated. Keep the anti-virus updated. Use a firewall and keep it turned on. Use digitally signed documents only. Never respond to an email asking for personal information. Never click on a link on the email. Retype the address in a new window.
  • 12. Presented By:- SAYANTAN SUR BCA(H) – 2 THANK YOU