SlideShare ist ein Scribd-Unternehmen logo
1 von 14
PHISHING
Not the kind of Fishing you are used to.
Presented by: -
SANDESH SUMAN
B.Tech (CSE), 6th Semester
Regd. No: 1101209130
OUTLINE
• INTRODUCTION
• HISTORY
• TECHNIQUES
• TARGETS
• DAMAGED CAUSED
• PHISHING EXAMPLE
• ANTI-PHISHING
• PRECAUTION
• CONCLUSION
• REFRENCE
INTRODUCTION
• A collection of techniques used to manipulate
people into performing actions or divulging
confidential information.
• Steal valuable data.
HISTORY
 Phreaking + Fishing = Phishing
- Phreaking = making phone calls for free back in 70’s
– Fishing = Use bait to lure the target
 Phishing in 1995
Purpose: getting account passwords for free time
Threat level: low
Techniques: Similar names ( www.ao1.com for www.aol.com )
 Phishing in 2001
Purpose: getting credit card numbers, accounts
Threat level: medium
Techniques: Same in 1995, key logger
 Phishing in 2007
Purpose: bank accounts
Threat level: high
Techniques: browser vulnerabilities, link obfuscation
TECHNIQUES
• Link Manipulation
Example :- www.aol.com to www.ao1.com
• Filter Evasion
• Website Forgery
• Fake Call
TECHNIQUES
TARGETS
Damaged Caused
• 2,000,000 emails are sent
• 5% get to the end user – 100,000 (APWG)
• 5% click on the phishing link – 5,000 (APWG)
• 2% enter data into the phishing site –100 (Gartner)
• $1,200 from each person who enters data (FTC)
• Potential reward: $120,000
In 2005 David Levi made over $360,000 from 160 people
using an eBay Phishing scam
Damaged Caused
• Over 28,000 unique phishing attacks reported in
Dec. 2006, about double the number from 2005
• Estimates suggest phishing affected 2 million US
citizens and cost businesses billions of dollars in
2005
• Additional losses due to consumer fears
Anti Phishing
• Social Responses
• Legal Responses
• Technical Responses
PRECAUTION
• Never respond to an email asking for personal
information
• Always check the site to see if it is secure. Call
the phone number if necessary
• Never click on the link on the email. Retype
the address in a new window
• Keep your browser updated
• Keep antivirus definitions updated
• Use a firewall
PRECAUTION
CONCLUSION
• No single technology will completely stop
phishing. However, a combination of good
organization and practice, proper application
of current technologies, and improvements in
security technology has the potential to
drastically reduce the prevalence of phishing
and the losses suffered from it
REFERENCES
[1] http://wikipedia.org/ downloaded on 27/12/2013
at 9:00 pm.
[2] http://webopedia.com/ downloaded on
27/12/2013 at 9:00 pm.
[3] http://computerworld.com/ downloaded on
28/12/2013 at 8:00 pm.
[4] http://www.anti-phishing.info/ downloaded on
30/12/2013 at 8:00 pm.
[5] http://lorrie.cranor.org/ downloaded on
30/12/2013 at 8:30 pm.

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (18)

Internet Securities Issues
Internet Securities IssuesInternet Securities Issues
Internet Securities Issues
 
Cyber security
Cyber security Cyber security
Cyber security
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber security
Cyber securityCyber security
Cyber security
 
Trending it security threats in the public sector
Trending it security threats in the public sectorTrending it security threats in the public sector
Trending it security threats in the public sector
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security Workshop @SPIT- 3rd October 2015
Cyber Security Workshop @SPIT- 3rd October 2015Cyber Security Workshop @SPIT- 3rd October 2015
Cyber Security Workshop @SPIT- 3rd October 2015
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moima
 
Cyber Security Awarenessv2.pptx
Cyber Security Awarenessv2.pptxCyber Security Awarenessv2.pptx
Cyber Security Awarenessv2.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Tips to make it security robust against ransomware or malware
Tips to make it security robust against ransomware or malwareTips to make it security robust against ransomware or malware
Tips to make it security robust against ransomware or malware
 

Andere mochten auch (6)

Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 

Ähnlich wie phishing

Phishing scams in banking ppt
Phishing scams in banking pptPhishing scams in banking ppt
Phishing scams in banking ppt
Krishma Sandesra
 
Spear Phishing Defense
Spear Phishing DefenseSpear Phishing Defense
Spear Phishing Defense
Joseph Schorr
 
2015 NOLA_HHM_SE_PP_092015
2015 NOLA_HHM_SE_PP_0920152015 NOLA_HHM_SE_PP_092015
2015 NOLA_HHM_SE_PP_092015
Pete Pouridis
 

Ähnlich wie phishing (20)

Protecting Your Business from Cybercrime - Cybersecurity 101
Protecting Your Business from Cybercrime - Cybersecurity 101Protecting Your Business from Cybercrime - Cybersecurity 101
Protecting Your Business from Cybercrime - Cybersecurity 101
 
