SlideShare ist ein Scribd-Unternehmen logo
1 von 36
GROUP NO : 10
GROUP
PRESENTATION
OF
TOPIC
PHISHING AND HACKING
GROUP MEMBERS :
1. MEHEDI HASSAN BAPPY – 16221021
2. ISHTIAK U AHMED – 16221031
3. Fardun M RAHMAN - 16221053
PHISHING
What Is Phishing?
Actually originated from the word “FISHING”.
Criminal sets a particular bait as a fraudulency
or fooling.
Get access of accounts and take personal data.
History Of Phishing
Phishing was originated around
January 1996.
The first move was made byWAREZ
community.
In 2001 phishers put eye on online
payment system.
In 2003 they use email worm program
to have sites like EBAY or PAYPAL.
In 2004 they attack on banking sites
and customers with PopupWindows.
Types Of Phishing
Phishing Types
Malware
Host File
Poisoning
DataTheft Key loggers
Session
Hijacking
Phishing Types
Search
Engine
Phishing
Phone
Phishing
DNS based
Phishing
Control
Injection
Phishing
Man InThe
Middle
Phishing
Phishing Types : Malware
¤ Malicious Software combined Mal+Ware =
Malware.
¤ Install without notice of the user.
¤ Difficult to remove and get access with user data
¤ Designed to steal credit card or any password of
your computer.
Phishing Types : Malware
Phishing Types : Malware
Up-to-date web browser
Install antivirus solution and
monitor.
Deploy a web filter to block
malicious websites
Latest security patches and
updates
Phishing Types : Keylogger
Secretly
monitor
and log all
key –
strokes.
Can be a
device
other
than a
software.
Parental
care and
company
care
Track
down user
activity of
keyboard
input.
Phishing Types : Keylogger
Phishing Types : Keylogger
A firewall is a
great defense.
Keep your
software updated.
Change your
password
frequently.
Software like
ZONEALARM
shut down all
inbound and
outbound data.
Install a password
manager.
Phishing Types : Data Theft
Illegal
transfer of
storage
USB drive
Portable
hard drive
Email
Printing
Remote
sharing
Consequence
could be
severe for
both
individual
and
businessman
.
Phishing Types : Data Theft
Phishing Types : Data Theft
Usage of restricted
network in
organization.
Laptop lockdown
and biometric
security measures.
Use of anti-malware
software.
Encryption of
confidential
information or
personal data.
Periodic reviews of
device and system
which can pose high
risk.
A man-in-the-middle attack is a type of cyberattack where a
malicious actor inserts him/herself into a conversation between
two parties, impersonates both parties and gains access to
information that the two parties were trying to send to each
other. A man-in-the-middle attack allows a malicious actor to
intercept, send and receive data meant for someone else, or not
meant to be sent at all, without either outside party knowing
until it is too late. Man-in-the-middle attacks can be
abbreviated in many ways, including MITM, MitM, MiM or MIM.
Phishing Types : Man In The Middle
The positive side of hacking
Social good
Data Security
Brand Innovation
A look in the past
Misunderstanding between
hacker and cracker
First used at MIT in 1960
What hackers do
The majority do it for fun
Quite rare on personal
computer
Usually attacks bank for
money
Professionals target big
company
What are the effects of computer hacking
Privacy breach Loss of data Identity theft Track of actions
Computer hacking is a breach of computer
security .it can expose sensitive user data
and risk user privacy
What are the effects of computer hacking
Privacy breach Loss of data Identity theft Track of actions
Deletion or manipulation of sensitive data
with intent to achieve personal gain is
another effect of computer hacking
What are the effects of computer hacking
Privacy breach Loss of data Identity theft Track of actions
It is a fraud that involves pretention to be
someone else, with intent to gain
unauthorized access
What are the effects of computer hacking
Privacy breach Loss of data Identity theft Track of actions
Key logging software which is capable of
tracking and recording every key stole by
the user
What are the effects of computer hacking
Dos attack Stealing of
information
National security fraud
The DOS attack as it is called refers to
the attempt of making computer
resources unavailable to users
What are the effects of computer hacking
Dos attack Stealing of
information
National security fraud
Computer hacking can lead to theft of critical
business information. Business clients can be
lost
What are the effects of computer hacking
Dos attack Stealing of
information
National security fraud
Hacking of highly sensitive data can
potentially risk the national security and
sake the overall well being of the country
citizens
What are the effects of computer hacking
Dos attack Stealing of
information
National security fraud
Zombie computer are used for
fraudulent activities like spamming and
phishing
How hackers work
Log keystrokes
Infect computers
with virus
Gain backdoor
access
Hack passwords
How hackers work
Zombie
computers
Physically hacking
Virus in flash
drives
Spy on email
How to prevent hacking
Update operating
system and web
browser
Use strong password Purchase anti-virus
software
Install firewall on
computer
How to prevent hacking
Update operating
system and web
browser
Use strong password Purchase anti-virus
software
Install firewall on
computer
How to prevent hacking
Update operating
system and web
browser
Use strong password Purchase anti-virus
software
Install firewall on
computer
How to prevent hacking
Update operating
system and web
browser
Use strong password Purchase anti-virus
software
Install firewall on
computer
Thank You

