SlideShare una empresa de Scribd logo
1 de 31
Evaluation of SPAM and
Phishing Detection and
Mitigation
Introduction
Phishing may be a form of public manufacturing assault it
absolutely is regularly won’t to the more character
information, counting login identifications than MasterCard
figures. It happens whilst an enemy, posing as an established
unit, recommends a victim hooked on preliminary an email
instant communication, or reproduction message. The receiver
remains previously trapped hooked on ticking a malevolent
connection, which might reason the setup of malware, a
machine freezes in a very ransomware assault or the
disclosure of sensitive records.
Methodological Examples of phishing assaults
The following illustrates a famous phishing scam try:
• A fake e-mail purporting to be after myuniversity.edu is determined to spread via way
of numerous potential individuals as feasible.
• The e-mail dues that the person's PIN will end speedily. instructions are furnished at
myuniversity.edu/renewal; wherein you will renew your password within 24 hours.
(Gilad, Herzberg and Shulman, 2014)
• some subjects can appear once you click on a hyperlink. intended for sample:
• The person is redirected to my university edurenewal.com, a fake web sheet that
appears exactly similar to the actual regeneration web page, in which each new and
modern PIN is ked. A mugger nursing the net sheet steals the number one password
to achieve access to comfortable areas in the college community. (Gilad, Herzberg and
Shulman, 2014)
• The consumer is redirected to the triumphing password reset web page. however,
throughout the redirect, a malicious script is activated within the context to take over
the purchaser's cookie. The result's a bounced XSS attack that gives the wrongdoer
privileged get entry to a school network Phishing strategies.
What's a phishing email?
A phishing email is a cybercrime that is based on deception
to steal confidential information from customers and
businesses.
Phishing preys are fooled into revealing statistics they
recognize need to be kept secret. because of the reality they
reliance the supply of the request for records and agree that
the birthday party is performing with first-rate intentions,
patients of phishing emails usually rejoin without pondering.
Objective 1 – Comparison of Email Filtering Tools
Mail Cleaner Spam Titan
Functions:
1. It automatically filters all the
legitimate emails.
2. It combines artificial
intelligence algorithms and
continuously identifies the
converting techniques of the
spammers.
3. It has a clean purchaser
interface which could assist to
manipulate the emails well.
Functions:
• It shelters the commerce from
unsolicited mail emails and
actual emails’.
• It identifies an as in reality
desired to comprise viruses to
ship malware than record
then gadget and
• It scans all of the outbound
emails coming to the shared
Objective 1 – Comparison of Email Filtering Tools
E-mail safety Cloud Direct mail Bully
Functions:
• It routinely filters email threats
like malware, viruses, and
different on line threats that try
and enter the machine.
• unwanted emails are dispatched
to quarantine, where it is able to
be looked after to repair or put
off them.
• It runs in the background and
doesn’t pop up constantly while
the hazard is detected and
additionally permits unions the
unions.
Functions:
 It blocks and deletes unwanted
emails from the blacklisted email
addresses and additionally
assessments the attachments for
the threat
 It has a Bayesian filter out that
blocks non-public customized
mail emails.
 It can block emails based on the
sender on IP address and the
originating u. sorter intruder that
there aren't any such emails
within the inbox in the destiny.
Objective 2: Research on Projects Phishing and Spam in Email
services
Necessities Description
• Essential computer abilities
to understand fundamental
phrases and use e-mail for
paintings and/or home
purposes.
• Familiarity along with your
electronic mail provider or
patron to check e-mail and
change fundamental settings.
• E-mail remains an extremely vital non-public
and enterprise communique tool. With an
account that touches such a number of
specific on-line money owed, e-mails are
crucial to guard.
• Do you discover yourself constantly deleting
junk mail messages and disturbing whether or
not that e-mail bank is in reality true? if so,
then throw to is combat solicited mail and
Phishing Emails pa combat to defend your e-
mail and identity.
• you may be able to spot and how it ties in with
your common non-public cybersecurity
strategy. you will be capable of becoming come
aware of fraudulent emails earlier than they're
capable of doing damage via way of being able
to
Objective 3 – Ways to Conclude the Malicious Type Email Content
Test for Phishing Email, Viruses and Spam:
Check your unsolicited mail clear out
• The first step you ought to take is to test your email issuer’s
settings. on the identical time as maximum do
extraordinary activity at blocking off junk mail and phis
and he tries, there can also however be some that slip
through the filters.
• In case you observe any phishing emails on your inbox,
record them immediately. that is taken into consideration a
phishing prevention best prices tice. not high-quality does
the record choice assist your organization capture
comparable emails inside the destiny, but it blocks them as
properly. This have to prevent seeing from has tried again.
Objective 3 – Ways to Conclude the Malicious Type Email Content
Test for Phishing Email, Viruses and Spam:
Set up rules on your spam clear out
 Have you stated a phishing e-mail to appear every to
manually appear when you could need to put in small in
your junk mail clean out?
 Depending to your submission, you may set unreel
submissions coming emails may be automatically marked
as junk and positioned within in ash. Out of sight, out of
mind.
Objective 3 – Ways to Conclude the Malicious Type Email Content
Test for Phishing Email, Viruses and Spam:
Installation of anti-phishing software program:
• Anti-phishing software program is an outstanding manner to get greater
protection. another time, essential e mail carriers have decent direct mail
filtering, abilities, it’s now not sufficient.
• In case you find out your inbox is continuously filling up with phishing emails,
this phishing safety software program can help. With organization-leveled mail
filtering, this system has extra effective and a long way-carrying out abilities
than your email issuer does.
• off safety
• 23% of folks that acquire phishing emails open them, and eleven% of them
open attachments. this means a fourth of your team of workers places your
whole business enterprise at hazard.
• In case you offer ordinary safety training, you can decrease this wide variety. By
teaching your employees to obey and apprehend g phishing emails, they might
avoid breaches in your protection from all kinds of phishing assaults. moreover,
they could shield other people by using manner of alerting the security officer
every time they get hold of a phishing electronic mail.
Objective 3 – Ways to Conclude the Malicious Type Email Content
Test for Phishing Email, Viruses and Spam:
Positioned a present to phishing attempts:
• The greater phishing emails get via, the much more likely
it's miles for cyber criminals successful. by using
implementing these ways in a manner to prevent phishing
emails, the likelihood of your touchy statistics getting out
decreases.
• through the strength of unsolicited mail filtering and
protection training, you’ll preserve scams out of your
employer and be relaxed together with your ‘rework.
Objective 3 – Ways to Conclude
the Malicious Type Email
Content Test for Phishing Email,
Viruses and Spam:
Testing Malicious Email
Attack or Social Engering
Attack:
• Install a Kali Linux
Machine in virtual
box.
• Open the Terminal in
Kali machine and
type “ setoolkit” to
use this tool to attack
to victim machine
with any malicious
link.
Objective 3 – Ways to Conclude
the Malicious Type Email
Content Test for Phishing Email,
Viruses and Spam:
Testing Malicious Email
Attack or Social Engering
Attack:
• Then press “1”and
hit enter to enter
into Social
Engineering
attack
Objective 3 – Ways to Conclude
the Malicious Type Email
Content Test for Phishing Email,
Viruses and Spam:
Testing Malicious Email
Attack or Social Engering
Attack:
• After press 1 and hit
enter the below
screen will appear
and use 5th option
and then hit enter
again to use Mass
Mailer Attack tool
to attack any victim
machine.
Objective 3 – Ways to Conclude
the Malicious Type Email
Content Test for Phishing Email,
Viruses and Spam:
Testing Malicious Email
Attack or Social Engering
Attack:
• After moving into Mass
mailer option it will ask
what do you want to do
“you can select any
according to the attack
vector” I choose email
attack single email
address because it is just
a testing phase so I use
this one.
Objective 3 – Ways to Conclude
the Malicious Type Email
Content Test for Phishing Email,
Viruses and Spam:
Testing Malicious Email
Attack or Social Engering
Attack:
• I choose Gmail account as a
test attack in real attacking
we can choose our own server
or we can use smtp2go.com
to make an account and use
different domains to attack
victim and gain access
through malicious link.
• We use the victim email as a
test attack I have used
tempry1234786@gmail.com
or I have another email
account that is
dudexsam3@gmail.com I can
use this on smtp2go.com as
well to evaluate the spam
email.
Objective 3 – Ways to Conclude
the Malicious Type Email
Content Test for Phishing Email,
Viruses and Spam:
Testing Malicious Email
Attack or Social Engering
Attack:
• As an example we
you can see in
below screen shot
as well using
different domain
Objective 3 – Ways to Conclude
the Malicious Type Email
Content Test for Phishing Email,
Viruses and Spam:
Testing Malicious Email
Attack or Social Engering
Attack:
• In the Gmail you can
see that I have received
that email
• The email comes easily
by bypassing all the
security checks
• These kinds of email
hackers use as a
phishing attempt to
gain access. they use
spam links to redirect
into different websites
and when user enter
any credential they gain
access to it.
Objective 4: Creation of
Testing Environments LAB to
Evaluate Different tools:
SPAM Bully Tool:
• Spam Bully is one of the
best email straining tools
as it offers a wide variety of
filters and works with
detached servers as well as
IMAP and POP3
headwaiters.
• Spam bully uses the latest
technology to learn from
spammers' messages and
continuously adjust spam
filters to protect your
mailboxes. By using
proactive rather than
reactive methods to
eliminate spam, more than
99% of spam can be
blocked in most cases.
Installation of SPAM Bully Tool
Objective 4: Creation of
Testing Environments LAB to
Evaluate Different tools:
SPAM Bully Tool:
• After installation the
SPAM Bully software in
machine. It can filter
spam email and save
users to prevent clicking
on spam links.
• Once it is installed we
have to add the email
address. And sync all
the email in Spam Bully
tool to filter the spam
items.
Adding the Email Address
Objective 4: Creation of
Testing Environments LAB to
Evaluate Different tools:
SPAM Bully Tool:
• After installing the
software the tool will
open and we need to
add account. We can
see in below image
lots of folder and
scanning items are
there . Once the
account is added we
can use these tool to
scan spam folders
and spam linked
email such as
phishing attempt
Adding the Account
Objective 5: Best Approach to Protect Ourselves from Spam &
Phishing Attacks
The high-quality technique to shielding oneself from junk mail and phishing
assaults (Zhao, An and Kiekintveld, 2016)
Five easy strategies you can combat direct mail and defend yourself
1. never supply out or submit your electronic mail cope with pay. ...
2. think earl hand you click. ...
3. Do no longer reply to spam messages? ...
4. download direct mail filtering tools and anti-virus software program
application. ...
5. keep away from the use of your private or company e-mail cope with.
Investigation Report
Domain analysis:
Area evaluation is the system of identifying, shooting domain
