SlideShare ist ein Scribd-Unternehmen logo
1 von 20
01
Seminar
M.B.E.SOCIETY’S COLLEGE OF ENGINEERING
AMBAJOGAI
Department of Computer Science and Engineering
PHISHING ATTACK
Seminar On
By :
ANIKET PANDIT
Guidance by :
PROF. PRITI PANCHAL
03
Contents
• Introduction
• What is phishing attack
• Typical Scenario of phishing
• History of phishing attack
• Types of phishing attack & it's example
• Phishing statistics in india
• Prevention from phishing attack
• Anti-phishing software
• Punishment & Cyber law
• Conclusion
• Reference
04
Introduction
Phishing is a type of social engineering attack
often used to steal user data, including login
credentials and credit card numbers.
05
What is
Phishing?
The term Phishing can be
defined as an act of attempting
to acquire sensitive information
by pretending to be a
trustworthy entity.
Typical Scenario of Phishing Attacks
06
07
The first phishing attempt is
recorded on America online (AOL).
Hacker attempt to steal login
credentials & personal information
from AOL to resell online.
1990
Th riseof E-commerce encourages
cyber criminals to create spoofed
websites, impersonating popular
domain like ebay & PayPal.
Bitcoin & crypto currency are
launched this increases the creation
of malware as it is easier for cyber
criminals to securely receive
payment from their victims
History of Phishing Attack
2000
2008
2013
2019
Cyber criminals begin
hiding malicious code
inside image files to slip
through user's anti-virus
software
Phishing becomes the
primary technique to
deliver ransomware
08
Types of Phishing Attacks
EMAIL PHISHING
SPEAR PHISHING VOICE PHISHING
CLONE PHISHING
09
Email Phishing &
it's Example
The most widely known form of
phishing, this attack is an attempt
to steal sensitive information via an
email that appears to be from a
legitimate organization.
10
Spear Phishing &
it's Example
These email messages are sent to
specific people within an
organization, usually high-privilege
11
Clone Phishing &
it's Example
In this type of phishing, the attacker
clones a genuine or legitimate email
that you might have received from an
authentic sender but sent from a
spoofed email id
12
Voice Phishing &
it's Example
Vishing—or voice phishing—is the
use of fraudulent phone calls to trick
people into giving money or
revealing personal information.
0 20,000 40,000 60,000
2012
2013
2014
2015
2016
2017
2018
2019
2020
Number of cyber crimes
reported across India
PHISHING ATTACK STATISTICS IN INDIA
13
Around 83% of IT teams in
Indian organizations said the
number of phishing emails
targeting their employees
increased during 2020
83%
Most targeted industry in India,
first quarter of 2021
PHISHING ATTACK STATISTICS IN INDIA
Financial Institution
24.7%
Socila Media
23.7%
SaaS
19.7%
Payment
8.5%
Othe
r
8%
E-commerce
7.6%
Logistics and shipping
5.8%
14
During the first quarter of 2021,
24.9% of phishing attacks
worldwide were directed towards
financial institution
On top of that, social media
accounted for 23.6 percent of
attacks making these two the
highest targeted industries when it
came to phishing during this
period.
• Know what a phishing scam look like
• Don't click on that link
• Don't give your information to
unsecured site
• 
Rotate your password regularly
• 
Install Firewalls
• 
Install Anti-phishing software
PREVENTIONS FROM PHISHING
ATTACK
15
ANTI-PHISHING SOFTWARE
Area 1 Horizon
GreatHorn
IronScale
Cloud based service that offer protection from
phishing on Email & network based vectors
This cloud- native email security service protect from
phishing attack on office 365, email carrying
ransomware
This is a self learning email security platform powered
by AI. It can help you to detect & predict phishing
attacks. 16
Hacking into a computer network, data theft,
introducing and spreading viruses through computer
networks, This is a punishable offence under Section
43 of the Information Technology Act, 2000 with the
maximum punishment for the above offences is
imprisonment of up to 3 years or a fine or Rs.
5,00,000 (Rupees five lac) or both.
PUNISHMENT AND CYBER LAW
17
No single technology will completely stop Phishing
Attacks.
CONCLUSION
However a combination of good organization and
practice, proper application of current
technologies and improvement in security
technology has the potential to drastically reduce
the prevalence of phishing and the losses suffered
from it.
18
www.phishing.org
REFERENCE
Phishing Exposed

Social engineering
Phishing Attacks (IEEE subject)
Books
Websites
19
20
Thank You

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 

Was ist angesagt? (20)

Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniques
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Phishing attack
Phishing attackPhishing attack
Phishing attack
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)
 
What is Phishing? Phishing Attack Explained | Edureka
What is Phishing? Phishing Attack Explained | EdurekaWhat is Phishing? Phishing Attack Explained | Edureka
What is Phishing? Phishing Attack Explained | Edureka
 

Ähnlich wie Phishing attack seminar presentation

Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
Mark Albala
 
IRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing SitesIRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing Sites
IRJET Journal
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
wlynn1
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Tech and Law Center
 

Ähnlich wie Phishing attack seminar presentation (20)

Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
 
Cybercrime & Cybersecurity
Cybercrime & CybersecurityCybercrime & Cybersecurity
Cybercrime & Cybersecurity
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurity
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
IRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing SitesIRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing Sites
 
Trends in cyber crime
Trends in cyber crimeTrends in cyber crime
Trends in cyber crime
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
 
Digital Fraud Prevention and Detection Techniques in 2024
Digital Fraud Prevention and Detection Techniques in 2024Digital Fraud Prevention and Detection Techniques in 2024
Digital Fraud Prevention and Detection Techniques in 2024
 
Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?
 
Cyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfCyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdf
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 
Cybersecurity - Webinar Session
Cybersecurity - Webinar SessionCybersecurity - Webinar Session
Cybersecurity - Webinar Session
 
Cyber-Defenders-2020
Cyber-Defenders-2020Cyber-Defenders-2020
Cyber-Defenders-2020
 
CYBERCRIME VICTIMS
CYBERCRIME VICTIMSCYBERCRIME VICTIMS
CYBERCRIME VICTIMS
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
 
Ict forensics and audit bb
Ict forensics and  audit bbIct forensics and  audit bb
Ict forensics and audit bb
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importance
 
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdf
 
Study on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing ToolsStudy on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing Tools
 

Kürzlich hochgeladen

notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 

Kürzlich hochgeladen (20)

chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 

Phishing attack seminar presentation

  • 1. 01 Seminar M.B.E.SOCIETY’S COLLEGE OF ENGINEERING AMBAJOGAI Department of Computer Science and Engineering
  • 2. PHISHING ATTACK Seminar On By : ANIKET PANDIT Guidance by : PROF. PRITI PANCHAL
  • 3. 03 Contents • Introduction • What is phishing attack • Typical Scenario of phishing • History of phishing attack • Types of phishing attack & it's example • Phishing statistics in india • Prevention from phishing attack • Anti-phishing software • Punishment & Cyber law • Conclusion • Reference
  • 4. 04 Introduction Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers.
  • 5. 05 What is Phishing? The term Phishing can be defined as an act of attempting to acquire sensitive information by pretending to be a trustworthy entity.
  • 6. Typical Scenario of Phishing Attacks 06
  • 7. 07 The first phishing attempt is recorded on America online (AOL). Hacker attempt to steal login credentials & personal information from AOL to resell online. 1990 Th riseof E-commerce encourages cyber criminals to create spoofed websites, impersonating popular domain like ebay & PayPal. Bitcoin & crypto currency are launched this increases the creation of malware as it is easier for cyber criminals to securely receive payment from their victims History of Phishing Attack 2000 2008 2013 2019 Cyber criminals begin hiding malicious code inside image files to slip through user's anti-virus software Phishing becomes the primary technique to deliver ransomware
  • 8. 08 Types of Phishing Attacks EMAIL PHISHING SPEAR PHISHING VOICE PHISHING CLONE PHISHING
  • 9. 09 Email Phishing & it's Example The most widely known form of phishing, this attack is an attempt to steal sensitive information via an email that appears to be from a legitimate organization.
  • 10. 10 Spear Phishing & it's Example These email messages are sent to specific people within an organization, usually high-privilege
  • 11. 11 Clone Phishing & it's Example In this type of phishing, the attacker clones a genuine or legitimate email that you might have received from an authentic sender but sent from a spoofed email id
  • 12. 12 Voice Phishing & it's Example Vishing—or voice phishing—is the use of fraudulent phone calls to trick people into giving money or revealing personal information.
  • 13. 0 20,000 40,000 60,000 2012 2013 2014 2015 2016 2017 2018 2019 2020 Number of cyber crimes reported across India PHISHING ATTACK STATISTICS IN INDIA 13 Around 83% of IT teams in Indian organizations said the number of phishing emails targeting their employees increased during 2020 83%
  • 14. Most targeted industry in India, first quarter of 2021 PHISHING ATTACK STATISTICS IN INDIA Financial Institution 24.7% Socila Media 23.7% SaaS 19.7% Payment 8.5% Othe r 8% E-commerce 7.6% Logistics and shipping 5.8% 14 During the first quarter of 2021, 24.9% of phishing attacks worldwide were directed towards financial institution On top of that, social media accounted for 23.6 percent of attacks making these two the highest targeted industries when it came to phishing during this period.
  • 15. • Know what a phishing scam look like • Don't click on that link • Don't give your information to unsecured site •  Rotate your password regularly •  Install Firewalls •  Install Anti-phishing software PREVENTIONS FROM PHISHING ATTACK 15
  • 16. ANTI-PHISHING SOFTWARE Area 1 Horizon GreatHorn IronScale Cloud based service that offer protection from phishing on Email & network based vectors This cloud- native email security service protect from phishing attack on office 365, email carrying ransomware This is a self learning email security platform powered by AI. It can help you to detect & predict phishing attacks. 16
  • 17. Hacking into a computer network, data theft, introducing and spreading viruses through computer networks, This is a punishable offence under Section 43 of the Information Technology Act, 2000 with the maximum punishment for the above offences is imprisonment of up to 3 years or a fine or Rs. 5,00,000 (Rupees five lac) or both. PUNISHMENT AND CYBER LAW 17
  • 18. No single technology will completely stop Phishing Attacks. CONCLUSION However a combination of good organization and practice, proper application of current technologies and improvement in security technology has the potential to drastically reduce the prevalence of phishing and the losses suffered from it. 18