You are on page 1of 15

PHISHING ATTACK

HUDA AL QAHTANI
FATIMAH AL QAHTANI
GHAYDA ALQARNI
:OUTLINE

• Description of Phising Attack and How can cusses.


• Effects of phising.
• How to avoid phishing attack.
• Types of phishing and Phishing Techniques
• How to prevent this attack.
:PHISHING ATTACK

• A method of attempting to get sensitive data, such as bank account information, through a
fraudulent solicitation in email or on a website in which the criminal poses as a
respectable business or reputable individual. Phishing occurs when attackers send
malicious emails with the intent of duping people into falling for a scam. The goal is
usually to convince users to give financial information, system credentials, or other
sensitive information.
• Phishing is an example of social engineering, which is a collection of techniques used by con
artists to manipulate human psychology. Social engineering tactics such as forgery,
misdirection, and lying can all be employed in phishing attempts. On the most basic level,
phishing emails use social engineering to manipulate consumers into doing without thinking.
CUSSES OF PHISHING

No check of Vulnerability in Misleading e- Vulnerability in


source address browsers mails application

No strong
Lack of user Limited use
authentication at
awareness digital signatures
websites of bank
EFFECTS OF PHISHING

• Internet swindle
• Theft of one's identity
• The founding institution suffers a financial loss.
• Difficulties in Investigating Law Enforcement.
• Public Trust in the Internet is eroding.
• And It has an impact on the organization's employees and customers' faith in the
confidentiality of their data , so there will be no complete confidence.
HOW TO AVOID PHISHING ATTACK

• Please do not click the link.


• Enter the URL into your browser (such as www.paybal.com)
• Never provide critical account information such as account numbers or passwords.
• Verify anyone who contacts you (phone , email)
• Put in place strong password policies.
• Maintain your web security by using the most recent security fixes.
TYPES OF PHISHING

1. Phishing via emailThe majority of phishing attacks

2. Spear phishing

3. Whaling attacks target senior management and other positions of power.

4. Smishing and VisingInstead of written communication

5. Angler Scam
phishing does it involve any malware

Phishing is when attackers attempt to trick users into doing 'the wrong thing', such as clicking a
bad link that will download malware, or direct them to a dodgy website

phishing affected:

When a business or individual is the victim of a successful phishing assault, it affects more than
simply financial losses; it also undermines the organization's employees and consumers' trust in
the confidentiality of their data.
• Phishing , how it work ? send phis email ,trick the user to steal credentials victim open link attach on email
what appear as real website it’s not , enter credentials, or it download malicious code attachments victim
submits credentials , attacker have access to data with malicious intention
• Phishing techniques?
• The hacker will use many scams to
lure you such as :
• - Invoice phishing
• - You won !! Sign up to get 50$ -
Downloads email attachments
• - Offer only for you ! Don’t miss it -
Problem solving scam
HOW TO PREVENT PHISHING ATTACKS

 Install and keep anti-virus software up to date.


 Ignore scam calls in which your private information is obtained in order to provide
further perks.
 Never proceed on websites that contain questionable or dangerous content.
 Delete these sites right now to avoid additional damage.
 Never download files that include the warning "This file may harm your device."
• Tips :
• - Security awareness and training about phishing emails .
• - Avoid contacting with someone suspicious and don’t give any personal sensitive
information such as passwords, id number

You might also like