Phishing and I dentity theft ITEC810. Saravana Venkatesh Chellam 42323088 Supervisor : Josef Pieprzyk. Roadmap :. Aim Significance Introduction to phishing & its attacks Overview of phishing techniques Countermeasures of phishing techniques. Conclusion and future scope. Aim:.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Saravana Venkatesh Chellam
Supervisor : Josef Pieprzyk
APWG(Anti-phishing group) - 2010
Results of an phishing attack: (Simon Whitehouse, 2007)
Stan Hegt - May 2008 - Analysis of phishing attacks
Phishing delivery modes:
Gunter 2007 - The Phishing Guide
Email techniques :-
Web –based techniques:-
To reduce suspicion and increase authenticity:-
Example :http://privatebanking.mybank.com as
Web based- Phishing attacks :
Browser vulnerabilities – Add-ons , plugins etc
key-loggers and screen-grabbers
Observing customer data:
The defensive mechanisms to counter the phishing technique threats.
At the client-side, protection against phishing can be afforded by:
(Free market phishy apps online)