SlideShare une entreprise Scribd logo
1  sur  12
PHISHING
What is ‘Phishing’ ?


Phishing is the act of attempting to acquire
valuable information such as usernames,
passwords, credit cards details, account data,
etc by pretending as a trustworthy entity in an
electronic communication.
History of Phishing
Phreaking    + Fishing = Phishing
        Phreaking = Making phone calls for free back in
70’s.
     Fishing = Use bait to lure the target.
Phishing in 1995

 Target : AOL users (America Online Users)
 Purpose : Getting account passwords.
 Threat level : Low.
 Techniques : Similar name, social engineering.
History Of Phishing (cont.)
 Phishing in 2001
 Target : Ebayers and major banks.
 Purpose : Getting credit card numbers, accounts.
 Threat level : Medium.
 Techniques : Same in 1995.
 Phishing in 2007
 Target : Paypal, banks, ebay.
 Purpose : Bank accounts.
 Threat level : High.
 Techniques : Browser vulnerabilities.
Why they Phish?
Phishing    is like playing the odds
  - simple to do and high gain for little work.
  - no real knowledge necessary
  - 4.5 people out of 10 fall for it.
Most is for financial gain

   - Money
   - Account information.
   - Identity theft.
 Some do it to spread malicious programs that in turn
carry out others attacks.
Techniques of Phishing
Spear  Phishing.
Clone Phishing.
Whaling.
Link Manipulation.
Filter Evasion.
Website Forgery.
Phone Phishing.
Targets and Victims…
Phishers are mainly targeting the customers of
banks and online payment services.
The others sectors are :-
Health care.
Lotteries/ Contests.
Money transfer.
Worlds events.
Employment opportunities.
Damaged caused by Phishing…
20,00,000  emails are sent.
5% get to the end user – 1,00,000.
5% click on the phishing link – 5,000.
2% enter data into the phishing site – 100.
$1,200 from each person who enters data.
Potential reward - $1,20,000.

     In 2005, The David Levi phishing gang from
UK was caught. It operated for 12 months with 6
members and made over $3,60,000 from 160
people using an Ebay Phishing Scam.
How to detect Phishing?

Bad Grammar.
Generic Salutations.
Account Information request / threats from
companies we don’t use.
Hovering over links/ long URL service.
Unknown senders.
Anti – Phishing Steps

3P’s – Proclaim, Protect, Pursue.
 Proclaim in all correspondence the use of an
official mark.
Protect all messages, web pages with the mark.
Pursue all imposters
Possible Solution
Keep   the browser updated.
Keep the anti-virus updated.
Use a firewall and keep it turned on.
Use digitally signed documents only.
Never respond to an email asking for personal
information.
Never click on a link on the email. Retype the
address in a new window.
Presented By:-


 SAYANTAN SUR
   BCA(H) – 2



  THANK YOU

Contenu connexe

Tendances

Tendances (20)

What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Phishing.pdf
Phishing.pdfPhishing.pdf
Phishing.pdf
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Phishing
PhishingPhishing
Phishing
 
Teaching Your Staff About Phishing
Teaching Your Staff About PhishingTeaching Your Staff About Phishing
Teaching Your Staff About Phishing
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniques
 
Phishing attack
Phishing attackPhishing attack
Phishing attack
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Phishing
PhishingPhishing
Phishing
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Social engineering
Social engineering Social engineering
Social engineering
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 

En vedette (6)

Thriving in the social media jungle for internet marketing association 2013
Thriving in the social media jungle for internet marketing association 2013Thriving in the social media jungle for internet marketing association 2013
Thriving in the social media jungle for internet marketing association 2013
 
HOW I BROKE THE CONFEDERATE CODE (137 YEARS TOO LATE)
HOW I BROKE THE CONFEDERATE CODE (137 YEARS TOO LATE)HOW I BROKE THE CONFEDERATE CODE (137 YEARS TOO LATE)
HOW I BROKE THE CONFEDERATE CODE (137 YEARS TOO LATE)
 
RAZORPOINT SECURITY GLOSSARY
RAZORPOINT SECURITY GLOSSARYRAZORPOINT SECURITY GLOSSARY
RAZORPOINT SECURITY GLOSSARY
 
Next gen summit social media networking
Next gen summit social media networkingNext gen summit social media networking
Next gen summit social media networking
 
Network Security
Network SecurityNetwork Security
Network Security
 
Visual Studio IDE
Visual Studio IDEVisual Studio IDE
Visual Studio IDE
 

Similaire à Phising

Blue and White Minimal Professional Business Project Presentation .pptx
Blue and White Minimal Professional Business Project Presentation .pptxBlue and White Minimal Professional Business Project Presentation .pptx
Blue and White Minimal Professional Business Project Presentation .pptx
jennblair0830
 
ICT-phishing
ICT-phishingICT-phishing
ICT-phishing
MH BS
 
December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10
seadeloitte
 

Similaire à Phising (20)

Phishing-Updated
Phishing-UpdatedPhishing-Updated
Phishing-Updated
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing 1 vp
Phishing 1 vpPhishing 1 vp
Phishing 1 vp
 
Phishing
PhishingPhishing
Phishing
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud
 
Internet Phishing
Internet Phishing�Internet Phishing�
Internet Phishing
 
Phishing
PhishingPhishing
Phishing
 
Cyber Security Motivation
Cyber Security MotivationCyber Security Motivation
Cyber Security Motivation
 
Blue and White Minimal Professional Business Project Presentation .pptx
Blue and White Minimal Professional Business Project Presentation .pptxBlue and White Minimal Professional Business Project Presentation .pptx
Blue and White Minimal Professional Business Project Presentation .pptx
 
