SlideShare ist ein Scribd-Unternehmen logo
1 von 36
GROUP NO : 10
GROUP
PRESENTATION
OF
TOPIC
PHISHING AND HACKING
GROUP MEMBERS :
1. MEHEDI HASSAN BAPPY – 16221021
2. ISHTIAK U AHMED – 16221031
3. Fardun M RAHMAN - 16221053
PHISHING
What Is Phishing?
Actually originated from the word “FISHING”.
Criminal sets a particular bait as a fraudulency
or fooling.
Get access of accounts and take personal data.
History Of Phishing
Phishing was originated around
January 1996.
The first move was made byWAREZ
community.
In 2001 phishers put eye on online
payment system.
In 2003 they use email worm program
to have sites like EBAY or PAYPAL.
In 2004 they attack on banking sites
and customers with PopupWindows.
Types Of Phishing
Phishing Types
Malware
Host File
Poisoning
DataTheft Key loggers
Session
Hijacking
Phishing Types
Search
Engine
Phishing
Phone
Phishing
DNS based
Phishing
Control
Injection
Phishing
Man InThe
Middle
Phishing
Phishing Types : Malware
¤ Malicious Software combined Mal+Ware =
Malware.
¤ Install without notice of the user.
¤ Difficult to remove and get access with user data
¤ Designed to steal credit card or any password of
your computer.
Phishing Types : Malware
Phishing Types : Malware
Up-to-date web browser
Install antivirus solution and
monitor.
Deploy a web filter to block
malicious websites
Latest security patches and
updates
Phishing Types : Keylogger
Secretly
monitor
and log all
key –
strokes.
Can be a
device
other
than a
software.
Parental
care and
company
care
Track
down user
activity of
keyboard
input.
Phishing Types : Keylogger
Phishing Types : Keylogger
A firewall is a
great defense.
Keep your
software updated.
Change your
password
frequently.
Software like
ZONEALARM
shut down all
inbound and
outbound data.
Install a password
manager.
Phishing Types : Data Theft
Illegal
transfer of
storage
USB drive
Portable
hard drive
Email
Printing
Remote
sharing
Consequence
could be
severe for
both
individual
and
businessman
.
Phishing Types : Data Theft
Phishing Types : Data Theft
Usage of restricted
network in
organization.
Laptop lockdown
and biometric
security measures.
Use of anti-malware
software.
Encryption of
confidential
information or
personal data.
Periodic reviews of
device and system
which can pose high
risk.
A man-in-the-middle attack is a type of cyberattack where a
malicious actor inserts him/herself into a conversation between
two parties, impersonates both parties and gains access to
information that the two parties were trying to send to each
other. A man-in-the-middle attack allows a malicious actor to
intercept, send and receive data meant for someone else, or not
meant to be sent at all, without either outside party knowing
until it is too late. Man-in-the-middle attacks can be
abbreviated in many ways, including MITM, MitM, MiM or MIM.
Phishing Types : Man In The Middle
The positive side of hacking
Social good
Data Security
Brand Innovation
A look in the past
Misunderstanding between
hacker and cracker
First used at MIT in 1960
What hackers do
The majority do it for fun
Quite rare on personal
computer
Usually attacks bank for
money
Professionals target big
company
What are the effects of computer hacking
Privacy breach Loss of data Identity theft Track of actions
Computer hacking is a breach of computer
security .it can expose sensitive user data
and risk user privacy
What are the effects of computer hacking
Privacy breach Loss of data Identity theft Track of actions
Deletion or manipulation of sensitive data
with intent to achieve personal gain is
another effect of computer hacking
What are the effects of computer hacking
Privacy breach Loss of data Identity theft Track of actions
It is a fraud that involves pretention to be
someone else, with intent to gain
unauthorized access
What are the effects of computer hacking
Privacy breach Loss of data Identity theft Track of actions
Key logging software which is capable of
tracking and recording every key stole by
the user
What are the effects of computer hacking
Dos attack Stealing of
information
National security fraud
The DOS attack as it is called refers to
the attempt of making computer
resources unavailable to users
What are the effects of computer hacking
Dos attack Stealing of
information
National security fraud
Computer hacking can lead to theft of critical
business information. Business clients can be
lost
What are the effects of computer hacking
Dos attack Stealing of
information
National security fraud
Hacking of highly sensitive data can
potentially risk the national security and
sake the overall well being of the country
citizens
What are the effects of computer hacking
Dos attack Stealing of
information
National security fraud
Zombie computer are used for
fraudulent activities like spamming and
phishing
How hackers work
Log keystrokes
Infect computers
with virus
Gain backdoor
access
Hack passwords
How hackers work
Zombie
computers
Physically hacking
Virus in flash
drives
Spy on email
How to prevent hacking
Update operating
system and web
browser
Use strong password Purchase anti-virus
software
Install firewall on
computer
How to prevent hacking
Update operating
system and web
browser
Use strong password Purchase anti-virus
software
Install firewall on
computer
How to prevent hacking
Update operating
system and web
browser
Use strong password Purchase anti-virus
software
Install firewall on
computer
How to prevent hacking
Update operating
system and web
browser
Use strong password Purchase anti-virus
software
Install firewall on
computer
Thank You

Weitere ähnliche Inhalte

Was ist angesagt?

Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasuresJorge Sebastiao
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime typeskiran yadav
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing AttacksSysCloud
 
What is Phishing? Phishing Attack Explained | Edureka
What is Phishing? Phishing Attack Explained | EdurekaWhat is Phishing? Phishing Attack Explained | Edureka
What is Phishing? Phishing Attack Explained | EdurekaEdureka!
 
Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniquesSushil Kumar
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessInnocent Korie
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation sweetpeace1
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 
Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharksNalneesh Gaur
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
 

Was ist angesagt? (20)

Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime types
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
 
What is Phishing? Phishing Attack Explained | Edureka
What is Phishing? Phishing Attack Explained | EdurekaWhat is Phishing? Phishing Attack Explained | Edureka
What is Phishing? Phishing Attack Explained | Edureka
 
What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniques
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
PPT on Phishing
PPT on PhishingPPT on Phishing
PPT on Phishing
 
Cyber crime and fraud
Cyber crime and fraudCyber crime and fraud
Cyber crime and fraud
 
Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharks
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Phishing
PhishingPhishing
Phishing
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 

Andere mochten auch

Symantec Physhing Report Aprile 2009
Symantec Physhing Report Aprile 2009Symantec Physhing Report Aprile 2009
Symantec Physhing Report Aprile 2009Freedata Labs
 
Seminaar Report of Phishing VIII Sem
Seminaar Report of Phishing VIII SemSeminaar Report of Phishing VIII Sem
Seminaar Report of Phishing VIII SemNarendra Singh
 
secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger Abhishek Hirapara
 
Is the Information Super Highway Paved With Gold ?
Is the Information Super Highway Paved With Gold ?Is the Information Super Highway Paved With Gold ?
Is the Information Super Highway Paved With Gold ?nationalrural
 
Cryptography - Simplified - Message Integrity
Cryptography - Simplified - Message IntegrityCryptography - Simplified - Message Integrity
Cryptography - Simplified - Message IntegrityAbdul Manaf Vellakodath
 
Bulling lia damaris2
Bulling lia damaris2Bulling lia damaris2
Bulling lia damaris2upark4
 
Penyederhanaan Karnaugh Map
Penyederhanaan Karnaugh MapPenyederhanaan Karnaugh Map
Penyederhanaan Karnaugh MapCheria Asyifa
 
Aljabar boolean
Aljabar booleanAljabar boolean
Aljabar booleanfarhan2000
 
Lecture # 2
Lecture # 2Lecture # 2
Lecture # 2Mr SMAK
 
Introduction to Web Engineering and Services
Introduction to Web Engineering and ServicesIntroduction to Web Engineering and Services
Introduction to Web Engineering and ServicesFazal Imran
 
Pembentukan peta karnaugh
Pembentukan peta karnaughPembentukan peta karnaugh
Pembentukan peta karnaughCheria Asyifa
 
Gerbang logika dasar nand ,nor ,ex or ,ex - nor 1
Gerbang logika dasar nand ,nor ,ex   or ,ex - nor 1Gerbang logika dasar nand ,nor ,ex   or ,ex - nor 1
Gerbang logika dasar nand ,nor ,ex or ,ex - nor 1Mila Art
 
Virus de computador
Virus de computadorVirus de computador
Virus de computadorvitinhozika
 
Perigos da internet
Perigos da internetPerigos da internet
Perigos da internetap3bmachado
 
Introduction to Multimedia Technologies
Introduction to Multimedia TechnologiesIntroduction to Multimedia Technologies
Introduction to Multimedia TechnologiesTamanna Sehgal
 
