SlideShare une entreprise Scribd logo
1  sur  10
PHISHING
INTRODUCTION
• Phishing is the most powerful and popular attack for hacking into emails and web accounts.
• Cyber criminals use this attack to hack into bank accounts, Facebook accounts and email account
accounts and email account of innocent people.
WHAT IS PHISHING
• Phishing is the act of fooling a computer user into submitting personal
information by creating a counterfeit it website that looks like a real (and
trusted)site.
• It is a hacker technique of "fishing" for passwords and other secret financial
info.
TYPES OF PHISHING:
• 1) Deceptive phishing
• 2) Spear phishing
• 3) Whaling
• 4) Pharming
TYPES OF PHISHING
1. Deceptive phishing
• Sending a deceptive email, in bulk, with a “call to action” that demands the
recipient click on a link.
• In this case, an attacker attempts to obtain confidential information from
the victims.
• Attackers use the information to steal money or to launch other attacks.
• E.g A fake email from a bank asking you to click a link and verify your
account details.
2.Spear phishing
• Spear phishing targets specific individuals instead of a wide group of
people.
• Attackers often research their victims on social media and other sites.
• That way, they can customize their communications and appear more
authentic.
3. Whaling
• When attackers go after a “big fish” like a CEO, it’s called whaling.
• These attackers often spend considerable time profiling the target to find
the opportune moment and means of stealing login credentials.
• Whaling is of particular concern because high- level executives are able to
access a great deal of company information.
• 4. Pharming
• Similar to phishing, pharming sends users to a fraudulent website that
appears to be legitimate.
• Similar to phishing, pharming sends users to a fraudulent website that
appears to be legitimate.
• Attackers can infect either the user’s computer or the website’s DNS server
and redirect the user to a fake site even if the correct URL is typed in.
HOW DO I PROTECT AGAINST PHISHING ATTACKS?
1. .User education
2. Security technology
CONCLUSION
• No single technology will completely stop phishing.
• However, a combination of good organization and practice, proper
application of current technologies, and improvements in security
technology has the potential to drastically reduce the prevalence of
phishing and the losses suffered from it.

Contenu connexe

Similaire à edu 3 ppt.pptx

Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
aleeya91
 
December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10
seadeloitte
 
Threaths and risks
Threaths and risksThreaths and risks
Threaths and risks
HHSome
 
Threaths and risks
Threaths and risksThreaths and risks
Threaths and risks
HHSome
 
Blue and White Minimal Professional Business Project Presentation .pptx
Blue and White Minimal Professional Business Project Presentation .pptxBlue and White Minimal Professional Business Project Presentation .pptx
Blue and White Minimal Professional Business Project Presentation .pptx
jennblair0830
 

Similaire à edu 3 ppt.pptx (20)

Tittl e
Tittl eTittl e
Tittl e
 
Cyber Security Motivation
Cyber Security MotivationCyber Security Motivation
Cyber Security Motivation
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10
 
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awarenessOWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptx
 
Spear Phishing Attacks
Spear Phishing AttacksSpear Phishing Attacks
Spear Phishing Attacks
 
Threaths and risks
Threaths and risksThreaths and risks
Threaths and risks
 
Threaths and risks
Threaths and risksThreaths and risks
Threaths and risks
 
Exploring Phishing Attacks.pptx
Exploring Phishing Attacks.pptxExploring Phishing Attacks.pptx
Exploring Phishing Attacks.pptx
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark World
 
Phishing
PhishingPhishing
Phishing
 
CYBER SECURITY _ PHISHING
CYBER SECURITY _ PHISHINGCYBER SECURITY _ PHISHING
CYBER SECURITY _ PHISHING
 
Phishing
PhishingPhishing
Phishing
 
Blue and White Minimal Professional Business Project Presentation .pptx
Blue and White Minimal Professional Business Project Presentation .pptxBlue and White Minimal Professional Business Project Presentation .pptx
Blue and White Minimal Professional Business Project Presentation .pptx
 
Phishing.pptx
Phishing.pptxPhishing.pptx
Phishing.pptx
 

Dernier

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Dernier (20)

How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 

edu 3 ppt.pptx

  • 2. INTRODUCTION • Phishing is the most powerful and popular attack for hacking into emails and web accounts. • Cyber criminals use this attack to hack into bank accounts, Facebook accounts and email account accounts and email account of innocent people.
  • 3. WHAT IS PHISHING • Phishing is the act of fooling a computer user into submitting personal information by creating a counterfeit it website that looks like a real (and trusted)site. • It is a hacker technique of "fishing" for passwords and other secret financial info.
  • 4. TYPES OF PHISHING: • 1) Deceptive phishing • 2) Spear phishing • 3) Whaling • 4) Pharming
  • 5. TYPES OF PHISHING 1. Deceptive phishing • Sending a deceptive email, in bulk, with a “call to action” that demands the recipient click on a link. • In this case, an attacker attempts to obtain confidential information from the victims. • Attackers use the information to steal money or to launch other attacks. • E.g A fake email from a bank asking you to click a link and verify your account details.
  • 6. 2.Spear phishing • Spear phishing targets specific individuals instead of a wide group of people. • Attackers often research their victims on social media and other sites. • That way, they can customize their communications and appear more authentic.
  • 7. 3. Whaling • When attackers go after a “big fish” like a CEO, it’s called whaling. • These attackers often spend considerable time profiling the target to find the opportune moment and means of stealing login credentials. • Whaling is of particular concern because high- level executives are able to access a great deal of company information.
  • 8. • 4. Pharming • Similar to phishing, pharming sends users to a fraudulent website that appears to be legitimate. • Similar to phishing, pharming sends users to a fraudulent website that appears to be legitimate. • Attackers can infect either the user’s computer or the website’s DNS server and redirect the user to a fake site even if the correct URL is typed in.
  • 9. HOW DO I PROTECT AGAINST PHISHING ATTACKS? 1. .User education 2. Security technology
  • 10. CONCLUSION • No single technology will completely stop phishing. • However, a combination of good organization and practice, proper application of current technologies, and improvements in security technology has the potential to drastically reduce the prevalence of phishing and the losses suffered from it.