phishing attacks ppt

Download Phishing attacks ppt

If you can't read please download the document

Post on 17-Dec-2014

24.044 views

Category:

Education

3 download

Embed Size (px)

DESCRIPTION

 

TRANSCRIPT

  • 1. Pronounced "fishing The word has its Origin from two words Password Harvesting or fishing for Passwords Phishing is an online form of pretexting, a kind of deception in which an attacker pretends to be someone else in order to obtain sensitive information from the victim Also known as "brand spoofing Phishers are phishing artists
  • 2. Phishing is a way of fraudulently acquiring sensitive information using social engineering and technical subterfuge. It tries to trick users with official-looking messages Credit card Bank account eBay Paypal Some phishing e-mails also contain malicious or unwanted software that can track your activities or slow your computer
  • 3. The purpose of a phishing message is to acquire sensitive information about a user. For doing so the message needs to deceive the intended recipient. So it doesnt contains any useful information and hence falls under the category of spam. A spam message tries to sell a product or service, whereas phishing message needs to look like it is from a legitimate organization. Techniques applied to spam message cant be applied naively to phishing messages.
  • 4. 1) Detect and block the phishing Web sites in time2) Enhance the security of the web sites3) Block the phishing e-mails by various spam filters4) Install online anti-phishing software in users computers
  • 5. i)Classification of the hyperlinks in the phishing e-mailsii) Link guard algorithmIii)Link guard implemented clientIv) Feasibility study
  • 6. DONT CLICK THE LINK Type the site name in your browser (such as www.paypal.com) Never send sensitive account information by e-mail Account numbers, SSN, passwords Never give any password out to anyone Verify any person who contacts you (phone or email). If someone calls you on a sensitive topic, thank them, hang up and call them back using a number that you know is correct, like from your credit card or statement.
  • 7. Dear Valued Member,According to our terms of services, you will have to confirm youre-mail by the following link, or your account will be suspendedfor security reasons.http://www.uc.edu/confirm.php?account=d.mich.mal@uc.eduAfter following the instructions in the sheet, your account willnot be interrupted and will continue as normal. http://www.nbmd.cn/Confirmation_Sheet.pifThanks for your attention to this request. We apologize for anyinconvenience.Sincerely, Uc Abuse Department
  • 8. SOFTWARE REQUIREMENTS:Operating System : Windows XP/2000Language : Java (J2sdk1.6.0)Database : Oracle 10gTECHNOLOGIES USED : JSP Servlets Apache Tomcat 5.5
  • 9. Hard disk : 20 GB and above RAM : 256 MB and above Processor speed : 1.6 GHz and above