Serviços da internet
Serviços da internetServiços da internet
Serviços da internetMoysés Alves
 

Andere mochten auch (20)

PHISING Y HACKING
PHISING Y HACKINGPHISING Y HACKING
PHISING Y HACKING
 
Symantec Physhing Report Aprile 2009
Symantec Physhing Report Aprile 2009Symantec Physhing Report Aprile 2009
Symantec Physhing Report Aprile 2009
 
Seminaar Report of Phishing VIII Sem
Seminaar Report of Phishing VIII SemSeminaar Report of Phishing VIII Sem
Seminaar Report of Phishing VIII Sem
 
secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger
 
Is the Information Super Highway Paved With Gold ?
Is the Information Super Highway Paved With Gold ?Is the Information Super Highway Paved With Gold ?
Is the Information Super Highway Paved With Gold ?
 
Cryptography - Simplified - Message Integrity
Cryptography - Simplified - Message IntegrityCryptography - Simplified - Message Integrity
Cryptography - Simplified - Message Integrity
 
Bulling lia damaris2
Bulling lia damaris2Bulling lia damaris2
Bulling lia damaris2
 
Penyederhanaan Karnaugh Map
Penyederhanaan Karnaugh MapPenyederhanaan Karnaugh Map
Penyederhanaan Karnaugh Map
 
Aljabar boolean
Aljabar booleanAljabar boolean
Aljabar boolean
 
Lecture # 2
Lecture # 2Lecture # 2
Lecture # 2
 
Introduction to Web Engineering and Services
Introduction to Web Engineering and ServicesIntroduction to Web Engineering and Services
Introduction to Web Engineering and Services
 
Phising
PhisingPhising
Phising
 
Preparing For E Business
Preparing For E BusinessPreparing For E Business
Preparing For E Business
 
Pembentukan peta karnaugh
Pembentukan peta karnaughPembentukan peta karnaugh
Pembentukan peta karnaugh
 
Perigos na internet
Perigos na internetPerigos na internet
Perigos na internet
 
Gerbang logika dasar nand ,nor ,ex or ,ex - nor 1
Gerbang logika dasar nand ,nor ,ex   or ,ex - nor 1Gerbang logika dasar nand ,nor ,ex   or ,ex - nor 1
Gerbang logika dasar nand ,nor ,ex or ,ex - nor 1
 
Virus de computador
Virus de computadorVirus de computador
Virus de computador
 
Perigos da internet
Perigos da internetPerigos da internet
Perigos da internet
 
Introduction to Multimedia Technologies
Introduction to Multimedia TechnologiesIntroduction to Multimedia Technologies
Introduction to Multimedia Technologies
 
Serviços da internet
Serviços da internetServiços da internet
Serviços da internet
 

Ähnlich wie Phishing and hacking

Know _ Top 7 Cyber Security threat.pdf
Know _ Top 7 Cyber Security threat.pdfKnow _ Top 7 Cyber Security threat.pdf
Know _ Top 7 Cyber Security threat.pdfLindaWHill
 
Cape it unit 2 module 3 unedited students notes (compiled from internet)
Cape it unit 2 module 3 unedited students notes (compiled from internet)Cape it unit 2 module 3 unedited students notes (compiled from internet)
Cape it unit 2 module 3 unedited students notes (compiled from internet)Jevaughan Edie
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxCUInnovationTeam
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptxTapan Khilar
 
Different Types Of Cyber Security Threats
Different Types Of Cyber Security ThreatsDifferent Types Of Cyber Security Threats
Different Types Of Cyber Security ThreatsDaniel Martin
 
social engineering attacks.docx
social engineering attacks.docxsocial engineering attacks.docx
social engineering attacks.docxMehwishAnsari11
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber CrimeGaurav Patel
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information SecurityMichele Thomas
 
What-is-computer-security
What-is-computer-securityWhat-is-computer-security
What-is-computer-securityiamvishal2
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersAman Sharma
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1indhuchezhian
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityjyoti_lakhani
 

Ähnlich wie Phishing and hacking (20)

Know _ Top 7 Cyber Security threat.pdf
Know _ Top 7 Cyber Security threat.pdfKnow _ Top 7 Cyber Security threat.pdf
Know _ Top 7 Cyber Security threat.pdf
 
