SlideShare a Scribd company logo
1 of 14
What is phishing?
Copyright Intellipaat. All rightsreserved.
Agenda
02 History of Phishing
03 Use cases of Phishing
01 What is Phishing?
04 How to prevent Phishing?
What is Phishing?
Copyright IntelliPaat, All rightsreserved
Phishing is a Cyber crime where the attacker pretends to be
someone else and try to get sensitive information.
What is Phishing?
Copyright IntelliPaat, All rightsreserved
Phishing is a Cyber crime where the attacker pretends to be
someone else and try to get sensitive information.
What is Phishing?
Copyright IntelliPaat, All rightsreserved
Phishing is a Cyber crime where the attacker pretends to
be someone else and try to get sensitive information.
Hackers need sensitive data such as banking and credit
card details, and passwords.
You are contacted through email, telephone or text
message.
Use cases of Phishing
Copyright IntelliPaat, All rightsreserved
Use cases of Phishing
Copyright IntelliPaat, All rightsreserved
Common content
Copyright IntelliPaat, All rightsreserved
1990s
P H I S H I N G Khan C. Smith
-
Common content
Copyright IntelliPaat, All rightsreserved
1990s
2000s
3.6 million US $3.2 billion 12 months
-- --
Common content
Copyright IntelliPaat, All rightsreserved
1990s
2000s
2010s
76%
Common content
Copyright IntelliPaat, All rightsreserved
1990s
2000s
2010s
2021
97% unable to recognize phishing
3% users report phishing
1.5 million new phishing sites
Markets to reach $170.4 billion in 2022.
How to prevent Phishing?
User training
• People can be trained to recognize
phishing attempts
• organizations run regular simulated
phishing campaigns
Filtering emails
• Spam filters can reduce the
number of phishing emails
2 factor authentication
• A user must present both, a
smart card and a password
Email redaction
• Use an email client that redacts
URLs from email messages
India: +91-7022374614
US: 1-800-216-8930 (TOLL FREE)
support@intellipaat.com
24/7 Chat with Our Course Advisor
sales@intellipaat.com
Speaker
Copyright IntelliPaat, All rightsreserved

More Related Content

What's hot

What's hot (19)

Hackers
HackersHackers
Hackers
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
Hacking
HackingHacking
Hacking
 
Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hacking
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Hacking presentation
Hacking presentationHacking presentation
Hacking presentation
 
Ethical Hacking Presentation
Ethical Hacking PresentationEthical Hacking Presentation
Ethical Hacking Presentation
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 
Etical hacking
Etical hackingEtical hacking
Etical hacking
 
Hacking
HackingHacking
Hacking
 
Cyber intelligence-services
Cyber intelligence-servicesCyber intelligence-services
Cyber intelligence-services
 
Hacking presentation BASIC
Hacking presentation BASICHacking presentation BASIC
Hacking presentation BASIC
 
Hacking presentation
Hacking presentation Hacking presentation
Hacking presentation
 
Hacking
HackingHacking
Hacking
 
AI And Cyber-security Threats
AI And Cyber-security ThreatsAI And Cyber-security Threats
AI And Cyber-security Threats
 
How to analyze cyber threats
How to analyze cyber threatsHow to analyze cyber threats
How to analyze cyber threats
 
Cyber crime introduction awareness program at st. xavier
Cyber crime introduction   awareness program at st. xavierCyber crime introduction   awareness program at st. xavier
Cyber crime introduction awareness program at st. xavier
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 

Similar to Phishing For Beginners | Phishing Tutorial | What is Phishing | Intellipaat

Identity Theft business
Identity Theft businessIdentity Theft business
Identity Theft businessMatt Smith
 
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2Conf
 
3250 presentation.pptx
3250 presentation.pptx3250 presentation.pptx
3250 presentation.pptxCanranLiu
 
Cyber Crime Awareness.pptx
Cyber Crime Awareness.pptxCyber Crime Awareness.pptx
Cyber Crime Awareness.pptxMehedi Hasan
 
What Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersWhat Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersUnited Security Providers AG
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
 
Identity Theft Protection Services - KeepMyID
Identity Theft Protection Services - KeepMyIDIdentity Theft Protection Services - KeepMyID
Identity Theft Protection Services - KeepMyIDjonaspatrick12
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remediesIJARIIT
 
The Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hackingThe Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hackingat MicroFocus Italy ❖✔
 
Business of Hacking
Business of HackingBusiness of Hacking
Business of HackingDaniel Ross
 
Unearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet FraudUnearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet FraudInternet Law Center
 
