Search PPTs

Thursday, July 25, 2013

PPT On Phishing

Presentation On Phishing

Download

Phishing Presentation Transcript:
1.Phishing

2.What is Phishing??
Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.

Phishing is typically carried out by e-mail spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.

3.Techniques Of Phishing
Spear Phishing
      Phishing attempts directed at specific individuals or companies have been termed spearphishing.

Whaling
        Phishing attacks directed specifically at senior executives and other high profile targets within businesses.

Evil Twins
         Phisher creates a fake wireless network that looks similar to a legitimate public network that may be found in public places such as airports, hotels or coffee shops.
 
4.Phone Phishing
    uses fake caller-ID data to give the appearance that calls  come from a trusted organization.

Tabnabbing
       It takes advantage of the multiple tabs that users use and silently redirects a user to the affected site.

5.Phishing Process
Planning
Setup
Attack
Collection
Identity Theft & Fraud

6.Damages Caused By Phishing
Damage caused by phishing ranges from denial of access of e-mail to substantial financial loss.

It is estimated that between May 2009 and May 2010, approximately 1.2 million computer users in the United States suffered losses caused by phishing, totalling approximately US$929 million.

7.Reasons For Successful Phishing
Lack Of Knowledge.
User’s don’t give Proper attention to read the Warning.
Lack of attention to the absence of security indicators.

8.Reasons For Successful Phishing

9.Anti Phishing
There are several different techniques to combat phishing, including legislation and technology created specifically to protect against phishing.  Most new internet browsers come with anti-phishing software.

10.Social responses
train people to recognize phishing   attempts. People can take steps to avoid phishing attempts by slightly modifying their browsing habits. legitimate e-mail messages from companies to their customers contain an item of information that is not readily available to phishers.

No comments:

Related Posts Plugin for WordPress, Blogger...

Blog Archive