SlideShare une entreprise Scribd logo
1  sur  32
• Pronounced “fishing”
• The word has its Origin from two words “Password
Harvesting” or fishing for Passwords
• Phishing is an online form of pretexting, a kind of
deception in which an attacker pretends to be
someone else in order to obtain sensitive
information from the victim.
• Also known as "brand spoofing“.
• Phishers are phishing artists.
• Phishing is a way of fraudulently acquiring sensitive
information using social engineering and technical
subterfuge.
• It tries to trick users with official-looking messages
− Credit card
− Bank account
− eBay
− PayPal
• Some phishing e-mails also
contain malicious or unwanted
software that can track your
activities or slow your computer
1. Unsolicited requests for sensitive information
2. Content appears genuine
3. Disguised hyperlinks and sender address
4. Email consists of a clickable
image
5. Generic Greetings
6. Use various ruses to entice
recipients to click
What to do if you Receive a
Suspected Phishing Scam
≠ DO NOT click on any links in the scam email.
≠ DO NOT supply any personal information of
any kind as a result of the email
≠ DO NOT reply to the email or attempt to
contact the senders in any way.
≠ DO NOT supply any information on the bogus
website that may appear in your browser if
you have clicked a link in the email.
≠ DO NOT open any
attachments that arrive with the
email.
≠ REPORT the phishing scam.
≠ DELETE the email from your
computer as soon as possible.
 Recognise the scam
 Report the scam
 Stop the scam
 Planning
 Setup
 Attack
 Collection
 Identity Theft and Fraud
 Unawareness among public
 Unawareness of policy
 Technical sophistication
Techniques of
Phishing Scams
1) Man-in-the-middle
Attacks
2) URL Obfuscation Attacks
3) XSS (Cross-site Scripting)
WHY YOUR PERSONAL
ACCOUNT
IS
A TARGET
Phishing – A Cyber
Crime Provisions of
Information
Technology Act, 2000
• Section 66
• Section 66A
• Section 66 C
• Section 66 D
1. Keep antivirus up to date
2. Do not click on hyperlinks in emails
3. Advantage of anti-spam software
4. Get educated
5. Use anti-spam software
6. Firewall
7. Use back-up system
8. Not to enter sensitive information into
pop-up windows
9. Secure the hosts file
10. Protect against DNS pharming
attacks
AMRITA HEMRAJANI (17)
PEARLENE JASAVALA (24)
KHYATI NANDU (38)
SANAYA PATEL (40)
KRISHMA SANDESRA (42)
VATSAL SHAH (50)
Understanding Phishing Scams and How to Protect Yourself

Contenu connexe

Tendances

Business Email Compromise Scam
Business Email Compromise ScamBusiness Email Compromise Scam
Business Email Compromise ScamGuardian Analytics
 
Frauds & Scams in Banks
Frauds & Scams in BanksFrauds & Scams in Banks
Frauds & Scams in BanksAkshay Virkar
 
Fraud Risk and Control
Fraud Risk and ControlFraud Risk and Control
Fraud Risk and ControlWeaverCPAs
 
Cyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav GaurCyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav GaurVaibhav's Group
 
Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniquesSushil Kumar
 
Phising a Threat to Network Security
Phising a Threat to Network SecurityPhising a Threat to Network Security
Phising a Threat to Network Securityanjuselina
 
Cybercrime
CybercrimeCybercrime
CybercrimeKomal003
 
Cybersecurity, Hacking, and Privacy
Cybersecurity, Hacking, and Privacy Cybersecurity, Hacking, and Privacy
Cybersecurity, Hacking, and Privacy Nicholas Davis
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud Dixita S
 
Preventing Bank's Fraud and Forgery
Preventing Bank's Fraud and ForgeryPreventing Bank's Fraud and Forgery
Preventing Bank's Fraud and ForgeryAsad Hameed
 
Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 
Unified payment interface and its security
Unified payment interface and its security Unified payment interface and its security
Unified payment interface and its security Akshay Dixit
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft pptCut 2 Shreds
 

Tendances (20)

Phishing
PhishingPhishing
Phishing
 
Business Email Compromise Scam
Business Email Compromise ScamBusiness Email Compromise Scam
Business Email Compromise Scam
 
Frauds & Scams in Banks
Frauds & Scams in BanksFrauds & Scams in Banks
Frauds & Scams in Banks
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Fraud Risk and Control
Fraud Risk and ControlFraud Risk and Control
Fraud Risk and Control
 
Cyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav GaurCyber crime presentation By Vaibhav Gaur
Cyber crime presentation By Vaibhav Gaur
 
Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniques
 
Frauds and scams
Frauds and scamsFrauds and scams
Frauds and scams
 
Phising a Threat to Network Security
Phising a Threat to Network SecurityPhising a Threat to Network Security
Phising a Threat to Network Security
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Online Scams and Frauds
Online Scams and FraudsOnline Scams and Frauds
Online Scams and Frauds
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybersecurity, Hacking, and Privacy
Cybersecurity, Hacking, and Privacy Cybersecurity, Hacking, and Privacy
Cybersecurity, Hacking, and Privacy
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud
 
Preventing Bank's Fraud and Forgery
Preventing Bank's Fraud and ForgeryPreventing Bank's Fraud and Forgery
Preventing Bank's Fraud and Forgery
 
Money laundering
Money laundering Money laundering
Money laundering
 
Cashless economy
Cashless economyCashless economy
Cashless economy
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Unified payment interface and its security
Unified payment interface and its security Unified payment interface and its security
Unified payment interface and its security
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft ppt
 

En vedette

Shield Your Business Combat Phishing Attacks
Shield Your Business   Combat Phishing AttacksShield Your Business   Combat Phishing Attacks
Shield Your Business Combat Phishing AttacksKarl Kispert
 
Cyberprzestępcy jutra - ile kosztują?
Cyberprzestępcy jutra - ile kosztują?Cyberprzestępcy jutra - ile kosztują?
Cyberprzestępcy jutra - ile kosztują?Logicaltrust pl
 
Phishing Attacks - Are You Ready to Respond?
Phishing Attacks - Are You Ready to Respond?Phishing Attacks - Are You Ready to Respond?
Phishing Attacks - Are You Ready to Respond?Splunk
 
Web Security Threat Report on Spear Phishing Attacks - Symantec
Web Security Threat Report on Spear Phishing Attacks - SymantecWeb Security Threat Report on Spear Phishing Attacks - Symantec
Web Security Threat Report on Spear Phishing Attacks - SymantecCheapSSLsecurity
 
APT x 3 - trzy firmy, trzy wektory ataków, trzy do zera - wybrane studium prz...
APT x 3 - trzy firmy, trzy wektory ataków, trzy do zera - wybrane studium prz...APT x 3 - trzy firmy, trzy wektory ataków, trzy do zera - wybrane studium prz...
APT x 3 - trzy firmy, trzy wektory ataków, trzy do zera - wybrane studium prz...Logicaltrust pl
 
Discreet Business Proposition
Discreet Business PropositionDiscreet Business Proposition
Discreet Business Propositionabphillips30
 
9 dinámica hacer lo correcto o encubrir a un amigo..
9 dinámica hacer lo correcto o encubrir a un amigo..9 dinámica hacer lo correcto o encubrir a un amigo..
9 dinámica hacer lo correcto o encubrir a un amigo..University of Madrid
 
Dossier de prensa fiab alimentaria 2014
Dossier de prensa fiab   alimentaria 2014Dossier de prensa fiab   alimentaria 2014
Dossier de prensa fiab alimentaria 2014FIAB
 
