SlideShare une entreprise Scribd logo
1  sur  60
EMAIL AND WEB
  SECURITY
The first e-mail message was sent
in 1971 by an engineer named Ray
Tomlinson.
WHAT IS EMAIL?

• E-Mail  Electronic mail
• A method of exchanging messages in digital form.
• E-mail systems are based on a store-and-forward
method in which e-mail server accept, forwards,
delivers and stores messages on behalf of users.
Users only need to connect to the internet through a
computer for the duration of message submission or
retrieval.
Email Service Providers
SECURITY FEATURES OF SOME
 EMAIL SERVICE PROVIDERS
FILTERS
MULTIPLE SIGN-IN
 With multiple sign-in, you can sign in to up to
  ten
accounts in the same web browser. If you sign out
of any Google product from any of your accounts,
you’ll be signed out of all your Google Accounts at
once.

   Security issue: -
    If one account is compromised there is a threat to
    all the accounts.
AUTHORISING
APPLICATIONS & SITES
   Activating this feature allows 
    non-Google websites and applications to access
    your account and sync with your data

   Security issue: -
    Google doesn’t review or endorse any third-party
    websites, so make sure you trust the website
    and understand Google's privacy policy before
    approving
2-STEP VERIFICATION

   It adds a layer of security to your Google Account
    by requiring access to your phone - as well as
    your username and password - when you sign in
   If someone steals or guesses your password, that
    person can’t sign in to your account because they
    don’t have your phone.
MAKE SURE YOU READ
 Terms of usage policy – outlines how you are
  supposed to use Google’s platform
  Mandatory to provide under Indian Cyber Law
(Sec. 79)

   Privacy policy – outlines Information that
    Google collect and how they use it
Mandatory to provide under Indian Cyber Law (Sec.
43A)
SIGN-IN SEAL

A sign-in seal is a secret message or photo that Yahoo!
will display on this computer only.

Look for it every time you sign in, to make sure you're
on a genuine Yahoo! site.

If the message, photo, or colors are different, you may
have landed on a phishing site.
PHISHING - A PRACTICAL
CASE STUDY
WHAT IS PHISHING?
   Phishing involves fraudulently acquiring
    sensitive information (e.g. passwords, credit card
    details etc) by masquerading as a trusted entity.
THE SITES
   www.noodlebank.com (i.e NOODLEBANK.com)
   www.nood1ebank.com (i.e NOOD1EBANK.com)
THE REAL SITE
THE SPOOFED EMAIL
THE SPOOFING
   The link appears as
www.noodlebank.com (i.e NOODLEBANK.com)

   But actually it links to
www.nood1ebank.com (i.e NOOD1EBANK.com)
THE FAKE SITE
THE “STEAL”
•   When Debasis entered his username-password at
    the spoofed website, the username-password was
    sent across to the criminal carrying out the
    phishing attack.
MORE EXAMPLES…
•   In this case study, the user was enticed with a
    misleading URL. Such urls can be created easily
    using simple html code such as:

         <a href=http://www.nood1ebank.com>
            http://www.noodlebank.com</a>

•   This link displays the correct url but on clicking
    takes the user to the spoofed url.
USING A URL WITH AN IP
ADDRESS
http://www.NOODLEBANK.com@67.19.217.53

   This url does not lead to noodlebank.com, it leads
    to the website on the IP address 67.19.217.53
USING A SPLIT DOMAIN NAME
http://www.NOODLEBANK.com.securitycheck.sec
  ure-login.nood1ebank.com/login.asp

   This url does not lead to noodlebank.com, it leads
    to the spoofed website.
USING AN OBFUSCATED URL
http://www.NOODLEBANK.com%00@%36%37%2e
  %31%39%2e%32%31%37%2e%35%33

   This url does not lead to noodlebank.com, it leads
    to the website on the IP address 67.19.217.53
HEX TO ASCII CONVERTER




http://www.dolcevie.com/js/converter.html
TEST




www.phish-no-phish.com
SENDING FAKE EMAILS
 http://mailz.funmaza.co.uk/
 http://deadfake.com/Send.aspx
UNDERSTANDING FAKE
           MAIL
   E-mail headers analysis –
    Email header is the information that travels with every
    email, containing details about the sender, route and
    receiver.
ANALYZING HEADERS




