You are on page 1of 2

TABLE OF CONTENTS

Title Page No.


1. Introduction 1

1.1 Purpose 1

1.2 Scope of Project 1

1.3 Objective 1

1.4 Overview 2

2. Overall Description 3

2.1 System Environment 3

2.2 Product Functions 4

2.3 Class and Characteristics 4

2.4 Operative Environment 5

2.5 Design and Implementation Constrains 5

2.6 Project Assumptions and Dependencies 5

3. System Design and Implementation 6

3.1 System Architecture 6

3.2 System Design 6

3.3 Database Design 8

3.4 Hosting 10

4. How to Protect from Phishing Attacks 12

CONCLUSION 13

REFERANCES 14
LIST OF FIGURES

Fig no. Figure Description Page no.

2.1 System Environment 3


2.2 Phishing Mechanism 4
3.1 Web application Architecture 6
3.2.1 Fake Notification 7
3.2.2(a) Fake Gmail Webpage 7
3.2.2(b) Prompt saying invalid email or 8
Password
3.3(a) Firebase SDK Snippet 9
3.3(b) Firebase Database 9
3.4(a) Files uploaded for hosting 10
3.4(b) Status of Hosted site 11

You might also like