phishing scams in banking ppt
TRANSCRIPT
PHISHING BASICS
• Pronounced “fishing”
• The word has its Origin from two words “Password Harvesting” or fishing for Passwords
• Phishing is an online form of pretexting, a kind of deception in which an attacker pretends to be someone else in order to obtain sensitive information from the victim.
• Also known as "brand spoofing“.
• Phishers are phishing artists.
PHISHING
• Phishing is a way of fraudulently acquiring sensitive information using social engineering and technical subterfuge.
• It tries to trick users with official-looking messages− Credit card − Bank account− eBay− PayPal
• Some phishing e-mails also contain malicious or unwantedsoftware that can track your activities or slow your computer
CHARACTERISTICS OF PHISHING SCAMS
1. Unsolicited requests for sensitive information
2. Content appears genuine
3. Disguised hyperlinks and sender address
4. Email consists of a clickable image
5. Generic Greetings
6. Use various ruses to entice recipients to click
PHISHINGSCAM
PROCEDURE
What to do if you Receive a Suspected Phishing Scam
≠ DO NOT click on any links in the scam email.
≠ DO NOT supply any personal information of any kind as a result of the email
≠ DO NOT reply to the email or attempt to contact the senders in any way.
≠ DO NOT supply any information on the bogus website that may appear in your browser if you have clicked a link in the email.
≠ DO NOT open any attachments that arrive with the email.
≠ REPORT the phishing scam.
≠ DELETE the email from your computer as soon as possible.
WHAT SHOULD INTERNET USERS DO
ABOUT PHISHING SCAMS ?
Recognise the scam
Report the scam
Stop the scam
RBI CAUTIONED NET BANKING
USERS AGAINST PHISHING SCAMS
HOW PHISHIN
G WORKS
Planning
Setup
Attack
Collection
Identity Theft and Fraud
MAJOR FACTORS FOR INCREASE IN PHISHING
ATTACKS
Unawareness among public
Unawareness of policy
Technical sophistication
Techniques of Phishing Scams
1) Man-in-the-middle Attacks
2) URL Obfuscation Attacks
3) XSS (Cross-site Scripting)
WHY YOUR PERSONAL ACCOUNT
IS
A TARGET
Phishing – A Cyber CrimeProvisions of
Information Technology Act, 2000
• Section 66• Section 66A
• Section 66 C• Section 66 D
Steps to Avoid Phishing Attacks
1.Keep antivirus up to date
2. Do not click on hyperlinks in emails
3. Advantage of anti-spam software
4. Get educated
5. Use anti-spam software
6. Firewall
7. Use back-up system
8. Not to enter sensitive information into pop-up windows
9. Secure the hosts file
10. Protect against DNS pharming attacks
Presented By :
AMRITA HEMRAJANI (17)
PEARLENE JASAVALA (24)
KHYATI NANDU (38)
SANAYA PATEL (40)
KRISHMA SANDESRA (42)
VATSAL SHAH (50)