            To see the g-mail header
               click on the arrow
              button next to the
             “Reply” option  click
               on “show original”
Header of the mail sent
 by using “fakemailer
 Analyse Message ID
Email Bombing
Email Bombing
EMAIL FRAUDS
   Bogus offers  Vigra @ 80% discount price
   Requests for help  email promising treasure
   Lottery scams
   Confidence trick
   Get-rich-quick schemes
   Money mules
AVOIDING EMAIL FRAUD
   Keep one's email address as secret as possible
   Use a spam filter
   Notice the several spelling errors in the body of
    the "official looking" email
   Ignore unsolicited emails of all types, simply
    deleting them
   Don’t be greedy, since greed is often the element
    that allows one to be "hooked"
Email
-sagar.rahurkar@iqspl.com
   Phone : 09623444448
  No FB pings please…!

Contenu connexe

En vedette

Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
Sheetal Verma
 
Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policy
charlesgarrett
 

En vedette (15)

Graphics programming in Java
Graphics programming in JavaGraphics programming in Java
Graphics programming in Java
 
Java packages
Java packagesJava packages
Java packages
 
Packages and inbuilt classes of java
Packages and inbuilt classes of javaPackages and inbuilt classes of java
Packages and inbuilt classes of java
 
Network Security Primer
Network Security PrimerNetwork Security Primer
Network Security Primer
 
Email Security
Email SecurityEmail Security
Email Security
 
pgp s mime
pgp s mimepgp s mime
pgp s mime
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 
Threats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaThreats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - Shimna
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & process
 
Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policy
 
Email security - Netwroking
Email security - Netwroking Email security - Netwroking
Email security - Netwroking
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Digital signature
Digital signatureDigital signature
Digital signature
 

Similaire à Email and web security

Phishing
PhishingPhishing
Phishing
Syahida
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
aleeya91
 
Phishing scams in banking ppt
Phishing scams in banking pptPhishing scams in banking ppt
Phishing scams in banking ppt
Krishma Sandesra
 

Similaire à Email and web security (20)

Phishing
PhishingPhishing
Phishing
 
Spam & Phishing
Spam & PhishingSpam & Phishing
Spam & Phishing
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself Online
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
Phis
PhisPhis
Phis
 
Phishing
PhishingPhishing
Phishing
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
phishing technique.pptx
phishing technique.pptxphishing technique.pptx
phishing technique.pptx
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
 
Security-Awareness-Training.pptx
Security-Awareness-Training.pptxSecurity-Awareness-Training.pptx
Security-Awareness-Training.pptx
 
Chapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & SafetyChapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & Safety
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber Monday
 
Phishing
PhishingPhishing
Phishing
 
Phishing scams in banking ppt
Phishing scams in banking pptPhishing scams in banking ppt
Phishing scams in banking ppt
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
Computer crime by inqilab patel
Computer crime by inqilab patelComputer crime by inqilab patel
Computer crime by inqilab patel
 
Day 2
Day 2Day 2
Day 2
 
Digital security for Sri Lankan activists
Digital security for Sri Lankan activistsDigital security for Sri Lankan activists
Digital security for Sri Lankan activists
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Email and web security