Cybercrime IN INDIA , LAW AND ORDER
Cybercrime IN INDIA , LAW AND ORDER Cybercrime IN INDIA , LAW AND ORDER
Cybercrime IN INDIA , LAW AND ORDER Sooraj Maurya
 
information security_presentation.pptx
information security_presentation.pptxinformation security_presentation.pptx
information security_presentation.pptxsagarpanthee
 
Cybersecurity - Webinar Session
Cybersecurity - Webinar SessionCybersecurity - Webinar Session
Cybersecurity - Webinar SessionKalilur Rahman
 
The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816Nicole Fields
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 

Similar to Phishing For Beginners | Phishing Tutorial | What is Phishing | Intellipaat (20)

Identity Theft business
Identity Theft businessIdentity Theft business
Identity Theft business
 
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
 
3250 presentation.pptx
3250 presentation.pptx3250 presentation.pptx
3250 presentation.pptx
 
Cyber Crime Awareness.pptx
Cyber Crime Awareness.pptxCyber Crime Awareness.pptx
Cyber Crime Awareness.pptx
 
What Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersWhat Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security Providers
 
ppt cyber law 1.pptx
ppt cyber law 1.pptxppt cyber law 1.pptx
ppt cyber law 1.pptx
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
LAW
LAWLAW
LAW
 
Identity Theft Protection Services - KeepMyID
Identity Theft Protection Services - KeepMyIDIdentity Theft Protection Services - KeepMyID
Identity Theft Protection Services - KeepMyID
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remedies
 
The Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hackingThe Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hacking
 
Business of Hacking
Business of HackingBusiness of Hacking
Business of Hacking
 
Unearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet FraudUnearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet Fraud
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime IN INDIA , LAW AND ORDER
Cybercrime IN INDIA , LAW AND ORDER Cybercrime IN INDIA , LAW AND ORDER
Cybercrime IN INDIA , LAW AND ORDER
 
information security_presentation.pptx
information security_presentation.pptxinformation security_presentation.pptx
information security_presentation.pptx
 
Cybersecurity - Webinar Session
Cybersecurity - Webinar SessionCybersecurity - Webinar Session
Cybersecurity - Webinar Session
 
The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816
 
_GS Activity - 02.pptx
_GS  Activity - 02.pptx_GS  Activity - 02.pptx
_GS Activity - 02.pptx
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 

More from Intellipaat

Business analyst job description key roles | Business Analyst Roles
Business analyst job description key roles | Business Analyst RolesBusiness analyst job description key roles | Business Analyst Roles
Business analyst job description key roles | Business Analyst RolesIntellipaat
 
Agile Business Analyst Responsibilities
Agile Business Analyst ResponsibilitiesAgile Business Analyst Responsibilities
Agile Business Analyst ResponsibilitiesIntellipaat
 
Voice search optimization | How to Optimize Your Website For Voice Search
Voice search optimization | How to Optimize Your Website For Voice SearchVoice search optimization | How to Optimize Your Website For Voice Search
Voice search optimization | How to Optimize Your Website For Voice SearchIntellipaat
 
Functional testing vs non functional testing | Difference Between Functional ...
Functional testing vs non functional testing | Difference Between Functional ...Functional testing vs non functional testing | Difference Between Functional ...
Functional testing vs non functional testing | Difference Between Functional ...Intellipaat
 
How to start your career as a software engineer
How to start your career as a software engineer How to start your career as a software engineer
How to start your career as a software engineer Intellipaat
 
First programming language to learn | Which Programming Language to Learn Fi...
First programming language to learn |  Which Programming Language to Learn Fi...First programming language to learn |  Which Programming Language to Learn Fi...
First programming language to learn | Which Programming Language to Learn Fi...Intellipaat
 
How to Grow Facebook Followers | How to Increase Facebook Followers quickly
How to Grow Facebook Followers | How to Increase Facebook Followers quickly How to Grow Facebook Followers | How to Increase Facebook Followers quickly
How to Grow Facebook Followers | How to Increase Facebook Followers quickly Intellipaat
 
How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...
How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...
How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...Intellipaat
 
How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...
How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...
How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...Intellipaat
 
How To Become Cyber Security Engineer | Cyber Security Career | Cyber Securit...
How To Become Cyber Security Engineer | Cyber Security Career | Cyber Securit...How To Become Cyber Security Engineer | Cyber Security Career | Cyber Securit...
How To Become Cyber Security Engineer | Cyber Security Career | Cyber Securit...Intellipaat
 
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...Intellipaat
 
AWS Amplify | AWS Amplify Tutorial | What is AWS Amplify | AWS Amplify Datast...
AWS Amplify | AWS Amplify Tutorial | What is AWS Amplify | AWS Amplify Datast...AWS Amplify | AWS Amplify Tutorial | What is AWS Amplify | AWS Amplify Datast...
AWS Amplify | AWS Amplify Tutorial | What is AWS Amplify | AWS Amplify Datast...Intellipaat
 
