Presentation is loading. Please wait.

Presentation is loading. Please wait.

INTRODUCTION Coined in 1996 by computer hackers. Hackers use e-mail to fish the internet hoping to hook users into supplying them the logins, passwords.

Similar presentations


Presentation on theme: "INTRODUCTION Coined in 1996 by computer hackers. Hackers use e-mail to fish the internet hoping to hook users into supplying them the logins, passwords."— Presentation transcript:

1

2 INTRODUCTION Coined in 1996 by computer hackers. Hackers use e-mail to fish the internet hoping to hook users into supplying them the logins, passwords and/or credit card information. In a typical phishing attack a user will receive an e-mail message impersonated to be sent by a financial institution. 1%-20% users respond to such attacks.

3 PHISHING ATTACKS Phishing attacks are combined with malicious code attacks such as Mimail, Bank Withdrawal Trojan, Mydoom.m worm etc In such blended attacks these virus/worms carry the payloads which harness email addresses from the internet and affected systems and further launch phishing attacks.

4 PHISHING EXAMPLES Example 1.

5

6

7

8 Example 2.

9

10

11

12 PHISHING TRENDS APWG is an industry association focused on eliminating the identity theft and fraud that result from phishing and email spoofing. This group provides forums to discuss phishing issues, trials and evaluations of potential technology solutions. Publish Phishing Attack Trends Report

13 TECHNOLOGICAL SOLUTIONS Ultimate solution is training the end users not to reveal any sensitive information. Basic approach for an effective anti-phishing effort includes detection, prevention and awareness. Counter measures are in the form of technological solutions, policy guidelines and user awareness.

14 Anti-phishing solution includes: a. Detection: scanning, flitering and alerting b. Mail server authentication c. Secure web-authentication d. Digitally signed e-mail e. Mail gateway filtering f. Desktop filtering

15 Secure web-authentication

16 Digitally signed e-mail

17

18 Other counter-measures are: a. Changes in policy of financial institutions b. User awareness c. Anti-phishing techniques

19 CONCLUSION The phishing attacks are major threat to e-commerce and e- banking applications. The scammers are making huge losses by stealing financial data from the users. There is need for adoption of counter-measure steps by the financial institutions and individual customers for fighting phishing attacks. Digital signature usage should be promoted for secure mail transactions.

20


Download ppt "INTRODUCTION Coined in 1996 by computer hackers. Hackers use e-mail to fish the internet hoping to hook users into supplying them the logins, passwords."

Similar presentations


Ads by Google