CYBER SECURITY _ PHISHING
CYBER SECURITY _ PHISHINGCYBER SECURITY _ PHISHING
CYBER SECURITY _ PHISHING
 
Phishing
PhishingPhishing
Phishing
 
Cyber Security Motivation
Cyber Security MotivationCyber Security Motivation
Cyber Security Motivation
 
Anti phishing
Anti phishingAnti phishing
Anti phishing
 
Phishing scams in banking ppt
Phishing scams in banking pptPhishing scams in banking ppt
Phishing scams in banking ppt
 
HACKING AND PHISHING
HACKING AND PHISHINGHACKING AND PHISHING
HACKING AND PHISHING
 
Phishing.pdf
Phishing.pdfPhishing.pdf
Phishing.pdf
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study Jams
 
Protecting Your Business From Cybercrime
Protecting Your Business From CybercrimeProtecting Your Business From Cybercrime
Protecting Your Business From Cybercrime
 
DWP Cybersecurity 101 for Nonprofits
DWP Cybersecurity 101 for NonprofitsDWP Cybersecurity 101 for Nonprofits
DWP Cybersecurity 101 for Nonprofits
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptx
 
Phishing Technology
Phishing TechnologyPhishing Technology
Phishing Technology
 
Data security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigationData security best practices for risk awareness and mitigation
Data security best practices for risk awareness and mitigation
 
KnowBe4-Presentation-Overview.pptx
KnowBe4-Presentation-Overview.pptxKnowBe4-Presentation-Overview.pptx
KnowBe4-Presentation-Overview.pptx
 
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
 
Spear Phishing Defense
Spear Phishing DefenseSpear Phishing Defense
Spear Phishing Defense
 
2015 NOLA_HHM_SE_PP_092015
2015 NOLA_HHM_SE_PP_0920152015 NOLA_HHM_SE_PP_092015
2015 NOLA_HHM_SE_PP_092015
 

KĂźrzlich hochgeladen

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 

KĂźrzlich hochgeladen (20)

Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 

phishing

  • 1. PHISHING Not the kind of Fishing you are used to. Presented by: - SANDESH SUMAN B.Tech (CSE), 6th Semester Regd. No: 1101209130
  • 2. OUTLINE • INTRODUCTION • HISTORY • TECHNIQUES • TARGETS • DAMAGED CAUSED • PHISHING EXAMPLE • ANTI-PHISHING • PRECAUTION • CONCLUSION • REFRENCE
  • 3. INTRODUCTION • A collection of techniques used to manipulate people into performing actions or divulging confidential information. • Steal valuable data.
  • 4. HISTORY  Phreaking + Fishing = Phishing - Phreaking = making phone calls for free back in 70’s – Fishing = Use bait to lure the target  Phishing in 1995 Purpose: getting account passwords for free time Threat level: low Techniques: Similar names ( www.ao1.com for www.aol.com )  Phishing in 2001 Purpose: getting credit card numbers, accounts Threat level: medium Techniques: Same in 1995, key logger  Phishing in 2007 Purpose: bank accounts Threat level: high Techniques: browser vulnerabilities, link obfuscation
  • 5. TECHNIQUES • Link Manipulation Example :- www.aol.com to www.ao1.com • Filter Evasion • Website Forgery • Fake Call
  • 8. Damaged Caused • 2,000,000 emails are sent • 5% get to the end user – 100,000 (APWG) • 5% click on the phishing link – 5,000 (APWG) • 2% enter data into the phishing site –100 (Gartner) • $1,200 from each person who enters data (FTC) • Potential reward: $120,000 In 2005 David Levi made over $360,000 from 160 people using an eBay Phishing scam
  • 9. Damaged Caused • Over 28,000 unique phishing attacks reported in Dec. 2006, about double the number from 2005 • Estimates suggest phishing affected 2 million US citizens and cost businesses billions of dollars in 2005 • Additional losses due to consumer fears
  • 10. Anti Phishing • Social Responses • Legal Responses • Technical Responses
  • 11. PRECAUTION • Never respond to an email asking for personal information • Always check the site to see if it is secure. Call the phone number if necessary • Never click on the link on the email. Retype the address in a new window • Keep your browser updated • Keep antivirus definitions updated • Use a firewall
  • 13. CONCLUSION • No single technology will completely stop phishing. However, a combination of good organization and practice, proper application of current technologies, and improvements in security technology has the potential to drastically reduce the prevalence of phishing and the losses suffered from it
  • 14. REFERENCES [1] http://wikipedia.org/ downloaded on 27/12/2013 at 9:00 pm. [2] http://webopedia.com/ downloaded on 27/12/2013 at 9:00 pm. [3] http://computerworld.com/ downloaded on 28/12/2013 at 8:00 pm. [4] http://www.anti-phishing.info/ downloaded on 30/12/2013 at 8:00 pm. [5] http://lorrie.cranor.org/ downloaded on 30/12/2013 at 8:30 pm.