Weitere ähnliche Inhalte

Was ist angesagt? (20)

What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?
 
Anti phishing
Anti phishingAnti phishing
Anti phishing
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
Phishing
PhishingPhishing
Phishing
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
PPT on Phishing
PPT on PhishingPPT on Phishing
PPT on Phishing
 
Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharks
 
Anti phishing presentation
Anti phishing presentationAnti phishing presentation
Anti phishing presentation
 
PHISHING PROTECTION
PHISHING PROTECTIONPHISHING PROTECTION
PHISHING PROTECTION
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
 
Phishing attack
Phishing attackPhishing attack
Phishing attack
 
Hacking
HackingHacking
Hacking
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Data theft
Data theftData theft
Data theft
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
Phishing
PhishingPhishing
Phishing
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 

Andere mochten auch

Symantec Physhing Report Aprile 2009
Symantec Physhing Report Aprile 2009Symantec Physhing Report Aprile 2009
Symantec Physhing Report Aprile 2009Freedata Labs
 
Seminaar Report of Phishing VIII Sem
Seminaar Report of Phishing VIII SemSeminaar Report of Phishing VIII Sem
Seminaar Report of Phishing VIII SemNarendra Singh
 
secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger Abhishek Hirapara
 
Is the Information Super Highway Paved With Gold ?
Is the Information Super Highway Paved With Gold ?Is the Information Super Highway Paved With Gold ?
Is the Information Super Highway Paved With Gold ?nationalrural
 
Cryptography - Simplified - Message Integrity
Cryptography - Simplified - Message IntegrityCryptography - Simplified - Message Integrity
Cryptography - Simplified - Message IntegrityAbdul Manaf Vellakodath
 
Bulling lia damaris2
Bulling lia damaris2Bulling lia damaris2
Bulling lia damaris2upark4
 
Penyederhanaan Karnaugh Map
Penyederhanaan Karnaugh MapPenyederhanaan Karnaugh Map
Penyederhanaan Karnaugh MapCheria Asyifa
 
Aljabar boolean
Aljabar booleanAljabar boolean
Aljabar booleanfarhan2000
 
Lecture # 2
Lecture # 2Lecture # 2
Lecture # 2Mr SMAK
 
Introduction to Web Engineering and Services
Introduction to Web Engineering and ServicesIntroduction to Web Engineering and Services
Introduction to Web Engineering and ServicesFazal Imran
 
Pembentukan peta karnaugh
Pembentukan peta karnaughPembentukan peta karnaugh
Pembentukan peta karnaughCheria Asyifa
 
Gerbang logika dasar nand ,nor ,ex or ,ex - nor 1
Gerbang logika dasar nand ,nor ,ex   or ,ex - nor 1Gerbang logika dasar nand ,nor ,ex   or ,ex - nor 1
Gerbang logika dasar nand ,nor ,ex or ,ex - nor 1Mila Art
 
Virus de computador
Virus de computadorVirus de computador
Virus de computadorvitinhozika
 
Perigos da internet
Perigos da internetPerigos da internet
Perigos da internetap3bmachado
 
Introduction to Multimedia Technologies
Introduction to Multimedia TechnologiesIntroduction to Multimedia Technologies
Introduction to Multimedia TechnologiesTamanna Sehgal
 
Serviços da internet
Serviços da internetServiços da internet
Serviços da internetMoysés Alves
 

Andere mochten auch (20)

PHISING Y HACKING
PHISING Y HACKINGPHISING Y HACKING
PHISING Y HACKING
 
Symantec Physhing Report Aprile 2009
Symantec Physhing Report Aprile 2009Symantec Physhing Report Aprile 2009
Symantec Physhing Report Aprile 2009
 
Seminaar Report of Phishing VIII Sem
Seminaar Report of Phishing VIII SemSeminaar Report of Phishing VIII Sem
Seminaar Report of Phishing VIII Sem
 
secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger
 
Is the Information Super Highway Paved With Gold ?
Is the Information Super Highway Paved With Gold ?Is the Information Super Highway Paved With Gold ?
Is the Information Super Highway Paved With Gold ?
 
