4. What Is Phishing?
Actually originated from the word “FISHING”.
Criminal sets a particular bait as a fraudulency
or fooling.
Get access of accounts and take personal data.
5. History Of Phishing
Phishing was originated around
January 1996.
The first move was made byWAREZ
community.
In 2001 phishers put eye on online
payment system.
In 2003 they use email worm program
to have sites like EBAY or PAYPAL.
In 2004 they attack on banking sites
and customers with PopupWindows.
9. Phishing Types : Malware
¤ Malicious Software combined Mal+Ware =
Malware.
¤ Install without notice of the user.
¤ Difficult to remove and get access with user data
¤ Designed to steal credit card or any password of
your computer.
11. Phishing Types : Malware
Up-to-date web browser
Install antivirus solution and
monitor.
Deploy a web filter to block
malicious websites
Latest security patches and
updates
12. Phishing Types : Keylogger
Secretly
monitor
and log all
key –
strokes.
Can be a
device
other
than a
software.
Parental
care and
company
care
Track
down user
activity of
keyboard
input.
14. Phishing Types : Keylogger
A firewall is a
great defense.
Keep your
software updated.
Change your
password
frequently.
Software like
ZONEALARM
shut down all
inbound and
outbound data.
Install a password
manager.
15. Phishing Types : Data Theft
Illegal
transfer of
storage
USB drive
Portable
hard drive
Email
Printing
Remote
sharing
Consequence
could be
severe for
both
individual
and
businessman
.
17. Phishing Types : Data Theft
Usage of restricted
network in
organization.
Laptop lockdown
and biometric
security measures.
Use of anti-malware
software.
Encryption of
confidential
information or
personal data.
Periodic reviews of
device and system
which can pose high
risk.
18. A man-in-the-middle attack is a type of cyberattack where a
malicious actor inserts him/herself into a conversation between
two parties, impersonates both parties and gains access to
information that the two parties were trying to send to each
other. A man-in-the-middle attack allows a malicious actor to
intercept, send and receive data meant for someone else, or not
meant to be sent at all, without either outside party knowing
until it is too late. Man-in-the-middle attacks can be
abbreviated in many ways, including MITM, MitM, MiM or MIM.
Phishing Types : Man In The Middle
19. The positive side of hacking
Social good
Data Security
Brand Innovation
20. A look in the past
Misunderstanding between
hacker and cracker
First used at MIT in 1960
21. What hackers do
The majority do it for fun
Quite rare on personal
computer
Usually attacks bank for
money
Professionals target big
company
22. What are the effects of computer hacking
Privacy breach Loss of data Identity theft Track of actions
Computer hacking is a breach of computer
security .it can expose sensitive user data
and risk user privacy
23. What are the effects of computer hacking
Privacy breach Loss of data Identity theft Track of actions
Deletion or manipulation of sensitive data
with intent to achieve personal gain is
another effect of computer hacking
24. What are the effects of computer hacking
Privacy breach Loss of data Identity theft Track of actions
It is a fraud that involves pretention to be
someone else, with intent to gain
unauthorized access
25. What are the effects of computer hacking
Privacy breach Loss of data Identity theft Track of actions
Key logging software which is capable of
tracking and recording every key stole by
the user
26. What are the effects of computer hacking
Dos attack Stealing of
information
National security fraud
The DOS attack as it is called refers to
the attempt of making computer
resources unavailable to users
27. What are the effects of computer hacking
Dos attack Stealing of
information
National security fraud
Computer hacking can lead to theft of critical
business information. Business clients can be
lost
28. What are the effects of computer hacking
Dos attack Stealing of
information
National security fraud
Hacking of highly sensitive data can
potentially risk the national security and
sake the overall well being of the country
citizens
29. What are the effects of computer hacking
Dos attack Stealing of
information
National security fraud
Zombie computer are used for
fraudulent activities like spamming and
phishing
30. How hackers work
Log keystrokes
Infect computers
with virus
Gain backdoor
access
Hack passwords