Phishing
PhishingPhishing
Phishing
 
Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Prevention
 
Phish Phry- Analysis paper
Phish Phry- Analysis paper Phish Phry- Analysis paper
Phish Phry- Analysis paper
 
ICT-phishing
ICT-phishingICT-phishing
ICT-phishing
 
Computer 4 ict
Computer 4 ictComputer 4 ict
Computer 4 ict
 
What is a phishing attack
What is a phishing attackWhat is a phishing attack
What is a phishing attack
 
December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10
 
Phishing & Pharming Explained.pdf
Phishing & Pharming Explained.pdfPhishing & Pharming Explained.pdf
Phishing & Pharming Explained.pdf
 

Plus de Sayantan Sur (10)

Image Encryption and Compression
Image Encryption and Compression Image Encryption and Compression
Image Encryption and Compression
 
Stack using Linked List
Stack using Linked ListStack using Linked List
Stack using Linked List
 
Stack using Array
Stack using ArrayStack using Array
Stack using Array
 
Array menu
Array menuArray menu
Array menu
 
Double linked list
Double linked listDouble linked list
Double linked list
 
Single linked list
Single linked listSingle linked list
Single linked list
 
Circular linked list
Circular linked listCircular linked list
Circular linked list
 
Decision Support System(DSS)
Decision Support System(DSS)Decision Support System(DSS)
Decision Support System(DSS)
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
International Terrorism
International Terrorism International Terrorism
International Terrorism
 

Dernier

The basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxThe basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptx
heathfieldcps1
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
中 央社
 

Dernier (20)

An Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptxAn Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptx
 
Behavioral-sciences-dr-mowadat rana (1).pdf
Behavioral-sciences-dr-mowadat rana (1).pdfBehavioral-sciences-dr-mowadat rana (1).pdf
Behavioral-sciences-dr-mowadat rana (1).pdf
 
The basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxThe basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptx
 
2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx
 
How to Analyse Profit of a Sales Order in Odoo 17
How to Analyse Profit of a Sales Order in Odoo 17How to Analyse Profit of a Sales Order in Odoo 17
How to Analyse Profit of a Sales Order in Odoo 17
 
Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
 
“O BEIJO” EM ARTE .
“O BEIJO” EM ARTE                       .“O BEIJO” EM ARTE                       .
“O BEIJO” EM ARTE .
 
Morse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptxMorse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptx
 
Navigating the Misinformation Minefield: The Role of Higher Education in the ...
Navigating the Misinformation Minefield: The Role of Higher Education in the ...Navigating the Misinformation Minefield: The Role of Higher Education in the ...
Navigating the Misinformation Minefield: The Role of Higher Education in the ...
 
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdfPost Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
 
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
 
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General QuizPragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
 
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxslides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17
 
Championnat de France de Tennis de table/
Championnat de France de Tennis de table/Championnat de France de Tennis de table/
Championnat de France de Tennis de table/
 
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
 Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
 
The Ball Poem- John Berryman_20240518_001617_0000.pptx
The Ball Poem- John Berryman_20240518_001617_0000.pptxThe Ball Poem- John Berryman_20240518_001617_0000.pptx
The Ball Poem- John Berryman_20240518_001617_0000.pptx
 

Phising

  • 2. What is ‘Phishing’ ? Phishing is the act of attempting to acquire valuable information such as usernames, passwords, credit cards details, account data, etc by pretending as a trustworthy entity in an electronic communication.
  • 3. History of Phishing Phreaking + Fishing = Phishing Phreaking = Making phone calls for free back in 70’s. Fishing = Use bait to lure the target. Phishing in 1995 Target : AOL users (America Online Users) Purpose : Getting account passwords. Threat level : Low. Techniques : Similar name, social engineering.
  • 4. History Of Phishing (cont.)  Phishing in 2001  Target : Ebayers and major banks.  Purpose : Getting credit card numbers, accounts.  Threat level : Medium.  Techniques : Same in 1995.  Phishing in 2007  Target : Paypal, banks, ebay.  Purpose : Bank accounts.  Threat level : High.  Techniques : Browser vulnerabilities.
  • 5. Why they Phish? Phishing is like playing the odds - simple to do and high gain for little work. - no real knowledge necessary - 4.5 people out of 10 fall for it. Most is for financial gain - Money - Account information. - Identity theft.  Some do it to spread malicious programs that in turn carry out others attacks.
  • 6. Techniques of Phishing Spear Phishing. Clone Phishing. Whaling. Link Manipulation. Filter Evasion. Website Forgery. Phone Phishing.
  • 7. Targets and Victims… Phishers are mainly targeting the customers of banks and online payment services. The others sectors are :- Health care. Lotteries/ Contests. Money transfer. Worlds events. Employment opportunities.
  • 8. Damaged caused by Phishing… 20,00,000 emails are sent. 5% get to the end user – 1,00,000. 5% click on the phishing link – 5,000. 2% enter data into the phishing site – 100. $1,200 from each person who enters data. Potential reward - $1,20,000. In 2005, The David Levi phishing gang from UK was caught. It operated for 12 months with 6 members and made over $3,60,000 from 160 people using an Ebay Phishing Scam.
  • 9. How to detect Phishing? Bad Grammar. Generic Salutations. Account Information request / threats from companies we don’t use. Hovering over links/ long URL service. Unknown senders.
  • 10. Anti – Phishing Steps 3P’s – Proclaim, Protect, Pursue.  Proclaim in all correspondence the use of an official mark. Protect all messages, web pages with the mark. Pursue all imposters
  • 11. Possible Solution Keep the browser updated. Keep the anti-virus updated. Use a firewall and keep it turned on. Use digitally signed documents only. Never respond to an email asking for personal information. Never click on a link on the email. Retype the address in a new window.
  • 12. Presented By:- SAYANTAN SUR BCA(H) – 2 THANK YOU