Data Science Engineer Resume | Data Scientist Resume | Data Science Resume Ti...
Data Science Engineer Resume | Data Scientist Resume | Data Science Resume Ti...Data Science Engineer Resume | Data Scientist Resume | Data Science Resume Ti...
Data Science Engineer Resume | Data Scientist Resume | Data Science Resume Ti...Intellipaat
 
How to Become Data Architect | Data Architect Roles and Responsibilities | In...
How to Become Data Architect | Data Architect Roles and Responsibilities | In...How to Become Data Architect | Data Architect Roles and Responsibilities | In...
How to Become Data Architect | Data Architect Roles and Responsibilities | In...Intellipaat
 
Tableau vs Excel | Difference Between Tableau vs Excel | Excel vs Tableau | I...
Tableau vs Excel | Difference Between Tableau vs Excel | Excel vs Tableau | I...Tableau vs Excel | Difference Between Tableau vs Excel | Excel vs Tableau | I...
Tableau vs Excel | Difference Between Tableau vs Excel | Excel vs Tableau | I...Intellipaat
 
Data Architect Salary in India | Factors Affecting Data Architect Salary |Dat...
Data Architect Salary in India | Factors Affecting Data Architect Salary |Dat...Data Architect Salary in India | Factors Affecting Data Architect Salary |Dat...
Data Architect Salary in India | Factors Affecting Data Architect Salary |Dat...Intellipaat
 
Importance of digital marketing
Importance of digital marketingImportance of digital marketing
Importance of digital marketingIntellipaat
 
Azure Data Engineer Certification | How to Become Azure Data Engineer
Azure Data Engineer Certification | How to Become Azure Data EngineerAzure Data Engineer Certification | How to Become Azure Data Engineer
Azure Data Engineer Certification | How to Become Azure Data EngineerIntellipaat
 
Salesforce Admin Certification | Salesforce Developer Certification | Intelli...
Salesforce Admin Certification | Salesforce Developer Certification | Intelli...Salesforce Admin Certification | Salesforce Developer Certification | Intelli...
Salesforce Admin Certification | Salesforce Developer Certification | Intelli...Intellipaat
 
Cryptography Tutorial
Cryptography TutorialCryptography Tutorial
Cryptography TutorialIntellipaat
 

More from Intellipaat (20)

Business analyst job description key roles | Business Analyst Roles
Business analyst job description key roles | Business Analyst RolesBusiness analyst job description key roles | Business Analyst Roles
Business analyst job description key roles | Business Analyst Roles
 
Agile Business Analyst Responsibilities
Agile Business Analyst ResponsibilitiesAgile Business Analyst Responsibilities
Agile Business Analyst Responsibilities
 
Voice search optimization | How to Optimize Your Website For Voice Search
Voice search optimization | How to Optimize Your Website For Voice SearchVoice search optimization | How to Optimize Your Website For Voice Search
Voice search optimization | How to Optimize Your Website For Voice Search
 
Functional testing vs non functional testing | Difference Between Functional ...
Functional testing vs non functional testing | Difference Between Functional ...Functional testing vs non functional testing | Difference Between Functional ...
Functional testing vs non functional testing | Difference Between Functional ...
 
How to start your career as a software engineer
How to start your career as a software engineer How to start your career as a software engineer
How to start your career as a software engineer
 
First programming language to learn | Which Programming Language to Learn Fi...
First programming language to learn |  Which Programming Language to Learn Fi...First programming language to learn |  Which Programming Language to Learn Fi...
First programming language to learn | Which Programming Language to Learn Fi...
 
How to Grow Facebook Followers | How to Increase Facebook Followers quickly
How to Grow Facebook Followers | How to Increase Facebook Followers quickly How to Grow Facebook Followers | How to Increase Facebook Followers quickly
How to Grow Facebook Followers | How to Increase Facebook Followers quickly
 
How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...
How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...
How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...
 
How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...
How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...
How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...
 
How To Become Cyber Security Engineer | Cyber Security Career | Cyber Securit...
How To Become Cyber Security Engineer | Cyber Security Career | Cyber Securit...How To Become Cyber Security Engineer | Cyber Security Career | Cyber Securit...
How To Become Cyber Security Engineer | Cyber Security Career | Cyber Securit...
 
