PHISHING full report
#1

PHISHING



an organisations customers into imparting their confidential information for nefarious use.
Riding on the back of mass-mailings such as Spam, or using ‘bots to automatically target
victims, any online business may find Phishers masquerading as them and targeting their
customer base. Organisational size doesn’t matter; the quality of the personal information
reaped from the attack has a value all in itself to the criminals.

PHISHING HISTORY

The word “phishing” originally comes from the analogy that early Internet criminals used email
lures to “phish” for passwords and financial data from a sea of Internet users. The use of “ph”
in the terminology is partly lost in the annals of time, but most likely linked to popular hacker
naming conventions such as “Phreaks” which traces back to early hackers who were involved
in “phreaking” – the hacking of telephone systems.
The term was coined in the 1996 timeframe by hackers who were stealing America Online
(AOL) accounts by scamming passwords from unsuspecting AOL users. The popularised first
mention on the Internet of phishing was made in alt.2600 hacker newsgroup in January 1996,
however the term may have been used even earlier in the popular hacker newsletter “2600”.

THE PHISHING THREAT

1. Social Engineering Factors
2. Phishing Message Delivery
3. IRC and Instant Messaging
4. Trojaned Hosts
5. Phishing Attack Vectors

PHISHING ATTACT VECTOR
1. Man-in-the-middle Attacks
2. URL Obfuscation Attacks
3. Cross-site Scripting Attacks
4. Preset Session Attacks
5. Observing Customer Data
6. Client-side Vulnerability Exploitation

PHISHING PREVENTION
1. Consistent Branding.
2. Monitor bounces to customer facing e-mail addresses.
3. Monitor referrers to public web sites.
4. Watermark web content.
5. Preposition countermeasures .
6. Organizational and Administrative Countermeasures .




Phishing-A Cyber Crime, the provisions of Information Technology Act, 2000

he phishing fraud is an online fraud in which the fraudster disguise themselves and use false and fraudulent websites of bank and other financial institutions, URL Links to deceive people into disclosing valuable personal data, later on which is used to swindle money from victim account. Thus, essentially it is a cyber crime and it attracts many penal provisions of the Information Technology Act, 2000 as amended in 2008 adding some new provisions to deal with the phishing activity. The following Sections of the Information Technology Act, 2000 are applicable to the Phishing Activity:



The Information Technology Act, 2000 makes penal provisions under the Chapter XI of the Act and further, Section 81 of the IT Act, 2000 contains a non obstante clause, i.e. “the provisions of this Act shall have effect notwithstanding anything inconsistent therewith contained in any other law for the time being in force”. The said non obstante clause gives an overriding effect to the provisions of the IT Act over the other Acts including the Indian Penal Code. The aforesaid penal provisions of the IT Act, 2000 which is attracted to the phishing scam are however been made bailable by virtue of Section 77B IT Act intentionally in view of the fact that there is always an identity conflict as to the correct or accurate identity of the person behind the alleged phishing scam and there is always a smokescreen behind the alleged crime as to the identity of the person who has actually via these online computer resources have or have not committed the offence and in view of the possible misuse of the penal provision for cyber offences as contained in the IT Act, the offence is made bailable.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: phishing seminar report with ppt, unamendable provisions, free seminar phishing report download, seminar report phishing, phishing seminar report 2012, phishing project report, seminar report on phishing techniques,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  ATM WITH AN EYE FULL REPORT seminar details 1 5,805 09-07-2016, 12:36 PM
Last Post: seminar report asees
  Authentication Schemes for Session Passwords using Color and Images full report seminar details 1 2,853 29-07-2015, 02:27 PM
Last Post: Guest
  AUTOMATIC PHASE CHANGER full report seminar paper 3 3,555 27-03-2015, 10:06 AM
Last Post: seminar report asees
  Wireless LAN Security FULL REPORT seminar details 3 5,143 06-11-2014, 09:23 PM
Last Post: seminar report asees
  BRAIN FINGERPRINTING full report project uploader 2 10,804 24-10-2014, 11:49 PM
Last Post: jaseela123d
  TERRORISM full report project uploader 2 2,309 08-05-2013, 10:17 AM
Last Post: computer topic
  MEMRISTOR FULL REPORT seminar details 1 3,468 25-01-2013, 12:02 PM
Last Post: seminar details
  Windows 8 FULL REPORT seminar paper 3 4,504 24-01-2013, 12:34 PM
Last Post: seminar details
  FIREWIRE full report seminar details 1 2,459 11-01-2013, 10:18 AM
Last Post: seminar details
  SOLAR POWER TOWER full report seminar details 1 2,348 30-11-2012, 01:39 PM
Last Post: seminar details

Forum Jump: