SlideShare una empresa de Scribd logo
1 de 20
01
Seminar
M.B.E.SOCIETY’S COLLEGE OF ENGINEERING
AMBAJOGAI
Department of Computer Science and Engineering
PHISHING ATTACK
Seminar On
By :
ANIKET PANDIT
Guidance by :
PROF. PRITI PANCHAL
03
Contents
• Introduction
• What is phishing attack
• Typical Scenario of phishing
• History of phishing attack
• Types of phishing attack & it's example
• Phishing statistics in india
• Prevention from phishing attack
• Anti-phishing software
• Punishment & Cyber law
• Conclusion
• Reference
04
Introduction
Phishing is a type of social engineering attack
often used to steal user data, including login
credentials and credit card numbers.
05
What is
Phishing?
The term Phishing can be
defined as an act of attempting
to acquire sensitive information
by pretending to be a
trustworthy entity.
Typical Scenario of Phishing Attacks
06
07
The first phishing attempt is
recorded on America online (AOL).
Hacker attempt to steal login
credentials & personal information
from AOL to resell online.
1990
Th riseof E-commerce encourages
cyber criminals to create spoofed
websites, impersonating popular
domain like ebay & PayPal.
Bitcoin & crypto currency are
launched this increases the creation
of malware as it is easier for cyber
criminals to securely receive
payment from their victims
History of Phishing Attack
2000
2008
2013
2019
Cyber criminals begin
hiding malicious code
inside image files to slip
through user's anti-virus
software
Phishing becomes the
primary technique to
deliver ransomware
08
Types of Phishing Attacks
EMAIL PHISHING
SPEAR PHISHING VOICE PHISHING
CLONE PHISHING
09
Email Phishing &
it's Example
The most widely known form of
phishing, this attack is an attempt
to steal sensitive information via an
email that appears to be from a
legitimate organization.
10
Spear Phishing &
it's Example
These email messages are sent to
specific people within an
organization, usually high-privilege
11
Clone Phishing &
it's Example
In this type of phishing, the attacker
clones a genuine or legitimate email
that you might have received from an
authentic sender but sent from a
spoofed email id
12
Voice Phishing &
it's Example
Vishing—or voice phishing—is the
use of fraudulent phone calls to trick
people into giving money or
revealing personal information.
0 20,000 40,000 60,000
2012
2013
2014
2015
2016
2017
2018
2019
2020
Number of cyber crimes
reported across India
PHISHING ATTACK STATISTICS IN INDIA
13
Around 83% of IT teams in
Indian organizations said the
number of phishing emails
targeting their employees
increased during 2020
83%
Most targeted industry in India,
first quarter of 2021
PHISHING ATTACK STATISTICS IN INDIA
Financial Institution
24.7%
Socila Media
23.7%
SaaS
19.7%
Payment
8.5%
Othe
r
8%
E-commerce
7.6%
Logistics and shipping
5.8%
14
During the first quarter of 2021,
24.9% of phishing attacks
worldwide were directed towards
financial institution
On top of that, social media
accounted for 23.6 percent of
attacks making these two the
highest targeted industries when it
came to phishing during this
period.
• Know what a phishing scam look like
• Don't click on that link
• Don't give your information to
unsecured site
• 
Rotate your password regularly
• 
Install Firewalls
• 
Install Anti-phishing software
PREVENTIONS FROM PHISHING
ATTACK
15
ANTI-PHISHING SOFTWARE
Area 1 Horizon
GreatHorn
IronScale
Cloud based service that offer protection from
phishing on Email & network based vectors
This cloud- native email security service protect from
phishing attack on office 365, email carrying
ransomware
This is a self learning email security platform powered
by AI. It can help you to detect & predict phishing
attacks. 16
Hacking into a computer network, data theft,
introducing and spreading viruses through computer
networks, This is a punishable offence under Section
43 of the Information Technology Act, 2000 with the
maximum punishment for the above offences is
imprisonment of up to 3 years or a fine or Rs.
5,00,000 (Rupees five lac) or both.
PUNISHMENT AND CYBER LAW
17
No single technology will completely stop Phishing
Attacks.
CONCLUSION
However a combination of good organization and
practice, proper application of current
technologies and improvement in security
technology has the potential to drastically reduce
the prevalence of phishing and the losses suffered
from it.
18
www.phishing.org
REFERENCE
Phishing Exposed

Social engineering
Phishing Attacks (IEEE subject)
Books
Websites
19
20
Thank You

Más contenido relacionado

La actualidad más candente

PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
vineetkathan
 

La actualidad más candente (20)

Phishing
PhishingPhishing
Phishing
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Phising a Threat to Network Security
Phising a Threat to Network SecurityPhising a Threat to Network Security
Phising a Threat to Network Security
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You Safe
 
Phishing and hacking
Phishing and hackingPhishing and hacking
Phishing and hacking
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
 
Phishing
PhishingPhishing
Phishing
 
Phishing attack
Phishing attackPhishing attack
Phishing attack
 
Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniques
 
PPT on Phishing
PPT on PhishingPPT on Phishing
PPT on Phishing
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Email phising and spoofing hurting your business
Email phising and spoofing hurting your businessEmail phising and spoofing hurting your business
Email phising and spoofing hurting your business
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
 
Phishing
PhishingPhishing
Phishing
 

Similar a Phishing attack seminar presentation

Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
Mark Albala
 
IRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing SitesIRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing Sites
IRJET Journal
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
wlynn1
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Tech and Law Center
 

Similar a Phishing attack seminar presentation (20)

Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
 
Cybercrime & Cybersecurity
Cybercrime & CybersecurityCybercrime & Cybersecurity
Cybercrime & Cybersecurity
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurity
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
IRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing SitesIRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing Sites
 
Trends in cyber crime
Trends in cyber crimeTrends in cyber crime
Trends in cyber crime
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
 
Digital Fraud Prevention and Detection Techniques in 2024
Digital Fraud Prevention and Detection Techniques in 2024Digital Fraud Prevention and Detection Techniques in 2024
Digital Fraud Prevention and Detection Techniques in 2024
 
Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?Why Should A Business Worry about Cyber Attacks?
Why Should A Business Worry about Cyber Attacks?
 
Cyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfCyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdf
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 
Cybersecurity - Webinar Session
Cybersecurity - Webinar SessionCybersecurity - Webinar Session
Cybersecurity - Webinar Session
 
Cyber-Defenders-2020
Cyber-Defenders-2020Cyber-Defenders-2020
Cyber-Defenders-2020
 
CYBERCRIME VICTIMS
CYBERCRIME VICTIMSCYBERCRIME VICTIMS
CYBERCRIME VICTIMS
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
 
Ict forensics and audit bb
Ict forensics and  audit bbIct forensics and  audit bb
Ict forensics and audit bb
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importance
 
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdf
 
Study on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing ToolsStudy on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing Tools
 

Último

Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
chumtiyababu
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 

Último (20)

Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 

Phishing attack seminar presentation

  • 1. 01 Seminar M.B.E.SOCIETY’S COLLEGE OF ENGINEERING AMBAJOGAI Department of Computer Science and Engineering
  • 2. PHISHING ATTACK Seminar On By : ANIKET PANDIT Guidance by : PROF. PRITI PANCHAL
  • 3. 03 Contents • Introduction • What is phishing attack • Typical Scenario of phishing • History of phishing attack • Types of phishing attack & it's example • Phishing statistics in india • Prevention from phishing attack • Anti-phishing software • Punishment & Cyber law • Conclusion • Reference
  • 4. 04 Introduction Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers.
  • 5. 05 What is Phishing? The term Phishing can be defined as an act of attempting to acquire sensitive information by pretending to be a trustworthy entity.
  • 6. Typical Scenario of Phishing Attacks 06
  • 7. 07 The first phishing attempt is recorded on America online (AOL). Hacker attempt to steal login credentials & personal information from AOL to resell online. 1990 Th riseof E-commerce encourages cyber criminals to create spoofed websites, impersonating popular domain like ebay & PayPal. Bitcoin & crypto currency are launched this increases the creation of malware as it is easier for cyber criminals to securely receive payment from their victims History of Phishing Attack 2000 2008 2013 2019 Cyber criminals begin hiding malicious code inside image files to slip through user's anti-virus software Phishing becomes the primary technique to deliver ransomware
  • 8. 08 Types of Phishing Attacks EMAIL PHISHING SPEAR PHISHING VOICE PHISHING CLONE PHISHING
  • 9. 09 Email Phishing & it's Example The most widely known form of phishing, this attack is an attempt to steal sensitive information via an email that appears to be from a legitimate organization.
  • 10. 10 Spear Phishing & it's Example These email messages are sent to specific people within an organization, usually high-privilege
  • 11. 11 Clone Phishing & it's Example In this type of phishing, the attacker clones a genuine or legitimate email that you might have received from an authentic sender but sent from a spoofed email id
  • 12. 12 Voice Phishing & it's Example Vishing—or voice phishing—is the use of fraudulent phone calls to trick people into giving money or revealing personal information.
  • 13. 0 20,000 40,000 60,000 2012 2013 2014 2015 2016 2017 2018 2019 2020 Number of cyber crimes reported across India PHISHING ATTACK STATISTICS IN INDIA 13 Around 83% of IT teams in Indian organizations said the number of phishing emails targeting their employees increased during 2020 83%
  • 14. Most targeted industry in India, first quarter of 2021 PHISHING ATTACK STATISTICS IN INDIA Financial Institution 24.7% Socila Media 23.7% SaaS 19.7% Payment 8.5% Othe r 8% E-commerce 7.6% Logistics and shipping 5.8% 14 During the first quarter of 2021, 24.9% of phishing attacks worldwide were directed towards financial institution On top of that, social media accounted for 23.6 percent of attacks making these two the highest targeted industries when it came to phishing during this period.
  • 15. • Know what a phishing scam look like • Don't click on that link • Don't give your information to unsecured site •  Rotate your password regularly •  Install Firewalls •  Install Anti-phishing software PREVENTIONS FROM PHISHING ATTACK 15
  • 16. ANTI-PHISHING SOFTWARE Area 1 Horizon GreatHorn IronScale Cloud based service that offer protection from phishing on Email & network based vectors This cloud- native email security service protect from phishing attack on office 365, email carrying ransomware This is a self learning email security platform powered by AI. It can help you to detect & predict phishing attacks. 16
  • 17. Hacking into a computer network, data theft, introducing and spreading viruses through computer networks, This is a punishable offence under Section 43 of the Information Technology Act, 2000 with the maximum punishment for the above offences is imprisonment of up to 3 years or a fine or Rs. 5,00,000 (Rupees five lac) or both. PUNISHMENT AND CYBER LAW 17
  • 18. No single technology will completely stop Phishing Attacks. CONCLUSION However a combination of good organization and practice, proper application of current technologies and improvement in security technology has the potential to drastically reduce the prevalence of phishing and the losses suffered from it. 18