understanding about the trouble
area with the cause of making it reusable when creating new structures
Example
One of the essential sports of area analysis is the identity of summary
actual-global lessons and
a gadget that is not unusual to related packages within a specific trouble
domain. Examples of
such trouble domains encompass air site visitor’s management, avionics,
banking programs, and
satellite tv for pc tracking systems.
Introduction
Cybercriminals have used the illegitimate use of digital
assets—mainly private records—for bringing harm to people,
and the virtual world is quickly expanding and growing.
Identity theft, which is defined as using someone else's
identity to steal and use their personal information (such as
bank account information, social security numbers, or credit
card numbers, etc.) for the attacker's own gain, is one of the
most dangerous crimes that affect all internet users. Identity
theft includes not only stealing money but also committing
other crimes.
Problem Defination
When new phishing strategies are launched, phishing detection solutions
do agonize beginning low detection accuracy and high false alarm rates.
In addition to being the most popular approach, the blacklist-based
approach is ineffective at stopping phishing assaults now that it's easier to
register new domains, and no comprehensive blacklist can guarantee a
perfect up-to-date database. In addition, several solutions have made use
of page content inspection to address the false negative issues and
strengthen the weaknesses of the stale lists. Additionally, many page
content inspection algorithms each employ a distinct strategy, with
variable degrees of success, to reliably identify phishing websites.
Ensemble can be thought of as a better alternative because it can combine
the similarity in accuracy and varied error-detection rate attributes in
selected methods.
Methodology
Methodology refers back to the
overarching strategy and motive
of your study's mission. It
includes reading the methods
used in your subject and the
theories or ideas in the back
them, in an effort to broaden an
approach that matches your
goals. He asserts that systematic
literature, which adheres to
inclusion and exclusion criteria,
is used for analyses, studies,
observations, and research on a
particular domain and is more
exhaustive and has great detail
on a particular topic, whereas
comfortable nonfiction review is
fewer exhaustive. The three
stages of SLR—planning,
conducting, and reporting the
review—were the main focus of
the paper.
Legal, ethical, social, and professional issues
review
Critical issues of phishing:
Malicious links will result in an internet site that regularly takes login
passports or economic statistics like credit score card numbers.
Attachments from phishing emails can include malware that when
released can leave the door open for the attacker to carry out wicked
conduct from the consumer's pc.
Legal, and ethical issues:
Ethical problems aren't dominated by the resource of tough and rapid of
guidelines and thereby are not punishable with the resource of regulation.
crook troubles have a fixed of suggestions on which they may be based
and are punishable by laws one regulation isn’t adhered to.
Risks re-consideration
The four chance management troubles we're going to study in this text
are:
1) Financial risk.
2) Physical protection risk.
3) Technical danger.
4) Contractual danger.
Plan
A plan is a software or approach organized beforehand of time, an assignment or precise
motive, or a format or drawing of something. The plan has something her senses as a noun
and a verb.
Design/strategies
Additives of the layout approach
The design approach in a generation
• Image designer: photograph designers create and put in force visible ideas thru
computer software program programs. They generate artistic thoughts that captivate and
attraction to a target audience - regularly to sell a product or service.
• Art Director: artwork directors are answerable for the seen layout and style of print
guides, merchandise, and media productions. They often come up with the general
layout idea, directing others who produce the actual artwork and visible factors.
• Multimedia Artists and Animators: Multimedia designers and animators create
moving pics for seen media. those can consist of video games movies, and tv.Net
Developers: net developers create and layout websites. they're no longer simplest
answerable for the way it seems – but, the way it plays, enforcing gadget format
methodologies that optimize its tempo and traffic capability.
Conclusion
Phishing assaults stay some of the predominant dangers to entities and corporations to
this point. As underlined within the paper, this is especially pushed by means of
human participation in the phishing sequence. frequently attackers make the most
human weaknesses similarly to supporting technological situations. it has been
recognized that oldness, gender, net dependency, consumer stress, and plenty of
different characteristics disturb the vulnerability to phishing between persons. further
to standard phishing stations (e.g., web and email), fresh varieties of phishing
channels which include speech and SMS phishing are on the growth. additionally,
using social media primarily based on phishing has elevated in use in parallel with the
boom of social media. Concomitantly, phishing has developed from acquiring sensitive
statistics and monetary crimes to cyber terrorism, hacktivism, unfavorable
reputations, espionage, and countryside assaults. research has been performed to
discover the motivations and techniques and countermeasures to those new crimes,
but, there is no available solution for the phishing problem due to the heterogeneous
nature of the assault vector. this article has investigated troubles presented through
phishing and proposed brand new anatomy, which describes the whole life cycle of
phishing attacks. This anatomy gives a wider outlook for phishing assaults and offers
an accurate definition overlaying cease-to-end exclusion and awareness of the assault.
Presentation on Email phishing.pptx

