SlideShare a Scribd company logo
www.SeminarSlide.com
Seminar
On
Phishing
 Introduction
 Phishing Techniques
 Phishing Examples
 Types of Phishing
 Causes of Phishing
 Anti Phishing
 Effects of Phishing
 Defend against Phishing Attacks
 Conclusion
 Reference
 Phishing is the act of attempting to acquire
information such as username, password and
credit card details as a trustworthy entity in an
electronic communication.
 Communications purporting to be from
popular social web sites ,auction sites, online
payment process or IT administrators are
commonly used to lure the unsuspecting
public .Phishing emails may contain links to
websites that are infected with malware.
 LINK MANIPULATION
 FILTER EVASION
 WEBSITE FORGERY
 PHONE PHISHING
 In this example, targeted at South Trust Bank users, the
phisher has used an image to make it harder for anti-phishing
filters to detect by scanning for text commonly used in
phishing emails.
phishing-technology-730-J1A0e1Q.pptx
 Deceptive - Sending a deceptive email, in bulk, with a “call
to action” that demands the recipient click on a link.
 Malware-Based - Running malicious software on the
user’s machine. Various forms of malware-based phishing are:
 Key Loggers & Screen Loggers
 Session Hijackers
 Web Trojans
 Data Theft
 DNS-Based - Phishing that interferes with the integrity of
the lookup process for a domain name. Forms of DNS-based
phishing are:
 Hosts file poisoning
 Polluting user’s DNS cache
 Proxy server compromise
 Man-in-the-Middle Phishing - Phisher positions himself
between the user and the legitimate site.
 Content-Injection – Inserting malicious content into legitimate site.
Three primary types of content-injection phishing:
 Hackers can compromise a server through a security
vulnerability and replace or augment the legitimate content with
malicious content.
 Malicious content can be inserted into a site through a cross-site
scripting vulnerability.
Malicious actions can be performed on a site through a SQL
injection vulnerability.
 Misleading e-mails
 No check of source address
 Vulnerability in browsers
 No strong authentication at websites of banks and
financial institutions
 Limited use of digital signatures
 Non-availability of secure desktop tools
 Lack of user awareness
 Vulnerability in applications
A. Social responses
B. Technical approaches
• 1. Helping to identify legitimate websites.
• 2. Browsers alerting users to fraudulent websites.
• 3. Eliminating Phishing mail.
• 4. Monitoring and takedown.
C. Legal approaches
 Internet fraud
 Identity theft
 Financial loss to the original institutions
 Difficulties in Law Enforcement Investigations
 Erosion of Public Trust in the Internet.
 Preventing a phishing attack before it begins
 Detecting a phishing attack
 Preventing the delivery of phishing messages
 Preventing deception in phishing messages and sites
 Counter measures
 Interfering with the use of compromised information
 No single technology will completely stop phishing.
 However, a combination of good organization and
practice, proper application of current technologies,
and improvements in security technology has the
potential to drastically reduce the prevalence of
phishing and the losses suffered from it.
www.google.com
www.wikipedia.com
www.SeminarSlide.com
Thanks

More Related Content

PDF
phishingppt-160209144204.pdf
PPTX
Phishing ppt
PPTX
Phishing ppt
PPTX
PPT on Phishing
PPTX
Phishing
PDF
A Review on Antiphishing Framework
PPTX
Phishing attack, with SSL Encryption and HTTPS Working
PPTX
IP SPOOFING &-.pptx
phishingppt-160209144204.pdf
Phishing ppt
Phishing ppt
PPT on Phishing
Phishing
A Review on Antiphishing Framework
Phishing attack, with SSL Encryption and HTTPS Working
IP SPOOFING &-.pptx

Similar to phishing-technology-730-J1A0e1Q.pptx (20)

PPTX
Chapter 3
PPTX
Anti phishing
PDF
Edu 03 assingment
PPTX
Rods and Hooks - The Phishing Trip by Soummya Mukhopadhyay
PDF
Phishing: Analysis and Countermeasures
PPTX
Phishing
PPT
Phishing
PDF
90% of Data Breaches Start with Phishing—Here’s How to Protect Yourself.pdf
PDF
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
PPTX
Online security and payment system
PPTX
Em Tech - Lesson 2 - Online Safety, Ethics and Netiquette.pptx
PPTX
Phishing ppt
PPT
Computer 4 ict
PDF
E Mail Phishing Prevention and Detection
PDF
need help with a term paper 8 pages Write a term paper that discusse.pdf
PPTX
CYBER.pptx
PDF
Study on Phishing Attacks and Antiphishing Tools
PPTX
Phishing technology
Chapter 3
Anti phishing
Edu 03 assingment
Rods and Hooks - The Phishing Trip by Soummya Mukhopadhyay
Phishing: Analysis and Countermeasures
Phishing
Phishing
90% of Data Breaches Start with Phishing—Here’s How to Protect Yourself.pdf
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
Online security and payment system
Em Tech - Lesson 2 - Online Safety, Ethics and Netiquette.pptx
Phishing ppt
Computer 4 ict
E Mail Phishing Prevention and Detection
need help with a term paper 8 pages Write a term paper that discusse.pdf
CYBER.pptx
Study on Phishing Attacks and Antiphishing Tools
Phishing technology

