SlideShare a Scribd company logo
1 of 8
TittlE :
  PhishinG




 Group name:
Shom wei yong(captain)
    Yun youliang
        Kavi
     Toh jun hou
Contents !!
* How they Attack ??
* What Is Phishing ??
* How To Detect ??
* Example
* Damage Caused By Phishing.
* Conclusion.
*Sources Of References.
What Is Phishing
* Phishing is defines as the
fraudulent acquisition of personal
information by tricking an
individual into believing the
attacker is a trustworty entity this
is normally done throught email
and an instant message.
How they attack…
•Most attacks of phishing use some form of
technical deception designed to make a link
in an email appear to belong to the spoofed
organization . Misspelled URLs or the use of
subdomains are common trick used by
phishers,
hhttp://www.maybank.home.com/
* One method of spoofing links used web
addresses containing the @ symbol, which
were used include username and password
in a web URL
How To DETecT
* Is is actually very noticeable. You will see misspelled
URLs .One way seeing discovering @ in the web adresses
e.g.
http:/www.hotmail.com@members.com

* Some web browers such as Mozilla and internet
Explorer has closed this off while Opera gives a warning
and an optain to get off the website. In another popular
method of phishing, an attacker uses a bank or other
services website scripts on the victim. These types of
atack known as crosssite scripting.
DAMAGE CAUSED BY pHISHING
•The damage caused by phishing ranges from
loss of access to email to substantail
financial loss. This style of identity thefy is
becoming more popular,because of the ease
with which unsuspecting people often
divulge personal information to
phishers,including credit card number,sosial
security number anf miothers maiden names.
*There are also fears that identify theives
can obtain some such information they need
and want the phishers will use that person’s
detail to create fake account using the
victims name, using up a persons credit or
even the victim from accesssing their own
acounts.
Conclusion !!
* Phishing e-mails are only a small aspet of the
overall phishing economy and until now, the only
aspet seen by the most people. The phishing
economy is a decentralized and self-organized
sosial network of merchants and consumers
governed by laws of supply and demand. This
clearer picture of the landscape, the players, and
insight into phishing operations will hopefully assist
in the fight against online fraud.
Sources and reference
*www.google.com
*www.wikipedia.com
*http:/www.hotmail.com@members.com
*hhttp://www.maybank.home.com/

More Related Content

What's hot

Strategies to handle Phishing attacks
Strategies to handle Phishing attacksStrategies to handle Phishing attacks
Strategies to handle Phishing attacksSreejith.D. Menon
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldAvishek Datta
 
Phishing
PhishingPhishing
PhishingSyahida
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N Gbensonoo
 
Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniquesSushil Kumar
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N Gtemi
 
phishing and pharming - evil twins
phishing and pharming - evil twinsphishing and pharming - evil twins
phishing and pharming - evil twinsNilantha Piyasiri
 
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks Er. Rahul Jain
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing AttacksSysCloud
 

What's hot (20)

Strategies to handle Phishing attacks
Strategies to handle Phishing attacksStrategies to handle Phishing attacks
Strategies to handle Phishing attacks
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark World
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?
 
Intro phishing
Intro phishingIntro phishing
Intro phishing
 
Introduction to phishing
Introduction to phishingIntroduction to phishing
Introduction to phishing
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Phishing
PhishingPhishing
Phishing
 
Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniques
 
Phishing and hacking
Phishing and hackingPhishing and hacking
Phishing and hacking
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
phishing and pharming - evil twins
phishing and pharming - evil twinsphishing and pharming - evil twins
phishing and pharming - evil twins
 
Anti phishing
Anti phishingAnti phishing
Anti phishing
 
Phishing attack till now
Phishing attack till nowPhishing attack till now
Phishing attack till now
 
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
 
Phishing
PhishingPhishing
Phishing
 
PHISHING attack
PHISHING attack PHISHING attack
PHISHING attack
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
 

Viewers also liked

Causes ppt
Causes pptCauses ppt
Causes pptmrhalawa
 
Inventario comercial de pereira
Inventario comercial de pereiraInventario comercial de pereira
Inventario comercial de pereiranaocme
 
Social Media for the Property Manager
Social Media for the Property ManagerSocial Media for the Property Manager
Social Media for the Property ManagerAnsley Sudderth
 
Osservazione mo mitosi
Osservazione mo mitosiOsservazione mo mitosi
Osservazione mo mitosiL M
 
Acidi e basi 3
Acidi e basi 3Acidi e basi 3
Acidi e basi 3L M
 
Presentació
PresentacióPresentació
PresentacióNiny23
 
La mitosi
La mitosiLa mitosi
La mitosiL M
 
Acidi nucleici sintesi e duplicazione
Acidi nucleici sintesi e duplicazioneAcidi nucleici sintesi e duplicazione
Acidi nucleici sintesi e duplicazioneL M
 
2016 Social Media Trends Chattanooga Apartment Association
2016 Social Media Trends Chattanooga Apartment Association2016 Social Media Trends Chattanooga Apartment Association
2016 Social Media Trends Chattanooga Apartment AssociationAnsley Sudderth
 

Viewers also liked (15)

Causes ppt
Causes pptCauses ppt
Causes ppt
 
Prob assign 57010338 - 57010625
Prob assign 57010338 - 57010625Prob assign 57010338 - 57010625
Prob assign 57010338 - 57010625
 
Think aloud
Think aloudThink aloud
Think aloud
 
Inventario comercial de pereira
Inventario comercial de pereiraInventario comercial de pereira
Inventario comercial de pereira
 
Danskerne og internettet
Danskerne og internettetDanskerne og internettet
Danskerne og internettet
 