  • 1. EMAIL AND WEB SECURITY
  • 2. The first e-mail message was sent in 1971 by an engineer named Ray Tomlinson.
  • 3. WHAT IS EMAIL? • E-Mail  Electronic mail • A method of exchanging messages in digital form. • E-mail systems are based on a store-and-forward method in which e-mail server accept, forwards, delivers and stores messages on behalf of users. Users only need to connect to the internet through a computer for the duration of message submission or retrieval.
  • 5. SECURITY FEATURES OF SOME EMAIL SERVICE PROVIDERS
  • 6.
  • 7.
  • 8.
  • 10.
  • 11.
  • 12. MULTIPLE SIGN-IN  With multiple sign-in, you can sign in to up to ten accounts in the same web browser. If you sign out of any Google product from any of your accounts, you’ll be signed out of all your Google Accounts at once.  Security issue: - If one account is compromised there is a threat to all the accounts.
  • 13. AUTHORISING APPLICATIONS & SITES  Activating this feature allows  non-Google websites and applications to access your account and sync with your data  Security issue: - Google doesn’t review or endorse any third-party websites, so make sure you trust the website and understand Google's privacy policy before approving
  • 14. 2-STEP VERIFICATION  It adds a layer of security to your Google Account by requiring access to your phone - as well as your username and password - when you sign in  If someone steals or guesses your password, that person can’t sign in to your account because they don’t have your phone.
  • 15. MAKE SURE YOU READ  Terms of usage policy – outlines how you are supposed to use Google’s platform Mandatory to provide under Indian Cyber Law (Sec. 79)  Privacy policy – outlines Information that Google collect and how they use it Mandatory to provide under Indian Cyber Law (Sec. 43A)
  • 16.
  • 17. SIGN-IN SEAL A sign-in seal is a secret message or photo that Yahoo! will display on this computer only. Look for it every time you sign in, to make sure you're on a genuine Yahoo! site. If the message, photo, or colors are different, you may have landed on a phishing site.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23. PHISHING - A PRACTICAL CASE STUDY
  • 24. WHAT IS PHISHING?  Phishing involves fraudulently acquiring sensitive information (e.g. passwords, credit card details etc) by masquerading as a trusted entity.
  • 25. THE SITES  www.noodlebank.com (i.e NOODLEBANK.com)  www.nood1ebank.com (i.e NOOD1EBANK.com)
  • 27.
  • 28.
  • 29.
  • 30.
  • 32. THE SPOOFING  The link appears as www.noodlebank.com (i.e NOODLEBANK.com)  But actually it links to www.nood1ebank.com (i.e NOOD1EBANK.com)
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40. THE “STEAL” • When Debasis entered his username-password at the spoofed website, the username-password was sent across to the criminal carrying out the phishing attack.
  • 41.
  • 42. MORE EXAMPLES… • In this case study, the user was enticed with a misleading URL. Such urls can be created easily using simple html code such as: <a href=http://www.nood1ebank.com> http://www.noodlebank.com</a> • This link displays the correct url but on clicking takes the user to the spoofed url.
  • 43. USING A URL WITH AN IP ADDRESS http://www.NOODLEBANK.com@67.19.217.53  This url does not lead to noodlebank.com, it leads to the website on the IP address 67.19.217.53
  • 44. USING A SPLIT DOMAIN NAME http://www.NOODLEBANK.com.securitycheck.sec ure-login.nood1ebank.com/login.asp  This url does not lead to noodlebank.com, it leads to the spoofed website.
  • 45. USING AN OBFUSCATED URL http://www.NOODLEBANK.com%00@%36%37%2e %31%39%2e%32%31%37%2e%35%33  This url does not lead to noodlebank.com, it leads to the website on the IP address 67.19.217.53
  • 46. HEX TO ASCII CONVERTER http://www.dolcevie.com/js/converter.html
  • 48. SENDING FAKE EMAILS  http://mailz.funmaza.co.uk/  http://deadfake.com/Send.aspx
  • 49. UNDERSTANDING FAKE MAIL  E-mail headers analysis – Email header is the information that travels with every email, containing details about the sender, route and receiver.
  • 50. ANALYZING HEADERS To see the g-mail header click on the arrow button next to the “Reply” option  click on “show original”
  • 51. Header of the mail sent by using “fakemailer Analyse Message ID
  • 54.
  • 55.
  • 56.
  • 57.
  • 58. EMAIL FRAUDS  Bogus offers  Vigra @ 80% discount price  Requests for help  email promising treasure  Lottery scams  Confidence trick  Get-rich-quick schemes  Money mules
  • 59. AVOIDING EMAIL FRAUD  Keep one's email address as secret as possible  Use a spam filter  Notice the several spelling errors in the body of the "official looking" email  Ignore unsolicited emails of all types, simply deleting them  Don’t be greedy, since greed is often the element that allows one to be "hooked"
  • 60. Email -sagar.rahurkar@iqspl.com Phone : 09623444448 No FB pings please…!