際際滷

際際滷Share a Scribd company logo
TittlE :
  PhishinG




 Group name:
Shom wei yong(captain)
    Yun youliang
        Kavi
     Toh jun hou
Contents !!
* How they Attack ??
* What Is Phishing ??
* How To Detect ??
* Example
* Damage Caused By Phishing.
* Conclusion.
*Sources Of References.
What Is Phishing
* Phishing is defines as the
fraudulent acquisition of personal
information by tricking an
individual into believing the
attacker is a trustworty entity this
is normally done throught email
and an instant message.
How they attack
Most attacks of phishing use some form of
technical deception designed to make a link
in an email appear to belong to the spoofed
organization . Misspelled URLs or the use of
subdomains are common trick used by
phishers,
hhttp://www.maybank.home.com/
* One method of spoofing links used web
addresses containing the @ symbol, which
were used include username and password
in a web URL
How To DETecT
* Is is actually very noticeable. You will see misspelled
URLs .One way seeing discovering @ in the web adresses
e.g.
http:/www.hotmail.com@members.com

* Some web browers such as Mozilla and internet
Explorer has closed this off while Opera gives a warning
and an optain to get off the website. In another popular
method of phishing, an attacker uses a bank or other
services website scripts on the victim. These types of
atack known as crosssite scripting.
DAMAGE CAUSED BY pHISHING
The damage caused by phishing ranges from
loss of access to email to substantail
financial loss. This style of identity thefy is
becoming more popular,because of the ease
with which unsuspecting people often
divulge personal information to
phishers,including credit card number,sosial
security number anf miothers maiden names.
*There are also fears that identify theives
can obtain some such information they need
and want the phishers will use that persons
detail to create fake account using the
victims name, using up a persons credit or
even the victim from accesssing their own
acounts.
Conclusion !!
* Phishing e-mails are only a small aspet of the
overall phishing economy and until now, the only
aspet seen by the most people. The phishing
economy is a decentralized and self-organized
sosial network of merchants and consumers
governed by laws of supply and demand. This
clearer picture of the landscape, the players, and
insight into phishing operations will hopefully assist
in the fight against online fraud.
Sources and reference
*www.google.com
*www.wikipedia.com
*http:/www.hotmail.com@members.com
*hhttp://www.maybank.home.com/

More Related Content

What's hot (20)

Strategies to handle Phishing attacks
Strategies to handle Phishing attacksStrategies to handle Phishing attacks
Strategies to handle Phishing attacks
Sreejith.D. Menon
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark World
Avishek Datta
Phishing technology
Phishing technologyPhishing technology
Phishing technology
harpinderkaur123
What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?
Quick Heal Technologies Ltd.
Intro phishing
Intro phishingIntro phishing
Intro phishing
Sayali Dayama
Introduction to phishing
Introduction to phishingIntroduction to phishing
Introduction to phishing
Raviteja Chowdary Adusumalli
Phishing
PhishingPhishing
Phishing
Syahida
Phishing
PhishingPhishing
Phishing
oitaoming
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
bensonoo
Phishing
PhishingPhishing
Phishing
Jayaseelan Vejayon
Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniques
Sushil Kumar
Phishing and hacking
Phishing and hackingPhishing and hacking
Phishing and hacking
Md. Mehadi Hassan Bappy
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
temi
phishing and pharming - evil twins
phishing and pharming - evil twinsphishing and pharming - evil twins
phishing and pharming - evil twins
Nilantha Piyasiri
Anti phishing
Anti phishingAnti phishing
Anti phishing
Shethwala Ridhvesh
Phishing attack till now
Phishing attack till nowPhishing attack till now
Phishing attack till now
elakkiya poongunran
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Er. Rahul Jain
Phishing
PhishingPhishing
Phishing
shivli0769
PHISHING attack
PHISHING attack PHISHING attack
PHISHING attack
Shubh Thakkar
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
SysCloud
Strategies to handle Phishing attacks
Strategies to handle Phishing attacksStrategies to handle Phishing attacks
Strategies to handle Phishing attacks
Sreejith.D. Menon
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark World
Avishek Datta
Phishing
PhishingPhishing
Phishing
Syahida
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
bensonoo
Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniques
Sushil Kumar
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
temi
phishing and pharming - evil twins
phishing and pharming - evil twinsphishing and pharming - evil twins
phishing and pharming - evil twins
Nilantha Piyasiri
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Er. Rahul Jain
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
SysCloud

Viewers also liked (15)

