Final Phishing

  • Published on
    08-Nov-2015

  • View
    215

  • Download
    3

Embed Size (px)

DESCRIPTION

presentacion

Transcript

<ul><li><p>CONTENTS :-IntroductionTypes of phishingExamples of phishingTechniques of phishingPrevention methods </p></li><li><p>FISHING</p></li><li><p>PHISHING</p></li><li><p>Phishing is an attempt to fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication.</p><p>Phishing is typically carried out byemail spoofing orinstant messaging,and it often directs users to enter details at a fake website whoselook and feelare almost identical to the legitimate one.</p></li><li><p>Types of phishingSpear phishing </p><p>Clone phishing </p><p>Whaling phishing</p></li><li><p>Characteristics of phishing emails</p></li><li><p>1. Disguised hyperlinks and sender address-</p><p>Appear similar as the genuine institution site. Sender address of the email also appears as originated from the targeted company. </p></li><li><p>2. Email consists of a clickable image : </p><p>Scam emails arrive as a clickable image file containing fraud request for information. </p></li><li><p>3. Content appears genuineScam email include logos, styling, contact and copyright information. identical to those used by the targeted institution. </p></li><li><p>4. Unsolicited requests for sensitive information : </p><p>Emails asks to click a link and provide sensitive personal information .</p><p>It is highly unlikely that a legitimate institution would request sensitive information in such a way.</p></li><li><p>5. Generic GreetingsScam mails are sent in bulk to many recipients and use generic greetings such as "Dear account holder" or "Dear [targeted institution] customer". </p></li><li><p> Phishing Techniques</p></li><li><p>Example of Phishing Email</p></li><li><p>By manipulating the links for example</p><p>www.facb00k.comInstead of www.facebook.com</p><p>Misspelled URLs or sub domains are common tricks used by Attacker</p></li><li><p> Key loggers are designed to monitor all the key strokes</p></li><li><p>Never respond to emails that request personal financial information </p><p>Visit banks websites by typing the URL into the address bar</p><p>Keep a regular check on your accounts</p><p>Be cautious with emails and personal data </p></li><li><p>Keep your computer secure</p><p>Use anti-spam software </p><p>Use anti-spyware software</p><p>Use the Microsoft Baseline Security Analyser (MBSA)</p><p> Use Firewall</p></li><li><p>It is better to be safer now than feel sorry later. </p><p>Thank you.</p><p>***</p></li></ul>