Cape it unit 2 module 3 unedited students notes (compiled from internet)
Cape it unit 2 module 3 unedited students notes (compiled from internet)Cape it unit 2 module 3 unedited students notes (compiled from internet)
Cape it unit 2 module 3 unedited students notes (compiled from internet)
 
Cyber Crime.ppt
Cyber Crime.pptCyber Crime.ppt
Cyber Crime.ppt
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
Different Types Of Cyber Security Threats
Different Types Of Cyber Security ThreatsDifferent Types Of Cyber Security Threats
Different Types Of Cyber Security Threats
 
cyber crime
cyber crimecyber crime
cyber crime
 
social engineering attacks.docx
social engineering attacks.docxsocial engineering attacks.docx
social engineering attacks.docx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
What-is-computer-security
What-is-computer-securityWhat-is-computer-security
What-is-computer-security
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 

Mehr von Md. Mehadi Hassan Bappy

Consumers Are Showrooming and Webrooming Your Business, Here's What That Mean...
Consumers Are Showrooming and Webrooming Your Business, Here's What That Mean...Consumers Are Showrooming and Webrooming Your Business, Here's What That Mean...
Consumers Are Showrooming and Webrooming Your Business, Here's What That Mean...Md. Mehadi Hassan Bappy
 
Valuation of BATA Shoe Company (Bangladesh) Limited
Valuation of BATA Shoe Company (Bangladesh) LimitedValuation of BATA Shoe Company (Bangladesh) Limited
Valuation of BATA Shoe Company (Bangladesh) LimitedMd. Mehadi Hassan Bappy
 
Venezuela Boliver crisis, it's reasons and impact
Venezuela Boliver crisis, it's reasons and impactVenezuela Boliver crisis, it's reasons and impact
Venezuela Boliver crisis, it's reasons and impactMd. Mehadi Hassan Bappy
 
Role of Public finance in rural development
Role of Public finance in rural developmentRole of Public finance in rural development
Role of Public finance in rural developmentMd. Mehadi Hassan Bappy
 
Impact of Relevant Company Specific Factors on the Market Price of the Stock....
Impact of Relevant Company Specific Factors on the Market Price of the Stock....Impact of Relevant Company Specific Factors on the Market Price of the Stock....
Impact of Relevant Company Specific Factors on the Market Price of the Stock....Md. Mehadi Hassan Bappy
 
Introduction of Stock market. (Bangladesh)
Introduction of Stock market. (Bangladesh)Introduction of Stock market. (Bangladesh)
Introduction of Stock market. (Bangladesh)Md. Mehadi Hassan Bappy
 
Impact of motivation on employee performance
Impact of motivation on employee performanceImpact of motivation on employee performance
Impact of motivation on employee performanceMd. Mehadi Hassan Bappy
 
Economic Forces that affects interest rates in Bangladesh.
Economic Forces that affects interest rates in Bangladesh.Economic Forces that affects interest rates in Bangladesh.
Economic Forces that affects interest rates in Bangladesh.Md. Mehadi Hassan Bappy
 
Inventory Management of Electronic Industry
Inventory Management of Electronic IndustryInventory Management of Electronic Industry
Inventory Management of Electronic IndustryMd. Mehadi Hassan Bappy
 
Human resource Management of Coca Cola Bangladesh
Human resource Management of Coca Cola BangladeshHuman resource Management of Coca Cola Bangladesh
Human resource Management of Coca Cola BangladeshMd. Mehadi Hassan Bappy
 
Analysis on China Life Insurance Company ltd.
Analysis on China Life Insurance Company ltd.Analysis on China Life Insurance Company ltd.
Analysis on China Life Insurance Company ltd.Md. Mehadi Hassan Bappy
 
Measure of nation's income- Limitations of GDP
Measure of nation's income- Limitations of GDPMeasure of nation's income- Limitations of GDP
Measure of nation's income- Limitations of GDPMd. Mehadi Hassan Bappy
 
Saving, Investment and the Financial system.
Saving, Investment and the Financial system.Saving, Investment and the Financial system.
Saving, Investment and the Financial system.Md. Mehadi Hassan Bappy
 
Financial Analysis of Square Pharmaceuticals Ltd.
Financial Analysis of Square Pharmaceuticals Ltd.Financial Analysis of Square Pharmaceuticals Ltd.
Financial Analysis of Square Pharmaceuticals Ltd.Md. Mehadi Hassan Bappy
 
