MITS5004 Assignment 1: Phishing Attacks Presentation

Verified

Added on  2022/10/04

|11
|653
|328
Presentation
AI Summary
This presentation provides a comprehensive overview of social engineering attacks, focusing specifically on phishing attacks. It explains the manipulation tactics used by attackers to obtain personal information, differentiating between spoofing emails and legitimate communications. The presentation delves into various types of phishing attacks, including spoofing emails, fake accounts, hacking, and Trojan horses, illustrating how attackers exploit system vulnerabilities. Furthermore, it outlines several prevention strategies, such as spoofed email detection using DMARC, fake account detection through awareness, and hacking detection through password security. The presentation also highlights techniques for detecting Trojan horses and emphasizes the importance of caution when downloading files. Various detection methods, including SURF, SEAD, Anti Phishing tools, and authentication algorithms, are also discussed. The conclusion emphasizes the critical need for awareness and knowledge of these attacks to protect against social engineering and phishing threats.
Document Page
Social engineering
attacks:
Phishing Attacks
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Social engineering attacks
Social engineering is a kind of art where there will be a great
manipulation of data of all those who will be having very less knowledge
about several attacks.
There are several ways with the help of which hackers trick a number of
people for opening the information by using the social engineering
attacks.
Document Page
Phishing attacks
It is basically a cybercrime where various attackers will be hugely
manipulating a number of people by obtaining a lot of personal
information.
It is very much difficult to differentiate between the spoofing mail and
the legitimate mail.
The spoofing mail may be causing a lot of harm to that of the
authentication of several users.
Document Page
Types of phishing attacks
Spoofing email
Fake accounts
Hacking
Trojan horse
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Types of phishing attacks(Cntd)
Spoofing email: This is a type of phishing attack and spoofing occurs
when any spammer will send any kind of email by using some other
email address.
Fake accounts: Fake accounts created by the attackers uses those
accounts for obtaining access of several personal and secret data of
various users.
Hacking: It is a kind of technical effort for the manipulation of the access
of the system or some other resources. The hackers utilizes scanner to
scan a number of computer systems upon a network for all the known
weaknesses.
Trojan horse: It is a kind of deliberate threat to the system’s security. It
can also be considered as an executable program. It is rather a code
mainly designed for getting control over the total system.
Document Page
Prevention of Phishing Social
Engineering Attack
Spoofing email
Fake accounts
Hacking
Trojan horse
Document Page
Prevention of Phishing Social
Engineering Attack(Contd…)
Spoofed email detection: Direct blocking several emails which will be
malicious before reaching any customer by DMARC by the organization.
Trusting on the display name must be stopped.
Fake account detection: Maintaining a kind of fixed awareness regarding
what will be shared and posted. There must also be awareness of the
media as well.
Hacking detection: The password must be kept secret and password must
be changed immediately if any access is provided to someone else for a
while.
Trojan horse detection: Being careful while downloading any file online. Any
file obtained from any friend must be checked as it may be carrying a
number of Trojans which can spread up in the friend list by using email’s
address book.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Other Techniques of detection
SURF
SEAD
Anti Phishing tool
Authentication
Algorithm of Link Guard
Ontological model
Document Page
Conclusion
It can be concluded that through the attack of social engineering there is
a great manipulation of various users. The phishing is very much difficult
to detect as people remain unaware of it. All the various techniques as
well as processes are to be well known for dealing with such attacks.
Document Page
References
[1]J.A., Chaudhry, S.A., Chaudhry & R.G. Rittenhouse, Phishing attacks
and defenses. International Journal of Security and Its
Applications, 10(1), 247-256, 2016.
[2]N.Y., Conteh & P.J. Schmick, Cybersecurity: risks, vulnerabilities and
countermeasures to prevent social engineering attacks. International
Journal of Advanced Computer Research, 6(23), 31, 2016.
[3]W. Fan, L., Kevin & R. Rong, Social engineering: Ie based model of
human weakness for attack and defense investigations. IJ Computer
Network and Information Security, 9(1), 1-11, 2017.
[4]K. Jansson & R. von Solms, Phishing for phishing
awareness, Behaviour & information technology, 32(6), 584-593, 2013.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Thank you
chevron_up_icon
1 out of 11
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]