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
 
AWS Amplify | AWS Amplify Tutorial | What is AWS Amplify | AWS Amplify Datast...
AWS Amplify | AWS Amplify Tutorial | What is AWS Amplify | AWS Amplify Datast...AWS Amplify | AWS Amplify Tutorial | What is AWS Amplify | AWS Amplify Datast...
AWS Amplify | AWS Amplify Tutorial | What is AWS Amplify | AWS Amplify Datast...
 
Data Science Engineer Resume | Data Scientist Resume | Data Science Resume Ti...
Data Science Engineer Resume | Data Scientist Resume | Data Science Resume Ti...Data Science Engineer Resume | Data Scientist Resume | Data Science Resume Ti...
Data Science Engineer Resume | Data Scientist Resume | Data Science Resume Ti...
 
How to Become Data Architect | Data Architect Roles and Responsibilities | In...
How to Become Data Architect | Data Architect Roles and Responsibilities | In...How to Become Data Architect | Data Architect Roles and Responsibilities | In...
How to Become Data Architect | Data Architect Roles and Responsibilities | In...
 
Tableau vs Excel | Difference Between Tableau vs Excel | Excel vs Tableau | I...
Tableau vs Excel | Difference Between Tableau vs Excel | Excel vs Tableau | I...Tableau vs Excel | Difference Between Tableau vs Excel | Excel vs Tableau | I...
Tableau vs Excel | Difference Between Tableau vs Excel | Excel vs Tableau | I...
 
Data Architect Salary in India | Factors Affecting Data Architect Salary |Dat...
Data Architect Salary in India | Factors Affecting Data Architect Salary |Dat...Data Architect Salary in India | Factors Affecting Data Architect Salary |Dat...
Data Architect Salary in India | Factors Affecting Data Architect Salary |Dat...
 
Importance of digital marketing
Importance of digital marketingImportance of digital marketing
Importance of digital marketing
 
Azure Data Engineer Certification | How to Become Azure Data Engineer
Azure Data Engineer Certification | How to Become Azure Data EngineerAzure Data Engineer Certification | How to Become Azure Data Engineer
Azure Data Engineer Certification | How to Become Azure Data Engineer
 
Salesforce Admin Certification | Salesforce Developer Certification | Intelli...
Salesforce Admin Certification | Salesforce Developer Certification | Intelli...Salesforce Admin Certification | Salesforce Developer Certification | Intelli...
Salesforce Admin Certification | Salesforce Developer Certification | Intelli...
 
Cryptography Tutorial
Cryptography TutorialCryptography Tutorial
Cryptography Tutorial
 

Recently uploaded

Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 

Recently uploaded (20)

Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 

Phishing For Beginners | Phishing Tutorial | What is Phishing | Intellipaat

  • 1. What is phishing? Copyright Intellipaat. All rightsreserved.
  • 2. Agenda 02 History of Phishing 03 Use cases of Phishing 01 What is Phishing? 04 How to prevent Phishing?
  • 3. What is Phishing? Copyright IntelliPaat, All rightsreserved Phishing is a Cyber crime where the attacker pretends to be someone else and try to get sensitive information.
  • 4. What is Phishing? Copyright IntelliPaat, All rightsreserved Phishing is a Cyber crime where the attacker pretends to be someone else and try to get sensitive information.
  • 5. What is Phishing? Copyright IntelliPaat, All rightsreserved Phishing is a Cyber crime where the attacker pretends to be someone else and try to get sensitive information. Hackers need sensitive data such as banking and credit card details, and passwords. You are contacted through email, telephone or text message.
  • 6. Use cases of Phishing Copyright IntelliPaat, All rightsreserved
  • 7. Use cases of Phishing Copyright IntelliPaat, All rightsreserved
  • 8. Common content Copyright IntelliPaat, All rightsreserved 1990s P H I S H I N G Khan C. Smith -
  • 9. Common content Copyright IntelliPaat, All rightsreserved 1990s 2000s 3.6 million US $3.2 billion 12 months -- --
  • 10. Common content Copyright IntelliPaat, All rightsreserved 1990s 2000s 2010s 76%
  • 11. Common content Copyright IntelliPaat, All rightsreserved 1990s 2000s 2010s 2021 97% unable to recognize phishing 3% users report phishing 1.5 million new phishing sites Markets to reach $170.4 billion in 2022.
  • 12. How to prevent Phishing? User training • People can be trained to recognize phishing attempts • organizations run regular simulated phishing campaigns Filtering emails • Spam filters can reduce the number of phishing emails 2 factor authentication • A user must present both, a smart card and a password Email redaction • Use an email client that redacts URLs from email messages
  • 13. India: +91-7022374614 US: 1-800-216-8930 (TOLL FREE) support@intellipaat.com 24/7 Chat with Our Course Advisor sales@intellipaat.com