Excellent Varieties and Best Quality In Italian Tiles For Your Total Home Mak...
Excellent Varieties and Best Quality In Italian Tiles For Your Total Home Mak...Excellent Varieties and Best Quality In Italian Tiles For Your Total Home Mak...
Excellent Varieties and Best Quality In Italian Tiles For Your Total Home Mak...EBEES DECOR
 
Especial La Voz de Galicia. A Mariña en fitur 2014. Semana Santa Viveiro
Especial La Voz de Galicia. A Mariña en fitur 2014. Semana Santa ViveiroEspecial La Voz de Galicia. A Mariña en fitur 2014. Semana Santa Viveiro
Especial La Voz de Galicia. A Mariña en fitur 2014. Semana Santa ViveiroCofrades de Viveiro
 
Weiche Flanellhemden in schicken Dessins
Weiche Flanellhemden in schicken DessinsWeiche Flanellhemden in schicken Dessins
Weiche Flanellhemden in schicken DessinsHirmer
 
Iseo Immobiliare | Agenzia Immobiliare Iseo Brescia - Pisogne villa in vendita
Iseo Immobiliare | Agenzia Immobiliare Iseo Brescia - Pisogne villa in venditaIseo Immobiliare | Agenzia Immobiliare Iseo Brescia - Pisogne villa in vendita
Iseo Immobiliare | Agenzia Immobiliare Iseo Brescia - Pisogne villa in venditaiseoimmobiliare
 
Cy A Nuestros Servicios De Consultoria Tributaria Compatibility Mode
Cy A   Nuestros Servicios De Consultoria Tributaria Compatibility ModeCy A   Nuestros Servicios De Consultoria Tributaria Compatibility Mode
Cy A Nuestros Servicios De Consultoria Tributaria Compatibility Moderafaelvarela
 

En vedette (20)

Shield Your Business Combat Phishing Attacks
Shield Your Business   Combat Phishing AttacksShield Your Business   Combat Phishing Attacks
Shield Your Business Combat Phishing Attacks
 
Cyberprzestępcy jutra - ile kosztują?
Cyberprzestępcy jutra - ile kosztują?Cyberprzestępcy jutra - ile kosztują?
Cyberprzestępcy jutra - ile kosztują?
 
Phishing Attacks - Are You Ready to Respond?
Phishing Attacks - Are You Ready to Respond?Phishing Attacks - Are You Ready to Respond?
Phishing Attacks - Are You Ready to Respond?
 
Web Security Threat Report on Spear Phishing Attacks - Symantec
Web Security Threat Report on Spear Phishing Attacks - SymantecWeb Security Threat Report on Spear Phishing Attacks - Symantec
Web Security Threat Report on Spear Phishing Attacks - Symantec
 
APT x 3 - trzy firmy, trzy wektory ataków, trzy do zera - wybrane studium prz...
APT x 3 - trzy firmy, trzy wektory ataków, trzy do zera - wybrane studium prz...APT x 3 - trzy firmy, trzy wektory ataków, trzy do zera - wybrane studium prz...
APT x 3 - trzy firmy, trzy wektory ataków, trzy do zera - wybrane studium prz...
 
Phishing attack till now
Phishing attack till nowPhishing attack till now
Phishing attack till now
 
Discreet Business Proposition
Discreet Business PropositionDiscreet Business Proposition
Discreet Business Proposition
 
9 dinámica hacer lo correcto o encubrir a un amigo..
9 dinámica hacer lo correcto o encubrir a un amigo..9 dinámica hacer lo correcto o encubrir a un amigo..
9 dinámica hacer lo correcto o encubrir a un amigo..
 
Dossier de prensa fiab alimentaria 2014
Dossier de prensa fiab   alimentaria 2014Dossier de prensa fiab   alimentaria 2014
Dossier de prensa fiab alimentaria 2014
 
Excellent Varieties and Best Quality In Italian Tiles For Your Total Home Mak...
Excellent Varieties and Best Quality In Italian Tiles For Your Total Home Mak...Excellent Varieties and Best Quality In Italian Tiles For Your Total Home Mak...
Excellent Varieties and Best Quality In Italian Tiles For Your Total Home Mak...
 