Más contenido relacionado

Similar a Presentation on Email phishing.pptx

Stay Out of Spam Folder
Stay Out of Spam FolderStay Out of Spam Folder
Stay Out of Spam FolderMyStockAlarm
 
Cyber security and emails presentation refined
Cyber security and emails presentation refinedCyber security and emails presentation refined
Cyber security and emails presentation refinedWan Solo
 
Enhancing Email Security: A Comprehensive Examination of Email Verification...
Enhancing Email Security: A  Comprehensive Examination of Email  Verification...Enhancing Email Security: A  Comprehensive Examination of Email  Verification...
Enhancing Email Security: A Comprehensive Examination of Email Verification...madhumadhu542020
 
Seminar on web mail filter
Seminar   on   web mail filterSeminar   on   web mail filter
Seminar on web mail filterShalini Gs
 
A LITERATURE REVIEW ON PHISHING EMAIL DETECTION USING DATA MINING
A LITERATURE REVIEW ON PHISHING EMAIL DETECTION USING DATA MININGA LITERATURE REVIEW ON PHISHING EMAIL DETECTION USING DATA MINING
A LITERATURE REVIEW ON PHISHING EMAIL DETECTION USING DATA MININGHeather Strinden
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptxTanvir Amin
 
Final paper
Final paperFinal paper
Final paperJDonpfd3
 
Survey on spam filtering
Survey on spam filteringSurvey on spam filtering
Survey on spam filteringChippy Thomas
 
How Cybercriminals Cheat Email Authentication
How Cybercriminals Cheat Email AuthenticationHow Cybercriminals Cheat Email Authentication
How Cybercriminals Cheat Email AuthenticationReturn Path
 
Why Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdfWhy Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdfHost It Smart
 
Cybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxCybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxAbdullaFatiya3
 
Spam filtering.pptx
Spam filtering.pptxSpam filtering.pptx
Spam filtering.pptxAkfeteAssefa
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingSachin Saini
 
Email Delivery Optimization Techniques from Email Marketing Solutions Provide...
Email Delivery Optimization Techniques from Email Marketing Solutions Provide...Email Delivery Optimization Techniques from Email Marketing Solutions Provide...
Email Delivery Optimization Techniques from Email Marketing Solutions Provide...Manjunatha Kg
 
