Sie sind auf Seite 1von 11

Institute of Engineering & Technology, Alwar

PHISHING
Submitted toMs. Sapna Kumari
Lecturer

Submitted ByRaunak Jain


CSE B Batch
11EIACS085

What is Phishing?
Phishing Basics
How they Attack?
How to Detect?
Damage caused by phishing.
How to avoid Phishing
Conclusion.
Source of Information.
2

What is Phishing???
Phishing is a way of fraudulently acquiring sensitive
information using social engineering and technical subterfuge.
It tries to trick users with official-looking messages

Credit card
Bank account
eBay
Paypal

Some phishing e-mails also contain malicious or unwanted


software that can track your activities or slow your computer.

Phishing Basics
Pronounced "fishing
The word has its Origin from two words Password
Harvesting or fishing for Passwords
Phishing is an online form of pretexting, a kind of deception in
which an attacker pretends to be someone else in order to
obtain sensitive information from the victim
Also known as brand spoofing.
Phishers are phishing artists.

How They ATTACK..


Most attacks of phishing use some form of technical deception
designed to make a link in an email appear to belong to the
spoofed organization.
Misspelled URLs or the use of subdomains are common tricks
used by phishers, such as this example URL,
http://www.maybank.home.com/.
One method of spoofing links used web addresses containing
the @ symbol, which were used to include a username and
password in a web URL.

How TO DETECT..
It is actually very noticeable. You will see misspelled URLs.
One way seeing it is discovering @ in the web addresses e.g.
http://www.hotmail.com@members.com.
Some web browsers such as Mozilla and Internet Explorer has
closed this off while Opera gives a warning and an option to
get off the website.
In another popular method of phishing, an attacker uses a bank
or other services website scripts on the victim.
These types of attack known as cross-site scripting.

Damage caused by phishing.


The damage caused by phishing ranges from loss of access to
email to substantial financial loss.
This style of identity theft is becoming more popular, because
of the ease with which unsuspecting people often divulge
personal information to phishers, including credit card
numbers, social security numbers, and mothers maiden
names.
There are also fears that identity thieves can obtain some such
information simply by accessing public records.
Once they have the information they need and want, the
phishers will use that persons detail to create fake accounts
using the victims name, using up a persons credit, or even
prevent the victim from accessing to their own accounts

How to avoid Phishing


DONT CLICK THE LINK
Type the site name in your browser (such as www.paypal.com)

Never send sensitive account information by e-mail


Account numbers, SSN, passwords

Never give any password out to anyone.


Verify any person who contacts you (phone or email).
If someone calls you on a sensitive topic, thank them, hang up
and call them back using a number that you know is correct,
like from your credit card or statement.

Conclusion..
Phishing emails are only a small aspect of the
overall phishing economy and until now, the
only aspect seen by the most people. The
phishing economy is a decentralized and self
organized social network of merchants and
consumers governed by laws of supply and
demand. This clearer picture of the landscape,
the players, and insight into phishing
operations will hopefully assist in the fight
against online fraud.
9

Source Of Information

www.wikipedia.org
www.antiphishing.org
www.google.com
www.webopedia.com
www.computerworld.com
www.yahoo.com
www.honeynet.org
10

Thanks

11

Das könnte Ihnen auch gefallen