phishing and hacking
TRANSCRIPT
TOPICPHISHING AND HACKING
GROUP MEMBERS :
1. MEHEDI HASSAN BAPPY – 162210212. ISHTIAK U AHMED – 162210313. Fardun M RAHMAN - 16221053
What Is Phishing?
Actually originated from the word “FISHING”.
Criminal sets a particular bait as a fraudulency or fooling.
Get access of accounts and take personal data.
History Of PhishingPhishing was originated around January 1996.
The first move was made by WAREZ community.
In 2001 phishers put eye on online payment system.In 2003 they use email worm
program to have sites like EBAY or PAYPAL.In 2004 they attack on banking sites
and customers with Popup Windows.
Phishing Types
SearchEnginePhishin
gPhonePhishing
DNS based Phishing
Control InjectionPhishing
Man In TheMiddle Phishing
Phishing Types : Malware
¤ Malicious Software combined Mal+Ware = Malware.
¤ Install without notice of the user.¤ Difficult to remove and get access with
user data¤ Designed to steal credit card or any
password of your computer.
Phishing Types : Malware
Up-to-date web browser
Install antivirus solution and monitor.
Deploy a web filter to block malicious websites
Latest security patches and updates
Phishing Types : Keylogger
Secretly monitor and log all key –strokes.
Can be a
device other than a softwar
e.
Parental care and
company care
Track down user
activity of
keyboard input.
Phishing Types : Keylogger
A firewall is a great defense.
Keep your software updated.
Change your password frequently.
Software like ZONEALARM shut down all inbound and
outbound data.
Install a password manager.
Phishing Types : Data Theft
Illegal transfer of storage
USB drivePortable hard driveEmailPrintingRemote sharing
Consequence could be severe for both individual and businessman.
Phishing Types : Data Theft
Usage of restricted network in
organization.
Laptop lockdown and biometric
security measures.
Use of anti-malware software.
Encryption of confidential
information or personal data.
Periodic reviews of device and system which can pose high
risk.
A man-in-the-middle attack is a type of cyberattack where a malicious actor inserts him/herself into a conversation between two parties, impersonates both parties and gains access to information that the two parties were trying to send to each other. A man-in-the-middle attack allows a malicious actor to intercept, send and receive data meant for someone else, or not meant to be sent at all, without either outside party knowing until it is too late. Man-in-the-middle attacks can be abbreviated in many ways, including MITM, MitM, MiM or MIM.
Phishing Types : Man In The Middle
What hackers do
The majority do it for fun
Quite rare on personal computer
Usually attacks bank for money
Professionals target big company
What are the effects of computer hacking
Privacy breach Loss of data Identity theft Track of actions
Computer hacking is a breach of computer security .it can expose sensitive user data and risk user privacy
What are the effects of computer hacking
Privacy breach Loss of data Identity theft Track of actions
Deletion or manipulation of sensitive data with intent to achieve personal gain is another effect of computer hacking
What are the effects of computer hacking
Privacy breach Loss of data Identity theft Track of actions
It is a fraud that involves pretention to be someone else, with intent to gain unauthorized access
What are the effects of computer hacking
Privacy breach Loss of data Identity theft Track of actions
Key logging software which is capable of tracking and recording every key stole by the user
What are the effects of computer hacking
Dos attack Stealing of information National security fraud
The DOS attack as it is called refers to the attempt of making computer resources unavailable to users
What are the effects of computer hacking
Dos attack Stealing of information National security fraud
Computer hacking can lead to theft of critical business information. Business clients can be lost
What are the effects of computer hacking
Dos attack Stealing of information National security fraud
Hacking of highly sensitive data can potentially risk the national security and sake the overall well being of the country citizens
What are the effects of computer hacking
Dos attack Stealing of information National security fraud
Zombie computer are used for fraudulent activities like spamming and phishing
How to prevent hacking
Update operating system and web
browser
Use strong password Purchase anti-virus software
Install firewall on computer
How to prevent hacking
Update operating system and web
browser
Use strong password Purchase anti-virus software
Install firewall on computer
How to prevent hacking
Update operating system and web
browser
Use strong password Purchase anti-virus software
Install firewall on computer
How to prevent hacking
Update operating system and web
browser
Use strong password Purchase anti-virus software
Install firewall on computer