Cryptography - Simplified - Message Integrity
Cryptography - Simplified - Message IntegrityCryptography - Simplified - Message Integrity
Cryptography - Simplified - Message Integrity
 
Bulling lia damaris2
Bulling lia damaris2Bulling lia damaris2
Bulling lia damaris2
 
Penyederhanaan Karnaugh Map
Penyederhanaan Karnaugh MapPenyederhanaan Karnaugh Map
Penyederhanaan Karnaugh Map
 
Aljabar boolean
Aljabar booleanAljabar boolean
Aljabar boolean
 
Lecture # 2
Lecture # 2Lecture # 2
Lecture # 2
 
Introduction to Web Engineering and Services
Introduction to Web Engineering and ServicesIntroduction to Web Engineering and Services
Introduction to Web Engineering and Services
 
Phising
PhisingPhising
Phising
 
Preparing For E Business
Preparing For E BusinessPreparing For E Business
Preparing For E Business
 
Pembentukan peta karnaugh
Pembentukan peta karnaughPembentukan peta karnaugh
Pembentukan peta karnaugh
 
Perigos na internet
Perigos na internetPerigos na internet
Perigos na internet
 
Gerbang logika dasar nand ,nor ,ex or ,ex - nor 1
Gerbang logika dasar nand ,nor ,ex   or ,ex - nor 1Gerbang logika dasar nand ,nor ,ex   or ,ex - nor 1
Gerbang logika dasar nand ,nor ,ex or ,ex - nor 1
 
Virus de computador
Virus de computadorVirus de computador
Virus de computador
 
Perigos da internet
Perigos da internetPerigos da internet
Perigos da internet
 
Introduction to Multimedia Technologies
Introduction to Multimedia TechnologiesIntroduction to Multimedia Technologies
Introduction to Multimedia Technologies
 
Serviços da internet
Serviços da internetServiços da internet
Serviços da internet
 

Ähnlich wie Phishing and hacking

Know _ Top 7 Cyber Security threat.pdf
Know _ Top 7 Cyber Security threat.pdfKnow _ Top 7 Cyber Security threat.pdf
Know _ Top 7 Cyber Security threat.pdfLindaWHill
 
Cape it unit 2 module 3 unedited students notes (compiled from internet)
Cape it unit 2 module 3 unedited students notes (compiled from internet)Cape it unit 2 module 3 unedited students notes (compiled from internet)
Cape it unit 2 module 3 unedited students notes (compiled from internet)Jevaughan Edie
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxCUInnovationTeam
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptxTapan Khilar
 
Different Types Of Cyber Security Threats
Different Types Of Cyber Security ThreatsDifferent Types Of Cyber Security Threats
Different Types Of Cyber Security ThreatsDaniel Martin
 
social engineering attacks.docx
social engineering attacks.docxsocial engineering attacks.docx
social engineering attacks.docxMehwishAnsari11
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber CrimeGaurav Patel
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information SecurityMichele Thomas
 
What-is-computer-security
What-is-computer-securityWhat-is-computer-security
What-is-computer-securityiamvishal2
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersAman Sharma
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1indhuchezhian
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityjyoti_lakhani
 

Ähnlich wie Phishing and hacking (20)

Know _ Top 7 Cyber Security threat.pdf
Know _ Top 7 Cyber Security threat.pdfKnow _ Top 7 Cyber Security threat.pdf
Know _ Top 7 Cyber Security threat.pdf
 
Cape it unit 2 module 3 unedited students notes (compiled from internet)
Cape it unit 2 module 3 unedited students notes (compiled from internet)Cape it unit 2 module 3 unedited students notes (compiled from internet)
Cape it unit 2 module 3 unedited students notes (compiled from internet)
 
