SlideShare una empresa de Scribd logo
1 de 9
Phishing Prepared by T.Netiswaran Team Members: Hazwan Azreen Mohd. Norisham Akhmal Hafiz
What is Phishing??? ,[object Object]
How To Prevent Phishing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
Example Of Phishing using Email
 
Reference ,[object Object],[object Object],[object Object]
Conclusion ,[object Object]
[object Object],[object Object]

Más contenido relacionado

La actualidad más candente

Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingSachin Saini
 
Seminaar Report of Phishing VIII Sem
Seminaar Report of Phishing VIII SemSeminaar Report of Phishing VIII Sem
Seminaar Report of Phishing VIII SemNarendra Singh
 
ICT-phishing
ICT-phishingICT-phishing
ICT-phishingMH BS
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldAvishek Datta
 
The Difference between Pharming and Phishing
The Difference between Pharming and PhishingThe Difference between Pharming and Phishing
The Difference between Pharming and PhishingMason Bird
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)aleeya91
 
1 jun st online pay_pal platform not compromised
1 jun st online pay_pal platform not compromised1 jun st online pay_pal platform not compromised
1 jun st online pay_pal platform not compromisedBridget Kow
 

La actualidad más candente (20)

Phishing in China
Phishing in ChinaPhishing in China
Phishing in China
 
PHISHING attack
PHISHING attack PHISHING attack
PHISHING attack
 
Phishing
PhishingPhishing
Phishing
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Seminaar Report of Phishing VIII Sem
Seminaar Report of Phishing VIII SemSeminaar Report of Phishing VIII Sem
Seminaar Report of Phishing VIII Sem
 
ICT-phishing
ICT-phishingICT-phishing
ICT-phishing
 
Phishing
PhishingPhishing
Phishing
 
Phishing attack till now
Phishing attack till nowPhishing attack till now
Phishing attack till now
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark World
 
The Difference between Pharming and Phishing
The Difference between Pharming and PhishingThe Difference between Pharming and Phishing
The Difference between Pharming and Phishing
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
 
Phishing-Updated
Phishing-UpdatedPhishing-Updated
Phishing-Updated
 
Phishing 1 vp
Phishing 1 vpPhishing 1 vp
Phishing 1 vp
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
1 jun st online pay_pal platform not compromised
1 jun st online pay_pal platform not compromised1 jun st online pay_pal platform not compromised
1 jun st online pay_pal platform not compromised
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
Phishing and hacking
Phishing and hackingPhishing and hacking
Phishing and hacking
 

Destacado

Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
יומן קריאה- רותם
יומן קריאה- רותםיומן קריאה- רותם
יומן קריאה- רותםgalitbarazani
 
Looking For A Rain God
Looking For A Rain GodLooking For A Rain God
Looking For A Rain Godne_tis93
 
Global Phishing Survey: Domain Name Use and Trends in 2007
Global Phishing Survey: Domain Name Use and Trends in 2007Global Phishing Survey: Domain Name Use and Trends in 2007
Global Phishing Survey: Domain Name Use and Trends in 2007webhostingguy
 
לשלוחמצגת מצעד הספרים תשע בבית ספר יזרעאליה
לשלוחמצגת מצעד הספרים תשע בבית ספר יזרעאליהלשלוחמצגת מצעד הספרים תשע בבית ספר יזרעאליה
לשלוחמצגת מצעד הספרים תשע בבית ספר יזרעאליהgalitbarazani
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome EconomyHelge Tennø
 

Destacado (7)

Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
יומן קריאה- רותם
יומן קריאה- רותםיומן קריאה- רותם
יומן קריאה- רותם
 
Looking For A Rain God
Looking For A Rain GodLooking For A Rain God
Looking For A Rain God
 
Global Phishing Survey: Domain Name Use and Trends in 2007
Global Phishing Survey: Domain Name Use and Trends in 2007Global Phishing Survey: Domain Name Use and Trends in 2007
Global Phishing Survey: Domain Name Use and Trends in 2007
 
לשלוחמצגת מצעד הספרים תשע בבית ספר יזרעאליה
לשלוחמצגת מצעד הספרים תשע בבית ספר יזרעאליהלשלוחמצגת מצעד הספרים תשע בבית ספר יזרעאליה
לשלוחמצגת מצעד הספרים תשע בבית ספר יזרעאליה
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome Economy
 

Similar a Phishing

W A2 Group P P
W A2  Group  P PW A2  Group  P P
W A2 Group P Ptawnygsu
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N Gbensonoo
 
phishing attack - man in the middle.pptx
phishing attack - man in the middle.pptxphishing attack - man in the middle.pptx
phishing attack - man in the middle.pptx2021000444deepak
 
Phish Phry- Analysis paper
Phish Phry- Analysis paper Phish Phry- Analysis paper
Phish Phry- Analysis paper Joydeep Banerjee
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docxwlynn1
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology- Mark - Fullbright
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internetmohmd-kutbi
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentationmbachnak
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15Naval OPSEC
 
Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharksNalneesh Gaur
 
Phishing website method
Phishing website methodPhishing website method
Phishing website methodarelyf_7
 
Social Networking Threats
Social Networking ThreatsSocial Networking Threats
Social Networking Threatsejhilbert
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingmentAswani34
 

Similar a Phishing (20)

W A2 Group P P
W A2  Group  P PW A2  Group  P P
W A2 Group P P
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
 
phishing attack - man in the middle.pptx
phishing attack - man in the middle.pptxphishing attack - man in the middle.pptx
phishing attack - man in the middle.pptx
 
Phishing
PhishingPhishing
Phishing
 
Phish Phry- Analysis paper
Phish Phry- Analysis paper Phish Phry- Analysis paper
Phish Phry- Analysis paper
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
 
IB Fraud
IB FraudIB Fraud
IB Fraud
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
Tittl e
Tittl eTittl e
Tittl e
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
 
Phishing.pdf
Phishing.pdfPhishing.pdf
Phishing.pdf
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15
 
Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharks
 
Phishing website method
Phishing website methodPhishing website method
Phishing website method
 
Social Networking Threats
Social Networking ThreatsSocial Networking Threats
Social Networking Threats
 
Computer 4 ict
Computer 4 ictComputer 4 ict
Computer 4 ict
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 

Phishing