Recently uploaded (20)

PDF
01-Introduction-to-Information-Management.pdf
PPTX
Pharma ospi slides which help in ospi learning
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PDF
English Language Teaching from Post-.pdf
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PDF
The Final Stretch: How to Release a Game and Not Die in the Process.
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
Cardiovascular Pharmacology for pharmacy students.pptx
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PPTX
Cell Structure & Organelles in detailed.
PPTX
Onica Farming 24rsclub profitable farm business
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
Open Quiz Monsoon Mind Game Prelims.pptx
01-Introduction-to-Information-Management.pdf
Pharma ospi slides which help in ospi learning
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
English Language Teaching from Post-.pdf
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Week 4 Term 3 Study Techniques revisited.pptx
The Final Stretch: How to Release a Game and Not Die in the Process.
Microbial diseases, their pathogenesis and prophylaxis
Cardiovascular Pharmacology for pharmacy students.pptx
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
Cell Structure & Organelles in detailed.
Onica Farming 24rsclub profitable farm business
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
FourierSeries-QuestionsWithAnswers(Part-A).pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
human mycosis Human fungal infections are called human mycosis..pptx
Open Quiz Monsoon Mind Game Prelims.pptx

phishing-technology-730-J1A0e1Q.pptx

  • 2.  Introduction  Phishing Techniques  Phishing Examples  Types of Phishing  Causes of Phishing  Anti Phishing  Effects of Phishing  Defend against Phishing Attacks  Conclusion  Reference
  • 3.  Phishing is the act of attempting to acquire information such as username, password and credit card details as a trustworthy entity in an electronic communication.  Communications purporting to be from popular social web sites ,auction sites, online payment process or IT administrators are commonly used to lure the unsuspecting public .Phishing emails may contain links to websites that are infected with malware.
  • 4.  LINK MANIPULATION  FILTER EVASION  WEBSITE FORGERY  PHONE PHISHING
  • 5.  In this example, targeted at South Trust Bank users, the phisher has used an image to make it harder for anti-phishing filters to detect by scanning for text commonly used in phishing emails.
  • 7.  Deceptive - Sending a deceptive email, in bulk, with a “call to action” that demands the recipient click on a link.  Malware-Based - Running malicious software on the user’s machine. Various forms of malware-based phishing are:  Key Loggers & Screen Loggers  Session Hijackers  Web Trojans  Data Theft
  • 8.  DNS-Based - Phishing that interferes with the integrity of the lookup process for a domain name. Forms of DNS-based phishing are:  Hosts file poisoning  Polluting user’s DNS cache  Proxy server compromise  Man-in-the-Middle Phishing - Phisher positions himself between the user and the legitimate site.
  • 9.  Content-Injection – Inserting malicious content into legitimate site. Three primary types of content-injection phishing:  Hackers can compromise a server through a security vulnerability and replace or augment the legitimate content with malicious content.  Malicious content can be inserted into a site through a cross-site scripting vulnerability. Malicious actions can be performed on a site through a SQL injection vulnerability.
  • 10.  Misleading e-mails  No check of source address  Vulnerability in browsers  No strong authentication at websites of banks and financial institutions  Limited use of digital signatures  Non-availability of secure desktop tools  Lack of user awareness  Vulnerability in applications
  • 11. A. Social responses B. Technical approaches • 1. Helping to identify legitimate websites. • 2. Browsers alerting users to fraudulent websites. • 3. Eliminating Phishing mail. • 4. Monitoring and takedown. C. Legal approaches
  • 12.  Internet fraud  Identity theft  Financial loss to the original institutions  Difficulties in Law Enforcement Investigations  Erosion of Public Trust in the Internet.
  • 13.  Preventing a phishing attack before it begins  Detecting a phishing attack  Preventing the delivery of phishing messages  Preventing deception in phishing messages and sites  Counter measures  Interfering with the use of compromised information
  • 14.  No single technology will completely stop phishing.  However, a combination of good organization and practice, proper application of current technologies, and improvements in security technology has the potential to drastically reduce the prevalence of phishing and the losses suffered from it.