SlideShare una empresa de Scribd logo
1 de 21
Descargar para leer sin conexión
HACKING AND PHISHING
Hacking
Hacking is the practice of modifying the features
of a system, in order to accomplish a goal outside of
the creator's original purpose.
The person who is consistently engaging in hacking
activities, and has accepted hacking as a lifestyle and
philosophy of their choice, is called a Hacker.
Computer hacking is the most popular form of hacking
nowadays, especially in the field of computer security, but
hacking exists in many other forms, such as phone hacking,
brain hacking, etc. and it's not limited to either of them.
Phishing
Phishing is the attempt to acquire sensitive information such
as usernames, passwords, and credit card details (and
sometimes, indirectly, money), often for malicious reasons,
by masquerading as a trustworthy entity in an electronic
communication.
The word is a neologism created as a homophone of
fishing due to the similarity of using a bait in an attempt
to catch a victim.
Phishing is a continual threat, and the risk is even
larger in social media such as Facebook, Twitter, and
Google+.
Hacking-A brief study
1971
Cap ‘n Crunch phone
exploit discovered
1988
Morris Internet worm
crashes 6000 servers
1994
$10 million transferred
from CitiBank acounts
1995
Kevin Mitnick sentenced
to 5 years in jail
1996
Unix hacked together
2000
Major websites succumb
to DDoS
2000
15,700 credit and debit
cards stolen from Western
Union (hacked while
database was undergoing
maintanence)
2001
*CodeRed exploited bug in
MS IIS to penetrate and
spread probes
*2nd wave infected 360000
servers in 14 hours
*CodeRed 2 had backdoor
installed to allow remote
control
do they hack
 Deface sites for fun
 Add spammy links to bad web neighbourhood
 Hijack site to add spam,porn,gambling,pay-day
loans content
 Steal sensitive information to sell
 Distribute malware to personal computers
 Use server resources for distributed attacks
TYPES
ADVANTAGES
• Prevents website defacements
• An evolving technique,advancing day by day
• Helps in finding and removing loopholes in cyber
security
• Can be used to recover lost information where
the computer password has been lost
• Teaches that no technology is 100% secure
• To test how good security is on your own network.
DISADVANTAGES
• All depends upon the trustworthiness of the
hacker
• Hiring professionals is expensive
• Criminals can use it to their advantage
• It can harm someone’s privacy
• Its illegal
• Destroy all personal files
INFAMOUS HACKERS
ALBERT GONZALEZ
GARY MCKINNON
JONATHAN JAMES KEVIN MITNICK
KEVIN POULSON
HOW TO PREVENT
• Perform required software updates for your
operating system and web browser. Hackers
attack where they see weakness....
• Install a firewall on your computer. ...
• Change your passwords often. ...
• Purchase or download anti-virus software…
• Install anti-spyware/adware programs onto
your system....
• Delete emails from unknown sources.
PHISHING-A
BRIEF STUDY
HISTORY
Phreaking+ Fishing=Phishing
 Phreaking – making phone calls for free back in 70s
 Fishing – use bait to lure the target
1995
Target: AOL users
Purpose: getting account passwords for free time
Technique:similar names,social engineering
2001
Target :Ebayers and major bank
Purpose : getting credit card numbers,accounts
Techniques : same as in 1995,keylogger
2007
Target:Paypal,banks,ebay
Purpose:bank account
Techniques:browser vulnerabilities,link obfuscation
HOW
• Conducted by email
• Receive an authentic-looking email message that
appears to come from a legitimate business
• Ask you to divulge or verify personal data such as an
account number,password,credit card or social
security number
• Possible for you to be phished by mail,telephone,or
even in person
• Through the use of Instant Messaging (IM),which can
also be used for identity theft as well as spreading
viruses and spyware
TYPES
PROBLEMS
• Fraudulently acquire sensitive information using social
engineering and technical subterfuge
• Tries to trick users with official-looking messages
 Credit card
 Bank account
 Ebay
 Paypal
• Some phishing mails also contain malicious software
that track your activities or slow your computer
HOW TO PREVENT
• Never entertain unsolicited emails,calls or SMS
• Your bank will never ask you for confidential
information via emails,calls or texts.If you receive
any such communication,report it to your bank
• Avoid accessing websites via links in email
messages;especially those asking for personal
information.It is always safe to type the URL
manually
• Do not fill any kind of form that comes along with an
email
BEWARE!!!
Presented by
Santhuana.S.G

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Intro phishing
Intro phishingIntro phishing
Intro phishing
 
Phishing
PhishingPhishing
Phishing
 
Phishing exposed
Phishing exposedPhishing exposed
Phishing exposed
 
Phishing scams in banking ppt
Phishing scams in banking pptPhishing scams in banking ppt
Phishing scams in banking ppt
 
Phishing
PhishingPhishing
Phishing
 
PPT on Phishing
PPT on PhishingPPT on Phishing
PPT on Phishing
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
A presentation on Phishing
A presentation on PhishingA presentation on Phishing
A presentation on Phishing
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Prevention
 
Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharks
 
ICT-phishing
ICT-phishingICT-phishing
ICT-phishing
 
Phishing
PhishingPhishing
Phishing
 
Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniques
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
Phishing-Updated
Phishing-UpdatedPhishing-Updated
Phishing-Updated
 