Capital Market Crisis & it's impact On Economy.
Capital Market Crisis & it's impact On Economy.Capital Market Crisis & it's impact On Economy.
Capital Market Crisis & it's impact On Economy.Md. Mehadi Hassan Bappy
 

Mehr von Md. Mehadi Hassan Bappy (20)

“VALUATION OF ORION PHARMA LIMITED”
“VALUATION OF ORION PHARMA LIMITED”“VALUATION OF ORION PHARMA LIMITED”
“VALUATION OF ORION PHARMA LIMITED”
 
Consumers Are Showrooming and Webrooming Your Business, Here's What That Mean...
Consumers Are Showrooming and Webrooming Your Business, Here's What That Mean...Consumers Are Showrooming and Webrooming Your Business, Here's What That Mean...
Consumers Are Showrooming and Webrooming Your Business, Here's What That Mean...
 
CFA Standard 3
CFA Standard 3CFA Standard 3
CFA Standard 3
 
Valuation of BATA Shoe Company (Bangladesh) Limited
Valuation of BATA Shoe Company (Bangladesh) LimitedValuation of BATA Shoe Company (Bangladesh) Limited
Valuation of BATA Shoe Company (Bangladesh) Limited
 
Venezuela Boliver crisis, it's reasons and impact
Venezuela Boliver crisis, it's reasons and impactVenezuela Boliver crisis, it's reasons and impact
Venezuela Boliver crisis, it's reasons and impact
 
Role of Public finance in rural development
Role of Public finance in rural developmentRole of Public finance in rural development
Role of Public finance in rural development
 
Impact of Relevant Company Specific Factors on the Market Price of the Stock....
Impact of Relevant Company Specific Factors on the Market Price of the Stock....Impact of Relevant Company Specific Factors on the Market Price of the Stock....
Impact of Relevant Company Specific Factors on the Market Price of the Stock....
 
Introduction of Stock market. (Bangladesh)
Introduction of Stock market. (Bangladesh)Introduction of Stock market. (Bangladesh)
Introduction of Stock market. (Bangladesh)
 
Audit & Assurance
Audit & Assurance Audit & Assurance
Audit & Assurance
 
Impact of motivation on employee performance
Impact of motivation on employee performanceImpact of motivation on employee performance
Impact of motivation on employee performance
 
Economic Forces that affects interest rates in Bangladesh.
Economic Forces that affects interest rates in Bangladesh.Economic Forces that affects interest rates in Bangladesh.
Economic Forces that affects interest rates in Bangladesh.
 
Inventory Management of Electronic Industry
Inventory Management of Electronic IndustryInventory Management of Electronic Industry
Inventory Management of Electronic Industry
 
Human resource Management of Coca Cola Bangladesh
Human resource Management of Coca Cola BangladeshHuman resource Management of Coca Cola Bangladesh
Human resource Management of Coca Cola Bangladesh
 
Analysis on China Life Insurance Company ltd.
Analysis on China Life Insurance Company ltd.Analysis on China Life Insurance Company ltd.
Analysis on China Life Insurance Company ltd.
 
Variable costing
Variable costingVariable costing
Variable costing
 
Measure of nation's income- Limitations of GDP
Measure of nation's income- Limitations of GDPMeasure of nation's income- Limitations of GDP
Measure of nation's income- Limitations of GDP
 
Saving, Investment and the Financial system.
Saving, Investment and the Financial system.Saving, Investment and the Financial system.
Saving, Investment and the Financial system.
 
Financial Analysis of Square Pharmaceuticals Ltd.
Financial Analysis of Square Pharmaceuticals Ltd.Financial Analysis of Square Pharmaceuticals Ltd.
Financial Analysis of Square Pharmaceuticals Ltd.
 
Measure of Dispersion in statistics
Measure of Dispersion in statisticsMeasure of Dispersion in statistics
Measure of Dispersion in statistics
 
Capital Market Crisis & it's impact On Economy.
Capital Market Crisis & it's impact On Economy.Capital Market Crisis & it's impact On Economy.
Capital Market Crisis & it's impact On Economy.
 

