Phishing

17

Transcript of Phishing

Page 1: Phishing
Page 2: Phishing

• Komal Ramole

• Smita Deore

• Kiran Patil

• Snehal More

Page 3: Phishing

• Introduction• What is Phishing??• What kind of information do the hackers

want?• How Phishing is done?• Techniques of Phishing• Prevention• Conclusion

Page 4: Phishing

Origin of word “Phishing” from two words – Origin of word “Phishing” from two words – ‘Password’ & ‘Harvesting’.‘Password’ & ‘Harvesting’.

Phishing is a con game that scammers use to Phishing is a con game that scammers use to collect personal information from unsuspecting collect personal information from unsuspecting users.users.

Phishing:1

Page 5: Phishing

Phishing is a type of Internet fraud that seeks to Phishing is a type of Internet fraud that seeks to acquire a user’s credentials by deception.acquire a user’s credentials by deception.

Phishing refers to a person or a group of cyber-Phishing refers to a person or a group of cyber-criminals who create copy of an existing legitimate criminals who create copy of an existing legitimate website.website.

Phishing:2

Page 6: Phishing

Your name, address and date of birthYour name, address and date of birth

Social Security numberSocial Security number

Driver’s License numberDriver’s License number

Credit Card numbersCredit Card numbers

ATM cardsATM cards

Telephone calling cardsTelephone calling cards

Phishing:3

Page 7: Phishing

Phishing:4

Page 8: Phishing

Phishing:5

Page 9: Phishing

Phishing:6

Page 10: Phishing

Phishing:7

Page 11: Phishing

Phishing:8

Page 12: Phishing

Phishing:9

Page 13: Phishing

Phishing:10

Page 14: Phishing

Protect your computer with anti-virus Protect your computer with anti-virus software.software. Ensure that your Internet browser is up to Ensure that your Internet browser is up to date and security patches applied.date and security patches applied. Be suspicious of any e-mail with urgent Be suspicious of any e-mail with urgent requests.requests.

Phishing:11

Page 15: Phishing

Avoid filling out forms in e-mail messages or Avoid filling out forms in e-mail messages or pop-up windows .pop-up windows .

Don’t use the links in an e-mail to get to any Don’t use the links in an e-mail to get to any web page, if you suspect the message might not web page, if you suspect the message might not be authentic.be authentic.

Phishing:12

Page 16: Phishing

Be Alert , Be Wary, and Be Alert , Be Wary, and Be Informed !!! Be Informed !!!

Phishing:13

Page 17: Phishing