SlideShare a Scribd company logo
3
Most read
4
Most read
5
Most read
Seminar
On
Phishing
Attack
Presented By:
Prajakta Shinde
CONTENTS
 Introduction
 What is Phishing
 How does phishing work?
 What the are dangers of phishing attacks?
 Phishing Examples
 The different flavor of Phishing attack
 Types of Phishing
 How do I protect against phishing attacks?
 Causes of Phishing
 Effects of Phishing
 Conclusion
 Reference
INTRODUCTION
 Phishing is the most powerful and popular attack for
hacking into emails and web accounts.
 Cyber criminals use this attack to hack into bank
accounts, Facebook accounts and email account of
innocent people.
 Every year, most of the biggest cyber crime case
involve this attack.
 So we must know what is Phishing and how to
protect your accounts from phishing attack.
WHAT IS PHISHING?
 Phishing is the act of fooling a computer user into
submitting personal information by creating a
counterfeit it website that looks like a real (and
trusted)site.
 It is a hacker technique of "fishing" for passwords
and other secret financial info.
HOW DOES PHISHING WORK?
PHISHING EXAMPLES
PHISHING EXAMPLES
PHISHING EXAMPLES
THE DIFFERENT FLAVOR OF PHISHING ATTACK
TYPES OF PHISHING:
1) Deceptive phishing
2) Spear phishing
3) Whaling
4) Pharming
TYPES OF PHISHING
1. Deceptive phishing:
 Sending a deceptive email, in bulk, with a “call to action” that
demands the recipient click on a link.
 In this case, an attacker attempts to obtain confidential
information from the victims.
 Attackers use the information to steal money or to launch
other attacks.
 E.g A fake email from a bank asking you to click a link and
verify your account details.
TYPES OF PHISHING
2. Spear phishing:
 Spear phishing targets specific individuals instead of a wide
group of people.
 Attackers often research their victims on social media and
other sites.
 That way, they can customize their communications and
appear more authentic.
 Spear phishing is often the first step used to penetrate a
company’s defenses and carry out a targeted attack.
TYPES OF PHISHING
3.Whaling:
 When attackers go after a “big fish” like a CEO,
it’s called whaling.
 These attackers often spend considerable time
profiling the target to find the opportune moment
and means of stealing login credentials.
 Whaling is of particular concern because high-
level executives are able to access a great deal
of company information.
TYPES OF PHISHING
4.Pharming
 Similar to phishing, pharming sends users to a
fraudulent website that appears to be legitimate.
 However, in this case, victims do not even have
to click a malicious link to be taken to the bogus
site.
 Attackers can infect either the user’s computer
or the website’s DNS server and redirect the
user to a fake site even if the correct URL is
typed in.
WHAT THE ARE DANGERS OF PHISHING
ATTACKS?
 Sometimes attackers are satisfied with getting a
victim’s credit card information or other personal
data for financial gain.
 Other times, phishing emails are sent to obtain
employee login information or other details for
use in an advanced attack against a specific
company.
HOW DO I PROTECT AGAINST PHISHING
ATTACKS?
1.User education
 One way to protect your organization from
phishing is user education.
 Education should involve all employees.
 High-level executives are often a target Teach
them how to recognize a phishing email and
what to do when they receive one.
 Simulation exercises are also key for assessing
how your employees react to a staged phishing
attack.
2.Security technology
 No single cyber security technology can
prevent phishing attacks.
 Instead, organizations must take a layered
approach to reduce the number of attacks
and lessen their impact when they do occur.
 Network security technologies that should be
implemented include email and web security,
malware protection, user behavior
monitoring, and access control.
CAUSES OF PHISHING
 Misleading e-mails
 No check of source address
 Vulnerability in browsers
 No strong authentication at websites of banks and
financial institutions
 Limited use of digital signatures
 Non-availability of secure desktop tools
 Lack of user awareness
 Vulnerability in applications
EFFECTS OF PHISHING
 Internet fraud
 Identity theft
 Financial loss to the original institutions
 Difficulties in Law Enforcement Investigations
 Erosion of Public Trust in the Internet.
CONCLUSION
 No single technology will completely stop phishing.
 However, a combination of good organization and
practice, proper application of current technologies, and
improvements in security technology has the potential to
drastically reduce the prevalence of phishing and the
losses suffered from it.
REFERENCE
 www.google.com
 www.wikipedia.com
 www.studymafia.org
 www.slideshare.net
Phishing ppt