Cyber Crime.ppt
Cyber Crime.pptCyber Crime.ppt
Cyber Crime.ppt
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
Different Types Of Cyber Security Threats
Different Types Of Cyber Security ThreatsDifferent Types Of Cyber Security Threats
Different Types Of Cyber Security Threats
 
cyber crime
cyber crimecyber crime
cyber crime
 
social engineering attacks.docx
social engineering attacks.docxsocial engineering attacks.docx
social engineering attacks.docx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
What-is-computer-security
What-is-computer-securityWhat-is-computer-security
What-is-computer-security
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 

Mehr von Md. Mehadi Hassan Bappy

Consumers Are Showrooming and Webrooming Your Business, Here's What That Mean...
Consumers Are Showrooming and Webrooming Your Business, Here's What That Mean...Consumers Are Showrooming and Webrooming Your Business, Here's What That Mean...
Consumers Are Showrooming and Webrooming Your Business, Here's What That Mean...Md. Mehadi Hassan Bappy
 
Valuation of BATA Shoe Company (Bangladesh) Limited
Valuation of BATA Shoe Company (Bangladesh) LimitedValuation of BATA Shoe Company (Bangladesh) Limited
Valuation of BATA Shoe Company (Bangladesh) LimitedMd. Mehadi Hassan Bappy
 
Venezuela Boliver crisis, it's reasons and impact
Venezuela Boliver crisis, it's reasons and impactVenezuela Boliver crisis, it's reasons and impact
Venezuela Boliver crisis, it's reasons and impactMd. Mehadi Hassan Bappy
 
Role of Public finance in rural development
Role of Public finance in rural developmentRole of Public finance in rural development
Role of Public finance in rural developmentMd. Mehadi Hassan Bappy
 
Impact of Relevant Company Specific Factors on the Market Price of the Stock....
Impact of Relevant Company Specific Factors on the Market Price of the Stock....Impact of Relevant Company Specific Factors on the Market Price of the Stock....
Impact of Relevant Company Specific Factors on the Market Price of the Stock....Md. Mehadi Hassan Bappy
 
Introduction of Stock market. (Bangladesh)
Introduction of Stock market. (Bangladesh)Introduction of Stock market. (Bangladesh)
Introduction of Stock market. (Bangladesh)Md. Mehadi Hassan Bappy
 
Impact of motivation on employee performance
Impact of motivation on employee performanceImpact of motivation on employee performance
Impact of motivation on employee performanceMd. Mehadi Hassan Bappy
 
Economic Forces that affects interest rates in Bangladesh.
Economic Forces that affects interest rates in Bangladesh.Economic Forces that affects interest rates in Bangladesh.
Economic Forces that affects interest rates in Bangladesh.Md. Mehadi Hassan Bappy
 
Inventory Management of Electronic Industry
Inventory Management of Electronic IndustryInventory Management of Electronic Industry
Inventory Management of Electronic IndustryMd. Mehadi Hassan Bappy
 
Human resource Management of Coca Cola Bangladesh
Human resource Management of Coca Cola BangladeshHuman resource Management of Coca Cola Bangladesh
Human resource Management of Coca Cola BangladeshMd. Mehadi Hassan Bappy
 
Analysis on China Life Insurance Company ltd.
Analysis on China Life Insurance Company ltd.Analysis on China Life Insurance Company ltd.
Analysis on China Life Insurance Company ltd.Md. Mehadi Hassan Bappy
 
Measure of nation's income- Limitations of GDP
Measure of nation's income- Limitations of GDPMeasure of nation's income- Limitations of GDP
Measure of nation's income- Limitations of GDPMd. Mehadi Hassan Bappy
 
Saving, Investment and the Financial system.
Saving, Investment and the Financial system.Saving, Investment and the Financial system.
Saving, Investment and the Financial system.Md. Mehadi Hassan Bappy
 
Financial Analysis of Square Pharmaceuticals Ltd.
Financial Analysis of Square Pharmaceuticals Ltd.Financial Analysis of Square Pharmaceuticals Ltd.
Financial Analysis of Square Pharmaceuticals Ltd.Md. Mehadi Hassan Bappy
 
Capital Market Crisis & it's impact On Economy.
Capital Market Crisis & it's impact On Economy.Capital Market Crisis & it's impact On Economy.
Capital Market Crisis & it's impact On Economy.Md. Mehadi Hassan Bappy
 