Phishing
PhishingPhishing
Phishing
 

Similar a HACKING AND PHISHING

Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Shawon Raffi
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureLourdes Paloma Gimenez
 
Crontab Cyber Security session 4
Crontab Cyber Security session 4Crontab Cyber Security session 4
Crontab Cyber Security session 4gpioa
 
CYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptxCYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptxMayurSapkale7
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBCapyn
 
Cyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptxCyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptxSahilMishra81
 
Cyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptxCyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptxSahilMishra81
 
Cybercrimes
CybercrimesCybercrimes
CybercrimesFit Tri
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxStephen Jesukanth Martin
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraudRadiant Minds
 
Cyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxCyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxRavinderSingh172970
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...Ankita Shirke
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubairMuhammad Zubair
 

Similar a HACKING AND PHISHING (20)

Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Security Primer
Security PrimerSecurity Primer
Security Primer
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
 
Crontab Cyber Security session 4
Crontab Cyber Security session 4Crontab Cyber Security session 4
Crontab Cyber Security session 4
 
CYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptxCYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptx
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
HACKING
HACKINGHACKING
HACKING
 
Cyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptxCyber Crime, Cyber Space and Effects .pptx
Cyber Crime, Cyber Space and Effects .pptx
 
Cyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptxCyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptx
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptx
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
 
Cyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxCyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptx
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 

HACKING AND PHISHING

  • 2. Hacking Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose. The person who is consistently engaging in hacking activities, and has accepted hacking as a lifestyle and philosophy of their choice, is called a Hacker. Computer hacking is the most popular form of hacking nowadays, especially in the field of computer security, but hacking exists in many other forms, such as phone hacking, brain hacking, etc. and it's not limited to either of them.
  • 3. Phishing Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication. The word is a neologism created as a homophone of fishing due to the similarity of using a bait in an attempt to catch a victim. Phishing is a continual threat, and the risk is even larger in social media such as Facebook, Twitter, and Google+.
  • 5. 1971 Cap ‘n Crunch phone exploit discovered 1988 Morris Internet worm crashes 6000 servers 1994 $10 million transferred from CitiBank acounts 1995 Kevin Mitnick sentenced to 5 years in jail 1996 Unix hacked together 2000 Major websites succumb to DDoS 2000 15,700 credit and debit cards stolen from Western Union (hacked while database was undergoing maintanence) 2001 *CodeRed exploited bug in MS IIS to penetrate and spread probes *2nd wave infected 360000 servers in 14 hours *CodeRed 2 had backdoor installed to allow remote control
  • 6. do they hack  Deface sites for fun  Add spammy links to bad web neighbourhood  Hijack site to add spam,porn,gambling,pay-day loans content  Steal sensitive information to sell  Distribute malware to personal computers  Use server resources for distributed attacks
  • 8. ADVANTAGES • Prevents website defacements • An evolving technique,advancing day by day • Helps in finding and removing loopholes in cyber security • Can be used to recover lost information where the computer password has been lost • Teaches that no technology is 100% secure • To test how good security is on your own network.
  • 9. DISADVANTAGES • All depends upon the trustworthiness of the hacker • Hiring professionals is expensive • Criminals can use it to their advantage • It can harm someone’s privacy • Its illegal • Destroy all personal files
  • 10. INFAMOUS HACKERS ALBERT GONZALEZ GARY MCKINNON JONATHAN JAMES KEVIN MITNICK KEVIN POULSON
  • 11. HOW TO PREVENT • Perform required software updates for your operating system and web browser. Hackers attack where they see weakness.... • Install a firewall on your computer. ... • Change your passwords often. ... • Purchase or download anti-virus software… • Install anti-spyware/adware programs onto your system.... • Delete emails from unknown sources.
  • 13. HISTORY Phreaking+ Fishing=Phishing  Phreaking – making phone calls for free back in 70s  Fishing – use bait to lure the target 1995 Target: AOL users Purpose: getting account passwords for free time Technique:similar names,social engineering 2001 Target :Ebayers and major bank Purpose : getting credit card numbers,accounts Techniques : same as in 1995,keylogger 2007 Target:Paypal,banks,ebay Purpose:bank account Techniques:browser vulnerabilities,link obfuscation
  • 14. HOW • Conducted by email • Receive an authentic-looking email message that appears to come from a legitimate business • Ask you to divulge or verify personal data such as an account number,password,credit card or social security number • Possible for you to be phished by mail,telephone,or even in person • Through the use of Instant Messaging (IM),which can also be used for identity theft as well as spreading viruses and spyware
  • 15.
  • 16.
  • 17. TYPES
  • 18. PROBLEMS • Fraudulently acquire sensitive information using social engineering and technical subterfuge • Tries to trick users with official-looking messages  Credit card  Bank account  Ebay  Paypal • Some phishing mails also contain malicious software that track your activities or slow your computer
  • 19. HOW TO PREVENT • Never entertain unsolicited emails,calls or SMS • Your bank will never ask you for confidential information via emails,calls or texts.If you receive any such communication,report it to your bank • Avoid accessing websites via links in email messages;especially those asking for personal information.It is always safe to type the URL manually • Do not fill any kind of form that comes along with an email