Social Media for the Property Manager
Social Media for the Property ManagerSocial Media for the Property Manager
Social Media for the Property Manager
 
Danskerne og internettet
Danskerne og internettetDanskerne og internettet
Danskerne og internettet
 
Osservazione mo mitosi
Osservazione mo mitosiOsservazione mo mitosi
Osservazione mo mitosi
 
Acidi e basi 3
Acidi e basi 3Acidi e basi 3
Acidi e basi 3
 
Presentació
PresentacióPresentació
Presentació
 
Think aloud
Think aloudThink aloud
Think aloud
 
La mitosi
La mitosiLa mitosi
La mitosi
 
Acidi nucleici sintesi e duplicazione
Acidi nucleici sintesi e duplicazioneAcidi nucleici sintesi e duplicazione
Acidi nucleici sintesi e duplicazione
 
2016 Social Media Trends Chattanooga Apartment Association
2016 Social Media Trends Chattanooga Apartment Association2016 Social Media Trends Chattanooga Apartment Association
2016 Social Media Trends Chattanooga Apartment Association
 
Cgpa
CgpaCgpa
Cgpa
 

Similar to Tittl e

Phishing & Pharming Explained.pdf
Phishing & Pharming Explained.pdfPhishing & Pharming Explained.pdf
Phishing & Pharming Explained.pdfEvs, Lahore
 
December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10seadeloitte
 
Phishing 101 General Course
Phishing 101 General CoursePhishing 101 General Course
Phishing 101 General CourseAaron Keating
 
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2Conf
 
Unit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesUnit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesArnav Chowdhury
 
E Mail Phishing Prevention and Detection
E Mail Phishing Prevention and DetectionE Mail Phishing Prevention and Detection
E Mail Phishing Prevention and Detectionijtsrd
 
phishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptxphishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptxErrorError22
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)aleeya91
 
Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Preventionsonalikharade3
 
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awarenessOWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awarenessMaherHamza9
 
IT2252_Presentation_Group03.pptx
IT2252_Presentation_Group03.pptxIT2252_Presentation_Group03.pptx
IT2252_Presentation_Group03.pptxNLFunnyFunky
 

Similar to Tittl e (20)

Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing & Pharming Explained.pdf
Phishing & Pharming Explained.pdfPhishing & Pharming Explained.pdf
Phishing & Pharming Explained.pdf
 
December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10
 
Phishing
PhishingPhishing
Phishing
 
Chapter-5.pptx
Chapter-5.pptxChapter-5.pptx
Chapter-5.pptx
 
Phishing.pdf
Phishing.pdfPhishing.pdf
Phishing.pdf
 
Phis
PhisPhis
Phis
 
Phishing
PhishingPhishing
Phishing
 
Phishing 101 General Course
Phishing 101 General CoursePhishing 101 General Course
Phishing 101 General Course
 
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
 
edu 3 ppt.pptx
edu 3 ppt.pptxedu 3 ppt.pptx
edu 3 ppt.pptx
 
Unit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesUnit iii: Common Hacking Techniques
Unit iii: Common Hacking Techniques
 
E Mail Phishing Prevention and Detection
E Mail Phishing Prevention and DetectionE Mail Phishing Prevention and Detection
E Mail Phishing Prevention and Detection
 
phishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptxphishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptx
 
Phishing
PhishingPhishing
Phishing
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
 
Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Prevention
 
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awarenessOWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
 
IT2252_Presentation_Group03.pptx
IT2252_Presentation_Group03.pptxIT2252_Presentation_Group03.pptx
IT2252_Presentation_Group03.pptx
 

Tittl e

  • 1. TittlE : PhishinG Group name: Shom wei yong(captain) Yun youliang Kavi Toh jun hou
  • 2. Contents !! * How they Attack ?? * What Is Phishing ?? * How To Detect ?? * Example * Damage Caused By Phishing. * Conclusion. *Sources Of References.
  • 3. What Is Phishing * Phishing is defines as the fraudulent acquisition of personal information by tricking an individual into believing the attacker is a trustworty entity this is normally done throught email and an instant message.
  • 4. How they attack… •Most attacks of phishing use some form of technical deception designed to make a link in an email appear to belong to the spoofed organization . Misspelled URLs or the use of subdomains are common trick used by phishers, hhttp://www.maybank.home.com/ * One method of spoofing links used web addresses containing the @ symbol, which were used include username and password in a web URL
  • 5. How To DETecT * Is is actually very noticeable. You will see misspelled URLs .One way seeing discovering @ in the web adresses e.g. http:/www.hotmail.com@members.com * Some web browers such as Mozilla and internet Explorer has closed this off while Opera gives a warning and an optain to get off the website. In another popular method of phishing, an attacker uses a bank or other services website scripts on the victim. These types of atack known as crosssite scripting.
  • 6. DAMAGE CAUSED BY pHISHING •The damage caused by phishing ranges from loss of access to email to substantail financial loss. This style of identity thefy is becoming more popular,because of the ease with which unsuspecting people often divulge personal information to phishers,including credit card number,sosial security number anf miothers maiden names. *There are also fears that identify theives can obtain some such information they need and want the phishers will use that person’s detail to create fake account using the victims name, using up a persons credit or even the victim from accesssing their own acounts.
  • 7. Conclusion !! * Phishing e-mails are only a small aspet of the overall phishing economy and until now, the only aspet seen by the most people. The phishing economy is a decentralized and self-organized sosial network of merchants and consumers governed by laws of supply and demand. This clearer picture of the landscape, the players, and insight into phishing operations will hopefully assist in the fight against online fraud.