Sexo salvaje
Sexo salvajeSexo salvaje
Sexo salvaje
 
Grow MN Central Region 2012
Grow MN Central Region 2012Grow MN Central Region 2012
Grow MN Central Region 2012
 
Gacetilla de prensa 20 05-2014
Gacetilla de prensa 20 05-2014Gacetilla de prensa 20 05-2014
Gacetilla de prensa 20 05-2014
 
Especial La Voz de Galicia. A Mariña en fitur 2014. Semana Santa Viveiro
Especial La Voz de Galicia. A Mariña en fitur 2014. Semana Santa ViveiroEspecial La Voz de Galicia. A Mariña en fitur 2014. Semana Santa Viveiro
Especial La Voz de Galicia. A Mariña en fitur 2014. Semana Santa Viveiro
 
Treball diasdeclase 3rb
Treball diasdeclase 3rbTreball diasdeclase 3rb
Treball diasdeclase 3rb
 
Weiche Flanellhemden in schicken Dessins
Weiche Flanellhemden in schicken DessinsWeiche Flanellhemden in schicken Dessins
Weiche Flanellhemden in schicken Dessins
 
Iseo Immobiliare | Agenzia Immobiliare Iseo Brescia - Pisogne villa in vendita
Iseo Immobiliare | Agenzia Immobiliare Iseo Brescia - Pisogne villa in venditaIseo Immobiliare | Agenzia Immobiliare Iseo Brescia - Pisogne villa in vendita
Iseo Immobiliare | Agenzia Immobiliare Iseo Brescia - Pisogne villa in vendita
 
Un Nuevo Mundo 2.0
Un Nuevo Mundo 2.0Un Nuevo Mundo 2.0
Un Nuevo Mundo 2.0
 
Cy A Nuestros Servicios De Consultoria Tributaria Compatibility Mode
Cy A   Nuestros Servicios De Consultoria Tributaria Compatibility ModeCy A   Nuestros Servicios De Consultoria Tributaria Compatibility Mode
Cy A Nuestros Servicios De Consultoria Tributaria Compatibility Mode
 
Social hiring
Social hiringSocial hiring
Social hiring
 

Similaire à Understanding Phishing Scams and How to Protect Yourself

Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks pptAryan Ragu
 
IT2252_Presentation_Group03.pptx
IT2252_Presentation_Group03.pptxIT2252_Presentation_Group03.pptx
IT2252_Presentation_Group03.pptxNLFunnyFunky
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)aleeya91
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingSachin Saini
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureLourdes Paloma Gimenez
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxStephen Jesukanth Martin
 
Spear Phishing Attacks
Spear Phishing AttacksSpear Phishing Attacks
Spear Phishing AttacksIsaacDavid27
 
Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & PrivacyAlexine Marier
 
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awarenessOWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awarenessMaherHamza9
 
HACKING AND PHISHING
HACKING AND PHISHINGHACKING AND PHISHING
HACKING AND PHISHINGsanthuana sg
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraudRadiant Minds
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptxTanvir Amin
 

Similaire à Understanding Phishing Scams and How to Protect Yourself (20)

Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
IT2252_Presentation_Group03.pptx
IT2252_Presentation_Group03.pptxIT2252_Presentation_Group03.pptx
IT2252_Presentation_Group03.pptx
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptx
 
Pp8
Pp8Pp8
Pp8
 
Spear Phishing Attacks
Spear Phishing AttacksSpear Phishing Attacks
Spear Phishing Attacks
 
Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & Privacy
 
Phishing
PhishingPhishing
Phishing
 
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awarenessOWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
 