Causes ppt
Causes pptCauses ppt
Causes ppt
mrhalawa
Think aloud
Think aloudThink aloud
Think aloud
Hallie Kittle
Inventario comercial de pereiraInventario comercial de pereira
Inventario comercial de pereira
naocme
Danskerne og internettet
Danskerne og internettetDanskerne og internettet
Danskerne og internettet
Kamilla Jakobsen
Social Media for the Property Manager
Social Media for the Property ManagerSocial Media for the Property Manager
Social Media for the Property Manager
Ansley Sudderth
Danskerne og internettet
Danskerne og internettetDanskerne og internettet
Danskerne og internettet
Kamilla Jakobsen
Osservazione mo mitosi
Osservazione mo mitosiOsservazione mo mitosi
Osservazione mo mitosi
L M
Acidi e basi 3
Acidi e basi 3Acidi e basi 3
Acidi e basi 3
L M
永姻艶壊艶稼岳温界庄坦
永姻艶壊艶稼岳温界庄坦永姻艶壊艶稼岳温界庄坦
永姻艶壊艶稼岳温界庄坦
Niny23
Think aloud
Think aloudThink aloud
Think aloud
lbchutson
La mitosi
La mitosiLa mitosi
La mitosi
L M
Acidi nucleici sintesi e duplicazione
Acidi nucleici sintesi e duplicazioneAcidi nucleici sintesi e duplicazione
Acidi nucleici sintesi e duplicazione
L M
2016 Social Media Trends Chattanooga Apartment Association
2016 Social Media Trends Chattanooga Apartment Association2016 Social Media Trends Chattanooga Apartment Association
2016 Social Media Trends Chattanooga Apartment Association
Ansley Sudderth
Cgpa
CgpaCgpa
Cgpa
Tejashri Dayma
Causes ppt
Causes pptCauses ppt
Causes ppt
mrhalawa
Inventario comercial de pereiraInventario comercial de pereira
Inventario comercial de pereira
naocme
Danskerne og internettet
Danskerne og internettetDanskerne og internettet
Danskerne og internettet
Kamilla Jakobsen
Social Media for the Property Manager
Social Media for the Property ManagerSocial Media for the Property Manager
Social Media for the Property Manager
Ansley Sudderth
Danskerne og internettet
Danskerne og internettetDanskerne og internettet
Danskerne og internettet
Kamilla Jakobsen
Osservazione mo mitosi
Osservazione mo mitosiOsservazione mo mitosi
Osservazione mo mitosi
L M
Acidi e basi 3
Acidi e basi 3Acidi e basi 3
Acidi e basi 3
L M
永姻艶壊艶稼岳温界庄坦
永姻艶壊艶稼岳温界庄坦永姻艶壊艶稼岳温界庄坦
永姻艶壊艶稼岳温界庄坦
Niny23
Think aloud
Think aloudThink aloud
Think aloud
lbchutson
La mitosi
La mitosiLa mitosi
La mitosi
L M
Acidi nucleici sintesi e duplicazione
Acidi nucleici sintesi e duplicazioneAcidi nucleici sintesi e duplicazione
Acidi nucleici sintesi e duplicazione
L M
2016 Social Media Trends Chattanooga Apartment Association
2016 Social Media Trends Chattanooga Apartment Association2016 Social Media Trends Chattanooga Apartment Association
2016 Social Media Trends Chattanooga Apartment Association
Ansley Sudderth

Similar to Tittl e (20)