Spam & Phishing
Spam & PhishingSpam & Phishing
Spam & PhishingGrittyCC
 
Cyber security and emails presentation
Cyber security and emails presentationCyber security and emails presentation
Cyber security and emails presentationWan Solo
 
Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017Alexandru Turcu
 

Similar a Presentation on Email phishing.pptx (20)

Stay Out of Spam Folder
Stay Out of Spam FolderStay Out of Spam Folder
Stay Out of Spam Folder
 
Cyber security and emails presentation refined
Cyber security and emails presentation refinedCyber security and emails presentation refined
Cyber security and emails presentation refined
 
Enhancing Email Security: A Comprehensive Examination of Email Verification...
Enhancing Email Security: A  Comprehensive Examination of Email  Verification...Enhancing Email Security: A  Comprehensive Examination of Email  Verification...
Enhancing Email Security: A Comprehensive Examination of Email Verification...
 
How I Will Phish You
How I Will Phish You How I Will Phish You
How I Will Phish You
 
internet security
internet securityinternet security
internet security
 
Seminar on web mail filter
Seminar   on   web mail filterSeminar   on   web mail filter
Seminar on web mail filter
 
A LITERATURE REVIEW ON PHISHING EMAIL DETECTION USING DATA MINING
A LITERATURE REVIEW ON PHISHING EMAIL DETECTION USING DATA MININGA LITERATURE REVIEW ON PHISHING EMAIL DETECTION USING DATA MINING
A LITERATURE REVIEW ON PHISHING EMAIL DETECTION USING DATA MINING
 
IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
Final paper
Final paperFinal paper
Final paper
 
Survey on spam filtering
Survey on spam filteringSurvey on spam filtering
Survey on spam filtering
 
How Cybercriminals Cheat Email Authentication
How Cybercriminals Cheat Email AuthenticationHow Cybercriminals Cheat Email Authentication
How Cybercriminals Cheat Email Authentication
 
Why Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdfWhy Are My Emails Going To Spam.pdf
Why Are My Emails Going To Spam.pdf
 
Cybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxCybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptx
 
Spam filtering.pptx
Spam filtering.pptxSpam filtering.pptx
Spam filtering.pptx
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Email Delivery Optimization Techniques from Email Marketing Solutions Provide...
Email Delivery Optimization Techniques from Email Marketing Solutions Provide...Email Delivery Optimization Techniques from Email Marketing Solutions Provide...
Email Delivery Optimization Techniques from Email Marketing Solutions Provide...
 
Spam & Phishing
Spam & PhishingSpam & Phishing
Spam & Phishing
 
Email Deliverability Guide For 2013
Email Deliverability Guide For 2013Email Deliverability Guide For 2013
Email Deliverability Guide For 2013
 
Cyber security and emails presentation
Cyber security and emails presentationCyber security and emails presentation
Cyber security and emails presentation
 
Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017
 

Último

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 

Último (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 

Presentation on Email phishing.pptx

  • 1. Evaluation of SPAM and Phishing Detection and Mitigation
  • 2. Introduction Phishing may be a form of public manufacturing assault it absolutely is regularly won’t to the more character information, counting login identifications than MasterCard figures. It happens whilst an enemy, posing as an established unit, recommends a victim hooked on preliminary an email instant communication, or reproduction message. The receiver remains previously trapped hooked on ticking a malevolent connection, which might reason the setup of malware, a machine freezes in a very ransomware assault or the disclosure of sensitive records.
  • 3. Methodological Examples of phishing assaults The following illustrates a famous phishing scam try: • A fake e-mail purporting to be after myuniversity.edu is determined to spread via way of numerous potential individuals as feasible. • The e-mail dues that the person's PIN will end speedily. instructions are furnished at myuniversity.edu/renewal; wherein you will renew your password within 24 hours. (Gilad, Herzberg and Shulman, 2014) • some subjects can appear once you click on a hyperlink. intended for sample: • The person is redirected to my university edurenewal.com, a fake web sheet that appears exactly similar to the actual regeneration web page, in which each new and modern PIN is ked. A mugger nursing the net sheet steals the number one password to achieve access to comfortable areas in the college community. (Gilad, Herzberg and Shulman, 2014) • The consumer is redirected to the triumphing password reset web page. however, throughout the redirect, a malicious script is activated within the context to take over the purchaser's cookie. The result's a bounced XSS attack that gives the wrongdoer privileged get entry to a school network Phishing strategies.
  • 4. What's a phishing email? A phishing email is a cybercrime that is based on deception to steal confidential information from customers and businesses. Phishing preys are fooled into revealing statistics they recognize need to be kept secret. because of the reality they reliance the supply of the request for records and agree that the birthday party is performing with first-rate intentions, patients of phishing emails usually rejoin without pondering.
  • 5. Objective 1 – Comparison of Email Filtering Tools Mail Cleaner Spam Titan Functions: 1. It automatically filters all the legitimate emails. 2. It combines artificial intelligence algorithms and continuously identifies the converting techniques of the spammers. 3. It has a clean purchaser interface which could assist to manipulate the emails well. Functions: • It shelters the commerce from unsolicited mail emails and actual emails’. • It identifies an as in reality desired to comprise viruses to ship malware than record then gadget and • It scans all of the outbound emails coming to the shared
  • 6. Objective 1 – Comparison of Email Filtering Tools E-mail safety Cloud Direct mail Bully Functions: • It routinely filters email threats like malware, viruses, and different on line threats that try and enter the machine. • unwanted emails are dispatched to quarantine, where it is able to be looked after to repair or put off them. • It runs in the background and doesn’t pop up constantly while the hazard is detected and additionally permits unions the unions. Functions:  It blocks and deletes unwanted emails from the blacklisted email addresses and additionally assessments the attachments for the threat  It has a Bayesian filter out that blocks non-public customized mail emails.  It can block emails based on the sender on IP address and the originating u. sorter intruder that there aren't any such emails within the inbox in the destiny.
  • 7. Objective 2: Research on Projects Phishing and Spam in Email services Necessities Description • Essential computer abilities to understand fundamental phrases and use e-mail for paintings and/or home purposes. • Familiarity along with your electronic mail provider or patron to check e-mail and change fundamental settings. • E-mail remains an extremely vital non-public and enterprise communique tool. With an account that touches such a number of specific on-line money owed, e-mails are crucial to guard. • Do you discover yourself constantly deleting junk mail messages and disturbing whether or not that e-mail bank is in reality true? if so, then throw to is combat solicited mail and Phishing Emails pa combat to defend your e- mail and identity. • you may be able to spot and how it ties in with your common non-public cybersecurity strategy. you will be capable of becoming come aware of fraudulent emails earlier than they're capable of doing damage via way of being able to
  • 8. Objective 3 – Ways to Conclude the Malicious Type Email Content Test for Phishing Email, Viruses and Spam: Check your unsolicited mail clear out • The first step you ought to take is to test your email issuer’s settings. on the identical time as maximum do extraordinary activity at blocking off junk mail and phis and he tries, there can also however be some that slip through the filters. • In case you observe any phishing emails on your inbox, record them immediately. that is taken into consideration a phishing prevention best prices tice. not high-quality does the record choice assist your organization capture comparable emails inside the destiny, but it blocks them as properly. This have to prevent seeing from has tried again.
  • 9. Objective 3 – Ways to Conclude the Malicious Type Email Content Test for Phishing Email, Viruses and Spam: Set up rules on your spam clear out  Have you stated a phishing e-mail to appear every to manually appear when you could need to put in small in your junk mail clean out?  Depending to your submission, you may set unreel submissions coming emails may be automatically marked as junk and positioned within in ash. Out of sight, out of mind.
