phishing and hacking

36
GROUP NO : 10 GROUP PRESENTATION OF

Upload: bangladesh-university-of-professionals

Post on 12-Apr-2017

175 views

Category:

Technology


2 download

TRANSCRIPT

GROUP NO : 10

GROUP PRESENTATION

OF

TOPICPHISHING AND HACKING

GROUP MEMBERS :

1. MEHEDI HASSAN BAPPY – 162210212. ISHTIAK U AHMED – 162210313. Fardun M RAHMAN - 16221053

PHISHING

What Is Phishing?

Actually originated from the word “FISHING”.

Criminal sets a particular bait as a fraudulency or fooling.

Get access of accounts and take personal data.

History Of PhishingPhishing was originated around January 1996.

The first move was made by WAREZ community.

In 2001 phishers put eye on online payment system.In 2003 they use email worm

program to have sites like EBAY or PAYPAL.In 2004 they attack on banking sites

and customers with Popup Windows.

Types Of Phishing

Phishing Types

Malware

Host File Poisoning

Data Theft Key loggers

Session Hijacking

Phishing Types

SearchEnginePhishin

gPhonePhishing

DNS based Phishing

Control InjectionPhishing

Man In TheMiddle Phishing

Phishing Types : Malware

¤ Malicious Software combined Mal+Ware = Malware.

¤ Install without notice of the user.¤ Difficult to remove and get access with

user data¤ Designed to steal credit card or any

password of your computer.

Phishing Types : Malware

Phishing Types : Malware

Up-to-date web browser

Install antivirus solution and monitor.

Deploy a web filter to block malicious websites

Latest security patches and updates

Phishing Types : Keylogger

Secretly monitor and log all key –strokes.

Can be a

device other than a softwar

e.

Parental care and

company care

Track down user

activity of

keyboard input.

Phishing Types : Keylogger

Phishing Types : Keylogger

A firewall is a great defense.

Keep your software updated.

Change your password frequently.

Software like ZONEALARM shut down all inbound and

outbound data.

Install a password manager.

Phishing Types : Data Theft

Illegal transfer of storage

USB drivePortable hard driveEmailPrintingRemote sharing

Consequence could be severe for both individual and businessman.

Phishing Types : Data Theft

Phishing Types : Data Theft

Usage of restricted network in

organization.

Laptop lockdown and biometric

security measures.

Use of anti-malware software.

Encryption of confidential

information or personal data.

Periodic reviews of device and system which can pose high

risk.

A man-in-the-middle attack is a type of cyberattack where a malicious actor inserts him/herself into a conversation between two parties, impersonates both parties and gains access to information that the two parties were trying to send to each other. A man-in-the-middle attack allows a malicious actor to intercept, send and receive data meant for someone else, or not meant to be sent at all, without either outside party knowing until it is too late. Man-in-the-middle attacks can be abbreviated in many ways, including MITM, MitM, MiM or MIM.

Phishing Types : Man In The Middle

The positive side of hacking

Social good Data Security

Brand Innovation

A look in the past

Misunderstanding between hacker and cracker

First used at MIT in 1960

What hackers do

The majority do it for fun

Quite rare on personal computer

Usually attacks bank for money

Professionals target big company

What are the effects of computer hacking

Privacy breach Loss of data Identity theft Track of actions

Computer hacking is a breach of computer security .it can expose sensitive user data and risk user privacy

What are the effects of computer hacking

Privacy breach Loss of data Identity theft Track of actions

Deletion or manipulation of sensitive data with intent to achieve personal gain is another effect of computer hacking

What are the effects of computer hacking

Privacy breach Loss of data Identity theft Track of actions

It is a fraud that involves pretention to be someone else, with intent to gain unauthorized access

What are the effects of computer hacking

Privacy breach Loss of data Identity theft Track of actions

Key logging software which is capable of tracking and recording every key stole by the user

What are the effects of computer hacking

Dos attack Stealing of information National security fraud

The DOS attack as it is called refers to the attempt of making computer resources unavailable to users

What are the effects of computer hacking

Dos attack Stealing of information National security fraud

Computer hacking can lead to theft of critical business information. Business clients can be lost

What are the effects of computer hacking

Dos attack Stealing of information National security fraud

Hacking of highly sensitive data can potentially risk the national security and sake the overall well being of the country citizens

What are the effects of computer hacking

Dos attack Stealing of information National security fraud

Zombie computer are used for fraudulent activities like spamming and phishing

How hackers work

Log keystrokes

Infect computers with

virusGain backdoor

access

Hack passwords

How hackers work

Zombie computers

Physically hacking

Virus in flash drives

Spy on email

How to prevent hacking

Update operating system and web

browser

Use strong password Purchase anti-virus software

Install firewall on computer

How to prevent hacking

Update operating system and web

browser

Use strong password Purchase anti-virus software

Install firewall on computer

How to prevent hacking

Update operating system and web

browser

Use strong password Purchase anti-virus software

Install firewall on computer

How to prevent hacking

Update operating system and web

browser

Use strong password Purchase anti-virus software

Install firewall on computer

Thank You