Phishing technology
Phishing technologyPhishing technology
Phishing technology
Preeti Papneja
Phishing technology
Phishing technologyPhishing technology
Phishing technology
Preeti Papneja
Phishing & Pharming Explained.pdf
Phishing & Pharming Explained.pdfPhishing & Pharming Explained.pdf
Phishing & Pharming Explained.pdf
Evs, Lahore
December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10
seadeloitte
Phishing
PhishingPhishing
Phishing
SouganthikaSankaresw
Chapter-5.pptx
Chapter-5.pptxChapter-5.pptx
Chapter-5.pptx
ShreyaKushwaha28
Phishing.pdf
Phishing.pdfPhishing.pdf
Phishing.pdf
MariGogokhia
Phis
PhisPhis
Phis
Presentaionslive.blogspot.com
Phishing
PhishingPhishing
Phishing
Sagar Rai
Phishing 101 General Course
Phishing 101 General CoursePhishing 101 General Course
Phishing 101 General Course
Aaron Keating
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2Conf
edu 3 ppt.pptx
edu 3 ppt.pptxedu 3 ppt.pptx
edu 3 ppt.pptx
ArchaWashington
Unit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesUnit iii: Common Hacking Techniques
Unit iii: Common Hacking Techniques
Arnav Chowdhury
E Mail Phishing Prevention and Detection
E Mail Phishing Prevention and DetectionE Mail Phishing Prevention and Detection
E Mail Phishing Prevention and Detection
ijtsrd
phishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptxphishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptx
ErrorError22
Phishing
PhishingPhishing
Phishing
Syeda Javeria
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
aleeya91
Internet Phishing El phishing es una forma de ciberdelincuencia en la que los...
Internet Phishing El phishing es una forma de ciberdelincuencia en la que los...Internet Phishing El phishing es una forma de ciberdelincuencia en la que los...
Internet Phishing El phishing es una forma de ciberdelincuencia en la que los...
i2422282
cyber security unit-1, r20-JNTUK-USED FOR STUDENTS
cyber security unit-1, r20-JNTUK-USED FOR STUDENTScyber security unit-1, r20-JNTUK-USED FOR STUDENTS
cyber security unit-1, r20-JNTUK-USED FOR STUDENTS
SAIPAVANKUMARNANDIGA
Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Prevention
sonalikharade3
Phishing technology
Phishing technologyPhishing technology
Phishing technology
Preeti Papneja
Phishing technology
Phishing technologyPhishing technology
Phishing technology
Preeti Papneja
Phishing & Pharming Explained.pdf
Phishing & Pharming Explained.pdfPhishing & Pharming Explained.pdf
Phishing & Pharming Explained.pdf
Evs, Lahore
December 2019 Part 10
December 2019 Part 10December 2019 Part 10
December 2019 Part 10
seadeloitte
Phishing 101 General Course
Phishing 101 General CoursePhishing 101 General Course
Phishing 101 General Course
Aaron Keating
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2Conf
Unit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesUnit iii: Common Hacking Techniques
Unit iii: Common Hacking Techniques
Arnav Chowdhury
E Mail Phishing Prevention and Detection
E Mail Phishing Prevention and DetectionE Mail Phishing Prevention and Detection
E Mail Phishing Prevention and Detection
ijtsrd
phishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptxphishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptx
ErrorError22
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
aleeya91
Internet Phishing El phishing es una forma de ciberdelincuencia en la que los...
Internet Phishing El phishing es una forma de ciberdelincuencia en la que los...Internet Phishing El phishing es una forma de ciberdelincuencia en la que los...
Internet Phishing El phishing es una forma de ciberdelincuencia en la que los...
i2422282
cyber security unit-1, r20-JNTUK-USED FOR STUDENTS
cyber security unit-1, r20-JNTUK-USED FOR STUDENTScyber security unit-1, r20-JNTUK-USED FOR STUDENTS
cyber security unit-1, r20-JNTUK-USED FOR STUDENTS
SAIPAVANKUMARNANDIGA
Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Prevention
sonalikharade3

Tittl e

  • 1. TittlE : PhishinG Group name: Shom wei yong(captain) Yun youliang Kavi Toh jun hou
  • 2. Contents !! * How they Attack ?? * What Is Phishing ?? * How To Detect ?? * Example * Damage Caused By Phishing. * Conclusion. *Sources Of References.
  • 3. What Is Phishing * Phishing is defines as the fraudulent acquisition of personal information by tricking an individual into believing the attacker is a trustworty entity this is normally done throught email and an instant message.
  • 4. How they attack Most attacks of phishing use some form of technical deception designed to make a link in an email appear to belong to the spoofed organization . Misspelled URLs or the use of subdomains are common trick used by phishers, hhttp://www.maybank.home.com/ * One method of spoofing links used web addresses containing the @ symbol, which were used include username and password in a web URL
  • 5. How To DETecT * Is is actually very noticeable. You will see misspelled URLs .One way seeing discovering @ in the web adresses e.g. http:/www.hotmail.com@members.com * Some web browers such as Mozilla and internet Explorer has closed this off while Opera gives a warning and an optain to get off the website. In another popular method of phishing, an attacker uses a bank or other services website scripts on the victim. These types of atack known as crosssite scripting.
  • 6. DAMAGE CAUSED BY pHISHING The damage caused by phishing ranges from loss of access to email to substantail financial loss. This style of identity thefy is becoming more popular,because of the ease with which unsuspecting people often divulge personal information to phishers,including credit card number,sosial security number anf miothers maiden names. *There are also fears that identify theives can obtain some such information they need and want the phishers will use that persons detail to create fake account using the victims name, using up a persons credit or even the victim from accesssing their own acounts.
  • 7. Conclusion !! * Phishing e-mails are only a small aspet of the overall phishing economy and until now, the only aspet seen by the most people. The phishing economy is a decentralized and self-organized sosial network of merchants and consumers governed by laws of supply and demand. This clearer picture of the landscape, the players, and insight into phishing operations will hopefully assist in the fight against online fraud.