Kürzlich hochgeladen

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Kürzlich hochgeladen (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Phishing and hacking

  • 1. GROUP NO : 10 GROUP PRESENTATION OF
  • 2. TOPIC PHISHING AND HACKING GROUP MEMBERS : 1. MEHEDI HASSAN BAPPY – 16221021 2. ISHTIAK U AHMED – 16221031 3. Fardun M RAHMAN - 16221053
  • 4. What Is Phishing? Actually originated from the word “FISHING”. Criminal sets a particular bait as a fraudulency or fooling. Get access of accounts and take personal data.
  • 5. History Of Phishing Phishing was originated around January 1996. The first move was made byWAREZ community. In 2001 phishers put eye on online payment system. In 2003 they use email worm program to have sites like EBAY or PAYPAL. In 2004 they attack on banking sites and customers with PopupWindows.
  • 9. Phishing Types : Malware ¤ Malicious Software combined Mal+Ware = Malware. ¤ Install without notice of the user. ¤ Difficult to remove and get access with user data ¤ Designed to steal credit card or any password of your computer.
  • 10. Phishing Types : Malware
  • 11. Phishing Types : Malware Up-to-date web browser Install antivirus solution and monitor. Deploy a web filter to block malicious websites Latest security patches and updates
  • 12. Phishing Types : Keylogger Secretly monitor and log all key – strokes. Can be a device other than a software. Parental care and company care Track down user activity of keyboard input.
  • 13. Phishing Types : Keylogger
  • 14. Phishing Types : Keylogger A firewall is a great defense. Keep your software updated. Change your password frequently. Software like ZONEALARM shut down all inbound and outbound data. Install a password manager.
  • 15. Phishing Types : Data Theft Illegal transfer of storage USB drive Portable hard drive Email Printing Remote sharing Consequence could be severe for both individual and businessman .
  • 16. Phishing Types : Data Theft
  • 17. Phishing Types : Data Theft Usage of restricted network in organization. Laptop lockdown and biometric security measures. Use of anti-malware software. Encryption of confidential information or personal data. Periodic reviews of device and system which can pose high risk.
  • 18. A man-in-the-middle attack is a type of cyberattack where a malicious actor inserts him/herself into a conversation between two parties, impersonates both parties and gains access to information that the two parties were trying to send to each other. A man-in-the-middle attack allows a malicious actor to intercept, send and receive data meant for someone else, or not meant to be sent at all, without either outside party knowing until it is too late. Man-in-the-middle attacks can be abbreviated in many ways, including MITM, MitM, MiM or MIM. Phishing Types : Man In The Middle
  • 19. The positive side of hacking Social good Data Security Brand Innovation
  • 20. A look in the past Misunderstanding between hacker and cracker First used at MIT in 1960
  • 21. What hackers do The majority do it for fun Quite rare on personal computer Usually attacks bank for money Professionals target big company
  • 22. What are the effects of computer hacking Privacy breach Loss of data Identity theft Track of actions Computer hacking is a breach of computer security .it can expose sensitive user data and risk user privacy
  • 23. What are the effects of computer hacking Privacy breach Loss of data Identity theft Track of actions Deletion or manipulation of sensitive data with intent to achieve personal gain is another effect of computer hacking
  • 24. What are the effects of computer hacking Privacy breach Loss of data Identity theft Track of actions It is a fraud that involves pretention to be someone else, with intent to gain unauthorized access
  • 25. What are the effects of computer hacking Privacy breach Loss of data Identity theft Track of actions Key logging software which is capable of tracking and recording every key stole by the user
  • 26. What are the effects of computer hacking Dos attack Stealing of information National security fraud The DOS attack as it is called refers to the attempt of making computer resources unavailable to users
  • 27. What are the effects of computer hacking Dos attack Stealing of information National security fraud Computer hacking can lead to theft of critical business information. Business clients can be lost
  • 28. What are the effects of computer hacking Dos attack Stealing of information National security fraud Hacking of highly sensitive data can potentially risk the national security and sake the overall well being of the country citizens
  • 29. What are the effects of computer hacking Dos attack Stealing of information National security fraud Zombie computer are used for fraudulent activities like spamming and phishing
  • 30. How hackers work Log keystrokes Infect computers with virus Gain backdoor access Hack passwords
  • 31. How hackers work Zombie computers Physically hacking Virus in flash drives Spy on email
  • 32. How to prevent hacking Update operating system and web browser Use strong password Purchase anti-virus software Install firewall on computer
  • 33. How to prevent hacking Update operating system and web browser Use strong password Purchase anti-virus software Install firewall on computer
  • 34. How to prevent hacking Update operating system and web browser Use strong password Purchase anti-virus software Install firewall on computer
  • 35. How to prevent hacking Update operating system and web browser Use strong password Purchase anti-virus software Install firewall on computer