Mehr von Md. Mehadi Hassan Bappy (20)

“VALUATION OF ORION PHARMA LIMITED”
“VALUATION OF ORION PHARMA LIMITED”“VALUATION OF ORION PHARMA LIMITED”
“VALUATION OF ORION PHARMA LIMITED”
 
Consumers Are Showrooming and Webrooming Your Business, Here's What That Mean...
Consumers Are Showrooming and Webrooming Your Business, Here's What That Mean...Consumers Are Showrooming and Webrooming Your Business, Here's What That Mean...
Consumers Are Showrooming and Webrooming Your Business, Here's What That Mean...
 
CFA Standard 3
CFA Standard 3CFA Standard 3
CFA Standard 3
 
Valuation of BATA Shoe Company (Bangladesh) Limited
Valuation of BATA Shoe Company (Bangladesh) LimitedValuation of BATA Shoe Company (Bangladesh) Limited
Valuation of BATA Shoe Company (Bangladesh) Limited
 
Venezuela Boliver crisis, it's reasons and impact
Venezuela Boliver crisis, it's reasons and impactVenezuela Boliver crisis, it's reasons and impact
Venezuela Boliver crisis, it's reasons and impact
 
Role of Public finance in rural development
Role of Public finance in rural developmentRole of Public finance in rural development
Role of Public finance in rural development
 
Impact of Relevant Company Specific Factors on the Market Price of the Stock....
Impact of Relevant Company Specific Factors on the Market Price of the Stock....Impact of Relevant Company Specific Factors on the Market Price of the Stock....
Impact of Relevant Company Specific Factors on the Market Price of the Stock....
 
Introduction of Stock market. (Bangladesh)
Introduction of Stock market. (Bangladesh)Introduction of Stock market. (Bangladesh)
Introduction of Stock market. (Bangladesh)
 
Audit & Assurance
Audit & Assurance Audit & Assurance
Audit & Assurance
 
Impact of motivation on employee performance
Impact of motivation on employee performanceImpact of motivation on employee performance
Impact of motivation on employee performance
 
Economic Forces that affects interest rates in Bangladesh.
Economic Forces that affects interest rates in Bangladesh.Economic Forces that affects interest rates in Bangladesh.
Economic Forces that affects interest rates in Bangladesh.
 
Inventory Management of Electronic Industry
Inventory Management of Electronic IndustryInventory Management of Electronic Industry
Inventory Management of Electronic Industry
 
Human resource Management of Coca Cola Bangladesh
Human resource Management of Coca Cola BangladeshHuman resource Management of Coca Cola Bangladesh
Human resource Management of Coca Cola Bangladesh
 
Analysis on China Life Insurance Company ltd.
Analysis on China Life Insurance Company ltd.Analysis on China Life Insurance Company ltd.
Analysis on China Life Insurance Company ltd.
 
Variable costing
Variable costingVariable costing
Variable costing
 
Measure of nation's income- Limitations of GDP
Measure of nation's income- Limitations of GDPMeasure of nation's income- Limitations of GDP
Measure of nation's income- Limitations of GDP
 
Saving, Investment and the Financial system.
Saving, Investment and the Financial system.Saving, Investment and the Financial system.
Saving, Investment and the Financial system.
 
Financial Analysis of Square Pharmaceuticals Ltd.
Financial Analysis of Square Pharmaceuticals Ltd.Financial Analysis of Square Pharmaceuticals Ltd.
Financial Analysis of Square Pharmaceuticals Ltd.
 
Measure of Dispersion in statistics
Measure of Dispersion in statisticsMeasure of Dispersion in statistics
Measure of Dispersion in statistics
 
Capital Market Crisis & it's impact On Economy.
Capital Market Crisis & it's impact On Economy.Capital Market Crisis & it's impact On Economy.
Capital Market Crisis & it's impact On Economy.
 