More Related Content

PPTX
Phishing attack seminar presentation
PPTX
PPTX
What is Phishing and How can you Avoid it?
PPTX
Phishing ppt
PPTX
Phishing Presentation
PPT
Phishing attacks ppt
PPTX
PPT on Phishing
PPTX
Phishing attack seminar presentation
What is Phishing and How can you Avoid it?
Phishing ppt
Phishing Presentation
Phishing attacks ppt
PPT on Phishing

What's hot (20)

PPT
PPTX
Cyber Crime and Security
PPTX
Cyber security presentation
PDF
Cyber security
PPTX
Phishing ppt
PPT
Cyber Crime and Security
PPTX
Introduction to cyber security
PPTX
Encryption ppt
PPTX
cyber crime
PPTX
Data security
PPTX
Cyber crime ppt
PPTX
Cyber crime and security
PPTX
Cyber security presentation
PPTX
Social engineering
PPTX
The CIA triad.pptx
PPTX
Cyber Crime And Security
PDF
Cyber security awareness for students
PDF
Social engineering
PPTX
Phishing Attacks
Cyber Crime and Security
Cyber security presentation
Cyber security
Phishing ppt
Cyber Crime and Security
Introduction to cyber security
Encryption ppt
cyber crime
Data security
Cyber crime ppt
Cyber crime and security
Cyber security presentation
Social engineering
The CIA triad.pptx
Cyber Crime And Security
Cyber security awareness for students
Social engineering
Phishing Attacks
Ad

Similar to Phishing ppt (20)

PPTX
Cyber Security PowerPoint Templates.pptx
PPTX
edu 3 ppt.pptx
PDF
Phishing: Analysis and Countermeasures
PPTX
Exploring Phishing Attacks.pptx
PDF
Phishing 101: Part-1 Blog Welcome to this Phishing Blog Part1.
PDF
Cyber security
PDF
A Deep Dive into Phishing Techniques and Countermeasures.pdf
PDF
IRJET- Phishing and Anti-Phishing Techniques
PDF
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
PPTX
What is Phishing - Kloudlearn
PPT
Strategies to handle Phishing attacks
PPTX
Anti phishing
PPTX
IT2252_Presentation_Group03.pptx
PPTX
Phishing-Attacks-of-Cyberattack-under-cybersecurity
PPTX
Phishing
PPTX
IP SPOOFING &-.pptx
PPTX
Phishing attack, with SSL Encryption and HTTPS Working
PDF
What is a phishing attack
PPTX
phishing.pptx
PPTX
Phishing Whaling and Hacking Case Studies.pptx
Cyber Security PowerPoint Templates.pptx
edu 3 ppt.pptx
Phishing: Analysis and Countermeasures
Exploring Phishing Attacks.pptx
Phishing 101: Part-1 Blog Welcome to this Phishing Blog Part1.
Cyber security
A Deep Dive into Phishing Techniques and Countermeasures.pdf
IRJET- Phishing and Anti-Phishing Techniques
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
What is Phishing - Kloudlearn
Strategies to handle Phishing attacks
Anti phishing
IT2252_Presentation_Group03.pptx
Phishing-Attacks-of-Cyberattack-under-cybersecurity
Phishing
IP SPOOFING &-.pptx
Phishing attack, with SSL Encryption and HTTPS Working
What is a phishing attack
phishing.pptx
Phishing Whaling and Hacking Case Studies.pptx
Ad

More from shindept123 (6)

DOCX
Synopsis of online student feedback system(cse)
PPTX
Ppt on online leave planner
PPTX
Payroll managemen tsystem
PPT
Student feedback system
PPTX
Farmers buddy ppt
PPT
Chap 1-language processor
Synopsis of online student feedback system(cse)
Ppt on online leave planner
Payroll managemen tsystem
Student feedback system
Farmers buddy ppt
Chap 1-language processor

Recently uploaded (20)

PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
OOP with Java - Java Introduction (Basics)
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PDF
PPT on Performance Review to get promotions
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPT
Mechanical Engineering MATERIALS Selection
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
Construction Project Organization Group 2.pptx
Embodied AI: Ushering in the Next Era of Intelligent Systems
OOP with Java - Java Introduction (Basics)
Model Code of Practice - Construction Work - 21102022 .pdf
PPT on Performance Review to get promotions
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Mechanical Engineering MATERIALS Selection
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Foundation to blockchain - A guide to Blockchain Tech
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
bas. eng. economics group 4 presentation 1.pptx
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Lecture Notes Electrical Wiring System Components
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Lesson 3_Tessellation.pptx finite Mathematics
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
CH1 Production IntroductoryConcepts.pptx
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Construction Project Organization Group 2.pptx

