You are on page 1of 14

CYBER 

 SECURITY

Presented by: Chandana S


Muttur
Submitted to: Pavan Kumar
 Definition of Cyber Security
 Types of Cyber Security
 Introduction to Phishing
 Phishing examples
 Types of Phishing
Agenda  Causes of Phishing
 Anti Phishing
 Effects of Phishing
 Defend against phishing Attacks
 Conclusion
Definition of •Cyber Security also referred to as
Cyber Security: information security, cybersecurity refers
to the practice of ensuring the integrity,
confidentiality, and availability (ICA) of
information. Cybersecurity is comprised
of an evolving set of tools, risk
management approaches, technologies,
training, and best practices designed to
protect networks, devices, programs, and
data from attacks or unauthorized access.
• Denial of Service Attack (DoS)
• Hacking.
• Malware.
• Phishing.
Types of Cyber • Spoofing.
Security • Ransomware.
• Spamming.
Introduction to
Phishing
•Phishing is the act of attempting to acquire
information such as username, password and
credit card details as a trustworthy entity in
an electronic communication.

•Communications purporting to be from


popular social web sites, actions sites, online
payment process or IT administrators are
commonly used to lure the unsuspecting
public. Phishing emails may contain links to
websites that are infected with malware.
     Phishing Email -

        Phishing emails still comprise a large portion of the world’s yearly


slate of devastating data breaches. Phishing emails are designed to appear
to come from a legitimate source, like Amazon customer support, a bank,
PayPal, or another recognized organization. Cybercriminals hide their
presence in little details like the sender’s URL, an email attachment link,
Phishing and more.

Examples:   
      Spear Phishing -

        This more targeted phishing email attack relies on data that a


cybercriminal has previously collected about the victim or the victim’s
employer. Typically spear phishing emails use urgent and familiar
language to encourage the victim to act immediately.
• Deceptive - Sending a deceptive email, in bulk,
with a "call to action" that demands the recipient
click on a link.

Types of Phishing: • Malware-Based – Running malicious software


on the user's machine. Various forms of malware-
based phishing are:

  Key Loggers & Screen Loggers


  Session Hijacker
  Web Trojan
  Data Theft

• Main-in-the-Middle Phishing – Phisher position


himself between the user and the legitimate site.
Continued...

• DNS-Based – Phishing that interferes with the integrity of the lookup process for a domain name.
Forms of DNS-based phishing are:

 Hosts file poisoning


 Polluting user's DNS cache
 Proxy server compromise

• Context-Injection – Inserting malicious content into legitimate site.


Causes of Phishing:

•Misleading e-mails
•No check of source address
•Vulnerability in browsers
•No strong authentication at website of banks and financial institutions
•Limited use of digital signatures
•Non-availability of secure desktop tools
•Lack of user awareness
•Vulnerability in application
•   A. Social responses.
•   B. Technical approaches
•    1. Helping to identify legitimate websites.

Anti Phishing •    2. Browsers alerting users to


fraudulent websites.
•    3. Eliminating Phishing mail.
•    4. Monitoring and takedown.
•    C. Legal approaches
• Internet fraud
• Identity theft
Effects of • Financial loss to the original institutions
Phishing: • Difficulties in Law Enforcement Investigations
• Erosion of Public Trust in the Internet
Defend against
Phishing Attacks

• Preventing a phishing attack before


it begins .
•  Detecting a phishing attack.
•  Preventing the delivery of
phishing messages.
•  Preventing deception in phishing
messages and sites
• Counter measures.
• Interfering with the use of
compromised information. 
Conclusion:

• NO single technology will completely stop phishing.


• However, a combination of good organization and practice, proper application of
current technologies, and improvements in security technology has the potential to
drastically reduce the prevalence of phishing and the losses suffered from it.

You might also like