Professional Documents
Culture Documents
هدى
هدى
HUDA AL QAHTANI
FATIMAH AL QAHTANI
GHAYDA ALQARNI
:OUTLINE
• A method of attempting to get sensitive data, such as bank account information, through a
fraudulent solicitation in email or on a website in which the criminal poses as a
respectable business or reputable individual. Phishing occurs when attackers send
malicious emails with the intent of duping people into falling for a scam. The goal is
usually to convince users to give financial information, system credentials, or other
sensitive information.
• Phishing is an example of social engineering, which is a collection of techniques used by con
artists to manipulate human psychology. Social engineering tactics such as forgery,
misdirection, and lying can all be employed in phishing attempts. On the most basic level,
phishing emails use social engineering to manipulate consumers into doing without thinking.
CUSSES OF PHISHING
No strong
Lack of user Limited use
authentication at
awareness digital signatures
websites of bank
EFFECTS OF PHISHING
• Internet swindle
• Theft of one's identity
• The founding institution suffers a financial loss.
• Difficulties in Investigating Law Enforcement.
• Public Trust in the Internet is eroding.
• And It has an impact on the organization's employees and customers' faith in the
confidentiality of their data , so there will be no complete confidence.
HOW TO AVOID PHISHING ATTACK
2. Spear phishing
5. Angler Scam
phishing does it involve any malware
Phishing is when attackers attempt to trick users into doing 'the wrong thing', such as clicking a
bad link that will download malware, or direct them to a dodgy website
phishing affected:
When a business or individual is the victim of a successful phishing assault, it affects more than
simply financial losses; it also undermines the organization's employees and consumers' trust in
the confidentiality of their data.
• Phishing , how it work ? send phis email ,trick the user to steal credentials victim open link attach on email
what appear as real website it’s not , enter credentials, or it download malicious code attachments victim
submits credentials , attacker have access to data with malicious intention
• Phishing techniques?
• The hacker will use many scams to
lure you such as :
• - Invoice phishing
• - You won !! Sign up to get 50$ -
Downloads email attachments
• - Offer only for you ! Don’t miss it -
Problem solving scam
HOW TO PREVENT PHISHING ATTACKS