Kürzlich hochgeladen

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 

Kürzlich hochgeladen (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Phishing and hacking

  • 1. GROUP NO : 10 GROUP PRESENTATION OF
  • 2. TOPIC PHISHING AND HACKING GROUP MEMBERS : 1. MEHEDI HASSAN BAPPY – 16221021 2. ISHTIAK U AHMED – 16221031 3. Fardun M RAHMAN - 16221053
  • 4. What Is Phishing? Actually originated from the word “FISHING”. Criminal sets a particular bait as a fraudulency or fooling. Get access of accounts and take personal data.
  • 5. History Of Phishing Phishing was originated around January 1996. The first move was made byWAREZ community. In 2001 phishers put eye on online payment system. In 2003 they use email worm program to have sites like EBAY or PAYPAL. In 2004 they attack on banking sites and customers with PopupWindows.
  • 9. Phishing Types : Malware ¤ Malicious Software combined Mal+Ware = Malware. ¤ Install without notice of the user. ¤ Difficult to remove and get access with user data ¤ Designed to steal credit card or any password of your computer.
  • 10. Phishing Types : Malware
  • 11. Phishing Types : Malware Up-to-date web browser Install antivirus solution and monitor. Deploy a web filter to block malicious websites Latest security patches and updates
  • 12. Phishing Types : Keylogger Secretly monitor and log all key – strokes. Can be a device other than a software. Parental care and company care Track down user activity of keyboard input.
  • 13. Phishing Types : Keylogger
  • 14. Phishing Types : Keylogger A firewall is a great defense. Keep your software updated. Change your password frequently. Software like ZONEALARM shut down all inbound and outbound data. Install a password manager.
  • 15. Phishing Types : Data Theft Illegal transfer of storage USB drive Portable hard drive Email Printing Remote sharing Consequence could be severe for both individual and businessman .
  • 16. Phishing Types : Data Theft
  • 17. Phishing Types : Data Theft Usage of restricted network in organization. Laptop lockdown and biometric security measures. Use of anti-malware software. Encryption of confidential information or personal data. Periodic reviews of device and system which can pose high risk.
  • 18. A man-in-the-middle attack is a type of cyberattack where a malicious actor inserts him/herself into a conversation between two parties, impersonates both parties and gains access to information that the two parties were trying to send to each other. A man-in-the-middle attack allows a malicious actor to intercept, send and receive data meant for someone else, or not meant to be sent at all, without either outside party knowing until it is too late. Man-in-the-middle attacks can be abbreviated in many ways, including MITM, MitM, MiM or MIM. Phishing Types : Man In The Middle
  • 19. The positive side of hacking Social good Data Security Brand Innovation
  • 20. A look in the past Misunderstanding between hacker and cracker First used at MIT in 1960
  • 21. What hackers do The majority do it for fun Quite rare on personal computer Usually attacks bank for money Professionals target big company
  • 22. What are the effects of computer hacking Privacy breach Loss of data Identity theft Track of actions Computer hacking is a breach of computer security .it can expose sensitive user data and risk user privacy
  • 23. What are the effects of computer hacking Privacy breach Loss of data Identity theft Track of actions Deletion or manipulation of sensitive data with intent to achieve personal gain is another effect of computer hacking
  • 24. What are the effects of computer hacking Privacy breach Loss of data Identity theft Track of actions It is a fraud that involves pretention to be someone else, with intent to gain unauthorized access
  • 25. What are the effects of computer hacking Privacy breach Loss of data Identity theft Track of actions Key logging software which is capable of tracking and recording every key stole by the user
  • 26. What are the effects of computer hacking Dos attack Stealing of information National security fraud The DOS attack as it is called refers to the attempt of making computer resources unavailable to users
  • 27. What are the effects of computer hacking Dos attack Stealing of information National security fraud Computer hacking can lead to theft of critical business information. Business clients can be lost
  • 28. What are the effects of computer hacking Dos attack Stealing of information National security fraud Hacking of highly sensitive data can potentially risk the national security and sake the overall well being of the country citizens
  • 29. What are the effects of computer hacking Dos attack Stealing of information National security fraud Zombie computer are used for fraudulent activities like spamming and phishing
  • 30. How hackers work Log keystrokes Infect computers with virus Gain backdoor access Hack passwords
  • 31. How hackers work Zombie computers Physically hacking Virus in flash drives Spy on email
  • 32. How to prevent hacking Update operating system and web browser Use strong password Purchase anti-virus software Install firewall on computer
  • 33. How to prevent hacking Update operating system and web browser Use strong password Purchase anti-virus software Install firewall on computer
  • 34. How to prevent hacking Update operating system and web browser Use strong password Purchase anti-virus software Install firewall on computer
  • 35. How to prevent hacking Update operating system and web browser Use strong password Purchase anti-virus software Install firewall on computer