  • 10. Objective 3 – Ways to Conclude the Malicious Type Email Content Test for Phishing Email, Viruses and Spam: Installation of anti-phishing software program: • Anti-phishing software program is an outstanding manner to get greater protection. another time, essential e mail carriers have decent direct mail filtering, abilities, it’s now not sufficient. • In case you find out your inbox is continuously filling up with phishing emails, this phishing safety software program can help. With organization-leveled mail filtering, this system has extra effective and a long way-carrying out abilities than your email issuer does. • off safety • 23% of folks that acquire phishing emails open them, and eleven% of them open attachments. this means a fourth of your team of workers places your whole business enterprise at hazard. • In case you offer ordinary safety training, you can decrease this wide variety. By teaching your employees to obey and apprehend g phishing emails, they might avoid breaches in your protection from all kinds of phishing assaults. moreover, they could shield other people by using manner of alerting the security officer every time they get hold of a phishing electronic mail.
  • 11. Objective 3 – Ways to Conclude the Malicious Type Email Content Test for Phishing Email, Viruses and Spam: Positioned a present to phishing attempts: • The greater phishing emails get via, the much more likely it's miles for cyber criminals successful. by using implementing these ways in a manner to prevent phishing emails, the likelihood of your touchy statistics getting out decreases. • through the strength of unsolicited mail filtering and protection training, you’ll preserve scams out of your employer and be relaxed together with your ‘rework.
  • 12. Objective 3 – Ways to Conclude the Malicious Type Email Content Test for Phishing Email, Viruses and Spam: Testing Malicious Email Attack or Social Engering Attack: • Install a Kali Linux Machine in virtual box. • Open the Terminal in Kali machine and type “ setoolkit” to use this tool to attack to victim machine with any malicious link.
  • 13. Objective 3 – Ways to Conclude the Malicious Type Email Content Test for Phishing Email, Viruses and Spam: Testing Malicious Email Attack or Social Engering Attack: • Then press “1”and hit enter to enter into Social Engineering attack
  • 14. Objective 3 – Ways to Conclude the Malicious Type Email Content Test for Phishing Email, Viruses and Spam: Testing Malicious Email Attack or Social Engering Attack: • After press 1 and hit enter the below screen will appear and use 5th option and then hit enter again to use Mass Mailer Attack tool to attack any victim machine.
  • 15. Objective 3 – Ways to Conclude the Malicious Type Email Content Test for Phishing Email, Viruses and Spam: Testing Malicious Email Attack or Social Engering Attack: • After moving into Mass mailer option it will ask what do you want to do “you can select any according to the attack vector” I choose email attack single email address because it is just a testing phase so I use this one.
  • 16. Objective 3 – Ways to Conclude the Malicious Type Email Content Test for Phishing Email, Viruses and Spam: Testing Malicious Email Attack or Social Engering Attack: • I choose Gmail account as a test attack in real attacking we can choose our own server or we can use smtp2go.com to make an account and use different domains to attack victim and gain access through malicious link. • We use the victim email as a test attack I have used tempry1234786@gmail.com or I have another email account that is dudexsam3@gmail.com I can use this on smtp2go.com as well to evaluate the spam email.
  • 17. Objective 3 – Ways to Conclude the Malicious Type Email Content Test for Phishing Email, Viruses and Spam: Testing Malicious Email Attack or Social Engering Attack: • As an example we you can see in below screen shot as well using different domain
  • 18. Objective 3 – Ways to Conclude the Malicious Type Email Content Test for Phishing Email, Viruses and Spam: Testing Malicious Email Attack or Social Engering Attack: • In the Gmail you can see that I have received that email • The email comes easily by bypassing all the security checks • These kinds of email hackers use as a phishing attempt to gain access. they use spam links to redirect into different websites and when user enter any credential they gain access to it.
  • 19. Objective 4: Creation of Testing Environments LAB to Evaluate Different tools: SPAM Bully Tool: • Spam Bully is one of the best email straining tools as it offers a wide variety of filters and works with detached servers as well as IMAP and POP3 headwaiters. • Spam bully uses the latest technology to learn from spammers' messages and continuously adjust spam filters to protect your mailboxes. By using proactive rather than reactive methods to eliminate spam, more than 99% of spam can be blocked in most cases. Installation of SPAM Bully Tool
  • 20. Objective 4: Creation of Testing Environments LAB to Evaluate Different tools: SPAM Bully Tool: • After installation the SPAM Bully software in machine. It can filter spam email and save users to prevent clicking on spam links. • Once it is installed we have to add the email address. And sync all the email in Spam Bully tool to filter the spam items. Adding the Email Address
  • 21. Objective 4: Creation of Testing Environments LAB to Evaluate Different tools: SPAM Bully Tool: • After installing the software the tool will open and we need to add account. We can see in below image lots of folder and scanning items are there . Once the account is added we can use these tool to scan spam folders and spam linked email such as phishing attempt Adding the Account
  • 22. Objective 5: Best Approach to Protect Ourselves from Spam & Phishing Attacks The high-quality technique to shielding oneself from junk mail and phishing assaults (Zhao, An and Kiekintveld, 2016) Five easy strategies you can combat direct mail and defend yourself 1. never supply out or submit your electronic mail cope with pay. ... 2. think earl hand you click. ... 3. Do no longer reply to spam messages? ... 4. download direct mail filtering tools and anti-virus software program application. ... 5. keep away from the use of your private or company e-mail cope with.