PHISHING attack
PHISHING attack PHISHING attack
PHISHING attack
 
HACKING AND PHISHING
HACKING AND PHISHINGHACKING AND PHISHING
HACKING AND PHISHING
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
 
Phishing
PhishingPhishing
Phishing
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
Phishing
PhishingPhishing
Phishing
 

Plus de Krishma Sandesra (10)

silver bullion market
silver bullion marketsilver bullion market
silver bullion market
 
entry barriers for banks
entry barriers for banksentry barriers for banks
entry barriers for banks
 
Monetary policy of rbi
Monetary policy of rbiMonetary policy of rbi
Monetary policy of rbi
 
Jp morgan final ppt
Jp morgan final pptJp morgan final ppt
Jp morgan final ppt
 
Festivals of india old
Festivals of india oldFestivals of india old
Festivals of india old
 
Crm final ppt
Crm final pptCrm final ppt
Crm final ppt
 
Tisco
Tisco Tisco
Tisco
 
Crm final ppt
Crm final pptCrm final ppt
Crm final ppt
 
Monetary policy of rbi
Monetary policy of rbiMonetary policy of rbi
Monetary policy of rbi
 
Em ppt
Em pptEm ppt
Em ppt
 

Dernier

Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 

Dernier (20)

Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 

Understanding Phishing Scams and How to Protect Yourself

  • 1.
  • 2.
  • 3. • Pronounced “fishing” • The word has its Origin from two words “Password Harvesting” or fishing for Passwords • Phishing is an online form of pretexting, a kind of deception in which an attacker pretends to be someone else in order to obtain sensitive information from the victim. • Also known as "brand spoofing“. • Phishers are phishing artists.
  • 4.
  • 5. • Phishing is a way of fraudulently acquiring sensitive information using social engineering and technical subterfuge. • It tries to trick users with official-looking messages − Credit card − Bank account − eBay − PayPal • Some phishing e-mails also contain malicious or unwanted software that can track your activities or slow your computer
  • 6. 1. Unsolicited requests for sensitive information 2. Content appears genuine 3. Disguised hyperlinks and sender address
  • 7. 4. Email consists of a clickable image 5. Generic Greetings 6. Use various ruses to entice recipients to click
  • 8.
  • 9.
  • 10. What to do if you Receive a Suspected Phishing Scam ≠ DO NOT click on any links in the scam email. ≠ DO NOT supply any personal information of any kind as a result of the email ≠ DO NOT reply to the email or attempt to contact the senders in any way. ≠ DO NOT supply any information on the bogus website that may appear in your browser if you have clicked a link in the email.
  • 11. ≠ DO NOT open any attachments that arrive with the email. ≠ REPORT the phishing scam. ≠ DELETE the email from your computer as soon as possible.
  • 12.
  • 13.  Recognise the scam  Report the scam  Stop the scam
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.  Planning  Setup  Attack  Collection  Identity Theft and Fraud
  • 19.
  • 20.  Unawareness among public  Unawareness of policy  Technical sophistication
  • 21.
  • 22. Techniques of Phishing Scams 1) Man-in-the-middle Attacks 2) URL Obfuscation Attacks 3) XSS (Cross-site Scripting)
  • 23.
  • 25. Phishing – A Cyber Crime Provisions of Information Technology Act, 2000 • Section 66 • Section 66A • Section 66 C • Section 66 D
  • 26. 1. Keep antivirus up to date 2. Do not click on hyperlinks in emails 3. Advantage of anti-spam software
  • 27. 4. Get educated 5. Use anti-spam software 6. Firewall 7. Use back-up system
  • 28. 8. Not to enter sensitive information into pop-up windows 9. Secure the hosts file 10. Protect against DNS pharming attacks
  • 29.
  • 30.
  • 31. AMRITA HEMRAJANI (17) PEARLENE JASAVALA (24) KHYATI NANDU (38) SANAYA PATEL (40) KRISHMA SANDESRA (42) VATSAL SHAH (50)