Phishing ppt

  • 2. CONTENTS  Introduction  What is Phishing  How does phishing work?  What the are dangers of phishing attacks?  Phishing Examples  The different flavor of Phishing attack  Types of Phishing  How do I protect against phishing attacks?  Causes of Phishing  Effects of Phishing  Conclusion  Reference
  • 3. INTRODUCTION  Phishing is the most powerful and popular attack for hacking into emails and web accounts.  Cyber criminals use this attack to hack into bank accounts, Facebook accounts and email account of innocent people.  Every year, most of the biggest cyber crime case involve this attack.  So we must know what is Phishing and how to protect your accounts from phishing attack.
  • 4. WHAT IS PHISHING?  Phishing is the act of fooling a computer user into submitting personal information by creating a counterfeit it website that looks like a real (and trusted)site.  It is a hacker technique of "fishing" for passwords and other secret financial info.
  • 9. THE DIFFERENT FLAVOR OF PHISHING ATTACK
  • 10. TYPES OF PHISHING: 1) Deceptive phishing 2) Spear phishing 3) Whaling 4) Pharming
  • 11. TYPES OF PHISHING 1. Deceptive phishing:  Sending a deceptive email, in bulk, with a “call to action” that demands the recipient click on a link.  In this case, an attacker attempts to obtain confidential information from the victims.  Attackers use the information to steal money or to launch other attacks.  E.g A fake email from a bank asking you to click a link and verify your account details.
  • 12. TYPES OF PHISHING 2. Spear phishing:  Spear phishing targets specific individuals instead of a wide group of people.  Attackers often research their victims on social media and other sites.  That way, they can customize their communications and appear more authentic.  Spear phishing is often the first step used to penetrate a company’s defenses and carry out a targeted attack.
  • 13. TYPES OF PHISHING 3.Whaling:  When attackers go after a “big fish” like a CEO, it’s called whaling.  These attackers often spend considerable time profiling the target to find the opportune moment and means of stealing login credentials.  Whaling is of particular concern because high- level executives are able to access a great deal of company information.
  • 14. TYPES OF PHISHING 4.Pharming  Similar to phishing, pharming sends users to a fraudulent website that appears to be legitimate.  However, in this case, victims do not even have to click a malicious link to be taken to the bogus site.  Attackers can infect either the user’s computer or the website’s DNS server and redirect the user to a fake site even if the correct URL is typed in.
  • 15. WHAT THE ARE DANGERS OF PHISHING ATTACKS?  Sometimes attackers are satisfied with getting a victim’s credit card information or other personal data for financial gain.  Other times, phishing emails are sent to obtain employee login information or other details for use in an advanced attack against a specific company.
  • 16. HOW DO I PROTECT AGAINST PHISHING ATTACKS? 1.User education  One way to protect your organization from phishing is user education.  Education should involve all employees.  High-level executives are often a target Teach them how to recognize a phishing email and what to do when they receive one.  Simulation exercises are also key for assessing how your employees react to a staged phishing attack.
  • 17. 2.Security technology  No single cyber security technology can prevent phishing attacks.  Instead, organizations must take a layered approach to reduce the number of attacks and lessen their impact when they do occur.  Network security technologies that should be implemented include email and web security, malware protection, user behavior monitoring, and access control.
  • 18. CAUSES OF PHISHING  Misleading e-mails  No check of source address  Vulnerability in browsers  No strong authentication at websites of banks and financial institutions  Limited use of digital signatures  Non-availability of secure desktop tools  Lack of user awareness  Vulnerability in applications
  • 19. EFFECTS OF PHISHING  Internet fraud  Identity theft  Financial loss to the original institutions  Difficulties in Law Enforcement Investigations  Erosion of Public Trust in the Internet.
  • 20. CONCLUSION  No single technology will completely stop phishing.  However, a combination of good organization and practice, proper application of current technologies, and improvements in security technology has the potential to drastically reduce the prevalence of phishing and the losses suffered from it.
  • 21. REFERENCE  www.google.com  www.wikipedia.com  www.studymafia.org  www.slideshare.net