  • 23. Investigation Report Domain analysis: Area evaluation is the system of identifying, shooting domain understanding about the trouble area with the cause of making it reusable when creating new structures Example One of the essential sports of area analysis is the identity of summary actual-global lessons and a gadget that is not unusual to related packages within a specific trouble domain. Examples of such trouble domains encompass air site visitor’s management, avionics, banking programs, and satellite tv for pc tracking systems.
  • 24. Introduction Cybercriminals have used the illegitimate use of digital assets—mainly private records—for bringing harm to people, and the virtual world is quickly expanding and growing. Identity theft, which is defined as using someone else's identity to steal and use their personal information (such as bank account information, social security numbers, or credit card numbers, etc.) for the attacker's own gain, is one of the most dangerous crimes that affect all internet users. Identity theft includes not only stealing money but also committing other crimes.
  • 25. Problem Defination When new phishing strategies are launched, phishing detection solutions do agonize beginning low detection accuracy and high false alarm rates. In addition to being the most popular approach, the blacklist-based approach is ineffective at stopping phishing assaults now that it's easier to register new domains, and no comprehensive blacklist can guarantee a perfect up-to-date database. In addition, several solutions have made use of page content inspection to address the false negative issues and strengthen the weaknesses of the stale lists. Additionally, many page content inspection algorithms each employ a distinct strategy, with variable degrees of success, to reliably identify phishing websites. Ensemble can be thought of as a better alternative because it can combine the similarity in accuracy and varied error-detection rate attributes in selected methods.
  • 26. Methodology Methodology refers back to the overarching strategy and motive of your study's mission. It includes reading the methods used in your subject and the theories or ideas in the back them, in an effort to broaden an approach that matches your goals. He asserts that systematic literature, which adheres to inclusion and exclusion criteria, is used for analyses, studies, observations, and research on a particular domain and is more exhaustive and has great detail on a particular topic, whereas comfortable nonfiction review is fewer exhaustive. The three stages of SLR—planning, conducting, and reporting the review—were the main focus of the paper.
  • 27. Legal, ethical, social, and professional issues review Critical issues of phishing: Malicious links will result in an internet site that regularly takes login passports or economic statistics like credit score card numbers. Attachments from phishing emails can include malware that when released can leave the door open for the attacker to carry out wicked conduct from the consumer's pc. Legal, and ethical issues: Ethical problems aren't dominated by the resource of tough and rapid of guidelines and thereby are not punishable with the resource of regulation. crook troubles have a fixed of suggestions on which they may be based and are punishable by laws one regulation isn’t adhered to.
  • 28. Risks re-consideration The four chance management troubles we're going to study in this text are: 1) Financial risk. 2) Physical protection risk. 3) Technical danger. 4) Contractual danger.
  • 29. Plan A plan is a software or approach organized beforehand of time, an assignment or precise motive, or a format or drawing of something. The plan has something her senses as a noun and a verb. Design/strategies Additives of the layout approach The design approach in a generation • Image designer: photograph designers create and put in force visible ideas thru computer software program programs. They generate artistic thoughts that captivate and attraction to a target audience - regularly to sell a product or service. • Art Director: artwork directors are answerable for the seen layout and style of print guides, merchandise, and media productions. They often come up with the general layout idea, directing others who produce the actual artwork and visible factors. • Multimedia Artists and Animators: Multimedia designers and animators create moving pics for seen media. those can consist of video games movies, and tv.Net Developers: net developers create and layout websites. they're no longer simplest answerable for the way it seems – but, the way it plays, enforcing gadget format methodologies that optimize its tempo and traffic capability.
  • 30. Conclusion Phishing assaults stay some of the predominant dangers to entities and corporations to this point. As underlined within the paper, this is especially pushed by means of human participation in the phishing sequence. frequently attackers make the most human weaknesses similarly to supporting technological situations. it has been recognized that oldness, gender, net dependency, consumer stress, and plenty of different characteristics disturb the vulnerability to phishing between persons. further to standard phishing stations (e.g., web and email), fresh varieties of phishing channels which include speech and SMS phishing are on the growth. additionally, using social media primarily based on phishing has elevated in use in parallel with the boom of social media. Concomitantly, phishing has developed from acquiring sensitive statistics and monetary crimes to cyber terrorism, hacktivism, unfavorable reputations, espionage, and countryside assaults. research has been performed to discover the motivations and techniques and countermeasures to those new crimes, but, there is no available solution for the phishing problem due to the heterogeneous nature of the assault vector. this article has investigated troubles presented through phishing and proposed brand new anatomy, which describes the whole life cycle of phishing attacks. This anatomy gives a wider outlook for phishing assaults and offers an accurate definition overlaying cease-to-end exclusion and awareness of the assault.