Presentation On Phishing
Download
Phishing Presentation Transcript:
1.Phishing
2.What is Phishing??
Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.
Phishing is typically carried out by e-mail spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.
3.Techniques Of Phishing
Spear Phishing
Phishing attempts directed at specific individuals or companies have been termed spearphishing.
Whaling
Phishing attacks directed specifically at senior executives and other high profile targets within businesses.
Evil Twins
Phisher creates a fake wireless network that looks similar to a legitimate public network that may be found in public places such as airports, hotels or coffee shops.
4.Phone Phishing
uses fake caller-ID data to give the appearance that calls come from a trusted organization.
Tabnabbing
It takes advantage of the multiple tabs that users use and silently redirects a user to the affected site.
5.Phishing Process
Planning
Setup
Attack
Collection
Identity Theft & Fraud
6.Damages Caused By Phishing
Damage caused by phishing ranges from denial of access of e-mail to substantial financial loss.
It is estimated that between May 2009 and May 2010, approximately 1.2 million computer users in the United States suffered losses caused by phishing, totalling approximately US$929 million.
7.Reasons For Successful Phishing
Lack Of Knowledge.
User’s don’t give Proper attention to read the Warning.
Lack of attention to the absence of security indicators.
8.Reasons For Successful Phishing
9.Anti Phishing
There are several different techniques to combat phishing, including legislation and technology created specifically to protect against phishing. Most new internet browsers come with anti-phishing software.
10.Social responses
train people to recognize phishing attempts. People can take steps to avoid phishing attempts by slightly modifying their browsing habits. legitimate e-mail messages from companies to their customers contain an item of information that is not readily available to phishers.
Download
Phishing Presentation Transcript:
1.Phishing
2.What is Phishing??
Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.
Phishing is typically carried out by e-mail spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.
3.Techniques Of Phishing
Spear Phishing
Phishing attempts directed at specific individuals or companies have been termed spearphishing.
Whaling
Phishing attacks directed specifically at senior executives and other high profile targets within businesses.
Evil Twins
Phisher creates a fake wireless network that looks similar to a legitimate public network that may be found in public places such as airports, hotels or coffee shops.
4.Phone Phishing
uses fake caller-ID data to give the appearance that calls come from a trusted organization.
Tabnabbing
It takes advantage of the multiple tabs that users use and silently redirects a user to the affected site.
5.Phishing Process
Planning
Setup
Attack
Collection
Identity Theft & Fraud
6.Damages Caused By Phishing
Damage caused by phishing ranges from denial of access of e-mail to substantial financial loss.
It is estimated that between May 2009 and May 2010, approximately 1.2 million computer users in the United States suffered losses caused by phishing, totalling approximately US$929 million.
7.Reasons For Successful Phishing
Lack Of Knowledge.
User’s don’t give Proper attention to read the Warning.
Lack of attention to the absence of security indicators.
8.Reasons For Successful Phishing
9.Anti Phishing
There are several different techniques to combat phishing, including legislation and technology created specifically to protect against phishing. Most new internet browsers come with anti-phishing software.
10.Social responses
train people to recognize phishing attempts. People can take steps to avoid phishing attempts by slightly modifying their browsing habits. legitimate e-mail messages from companies to their customers contain an item of information that is not readily available to phishers.
No comments:
Post a Comment