CS -3
CS -3
CS -3
Phishing is a cyber attack where hackers or cybercriminals try to steal your personal information
like passwords, credit card details, or bank account data. They typically use emails or messages
disguised as legitimate sources (banks, websites) to trick you into revealing this information.
● Email Phishing: Sending fraudulent emails that mimic legitimate businesses to trick
recipients into clicking malicious links or downloading harmful attachments.
● Spear Phishing: A more targeted approach where attackers research specific
individuals or organizations before crafting personalized phishing attempts.
● Whaling: A high-profile form of spear phishing that targets top-level executives within
organizations.
● Smishing: Similar to phishing but conducted through SMS text messages.
● Vishing: Phishing attacks carried out over the phone using voice communication.
● Clone Phishing: Creating fraudulent emails that closely resemble legitimate ones to
deceive recipients.
Prepared By : Mayank Yadav Cyber Security
● Email Phishing: The most common, sending mass emails impersonating legitimate
sources.
● Spear Phishing: Targets a specific individual or organization with personalized emails.
● Whaling: Targets high-level executives with urgent requests to pressure them into
mistakes.
● Smishing: Uses SMS text messages instead of emails, containing malicious links or
phone numbers.
● Vishing: Voice phishing, with attackers calling you impersonating trusted sources.
● Clone Phishing: Copies legitimate emails with slight changes, redirecting you to fake
websites.
1. Pretexting: This involves creating a believable scenario to gain trust and extract
information. Attackers might pose as IT support, bank representatives, or even family
members to deceive victims.
2. Baiting: This technique involves offering something desirable to entice victims to
compromise their security. It could be a USB drive labeled "Confidential" or a promise of
free software.
3. Phishing: The most common form, phishing involves sending fraudulent emails or
messages designed to mimic legitimate organizations. These messages often contain
malicious links or attachments.
4. Spear Phishing: A more targeted approach where attackers research specific
individuals or organizations to craft personalized phishing attacks.
5. Whaling: A high-profile form of spear phishing targeting top-level executives.
Prepared By : Mayank Yadav Cyber Security
6. Smishing and Vishing: These are variations of phishing using SMS text messages
(smishing) or voice calls (vishing).
7. Quid Pro Quo: This involves offering something in exchange for information. For
instance, an attacker might offer technical support in exchange for remote access to a
computer.
8. Tailgating: This physical access technique involves following someone into a secure
area without authorization.
● Urgency and Fear: Attackers often create a sense of urgency or fear to pressure victims
into making hasty decisions.
● Authority and Trust: They may impersonate authority figures or leverage trusted
relationships to gain credibility.
● Curiosity and Greed: Exploiting human curiosity, attackers might offer enticing rewards
or exclusive information.
● Intimidation: Some attacks use threats or intimidation to coerce victims into compliance.
Prevention Measures
⭐ Define Identity Theft and Explain how it can impact Individuals and
Businesses.
Identity theft is the unauthorized use of someone else's personal information to commit fraud or
other crimes. This sensitive information can include names, Social Security numbers, credit card
numbers, and birth dates.
Impact on Individuals
The consequences of identity theft for individuals can be devastating and far-reaching:
● Financial Loss: This is the most immediate and obvious impact. Thieves can run up
debts, open new credit accounts, and drain existing ones.
● Damaged Credit Score: Unauthorized accounts and late payments can severely damage
a victim's credit score, making it difficult to obtain loans, mortgages, or even
employment.
● Time-Consuming Recovery: Resolving identity theft issues can be a lengthy and
stressful process, involving numerous phone calls, paperwork, and disputes with
creditors.
● Emotional Distress: Victims often experience feelings of frustration, anger, and violation.
The stress of dealing with the aftermath can take a toll on mental health.
● Risk of Fraud and Blackmail: Stolen identities can be used for further criminal activities,
putting victims at risk of additional financial loss or even physical harm.
Prepared By : Mayank Yadav Cyber Security
Impact on Businesses
● Financial Loss: Unauthorized transactions, fraudulent claims, and chargebacks can lead
to substantial financial losses.
● Reputational Damage: A data breach or identity theft incident can damage a company's
reputation, leading to loss of customer trust and business.
● Legal Consequences: Businesses can face legal liabilities, fines, and lawsuits due to
data breaches and identity theft.
● Increased Costs: Investigating and resolving identity theft cases can be expensive,
including legal fees, credit monitoring, and customer support.
● Operational Disruptions: Identity theft can disrupt business operations, as resources are
diverted to handle the aftermath of the incident.
● Phishing: Deceiving individuals into revealing personal data through fraudulent emails or
websites.
● Data Breaches: Hacking into company databases to steal customer information.
● Dumpster Diving: Searching through trash for discarded documents containing personal
information.
● Shoulder Surfing: Observing individuals entering personal information in public places.
● Skimming: Using electronic devices to capture credit card information.
● Mail Theft: Stealing mail containing bills, credit card statements, or pre-approved credit
offers.
Both individuals and businesses can take steps to prevent and mitigate the risks of identity theft:
Identity theft, or identity fraud, occurs when someone steals and uses another person's
personal information to commit fraud. This sensitive information can include names, Social
Security numbers, credit card numbers, and birth dates.
● Criminal Identity Theft: The perpetrator falsely assumes the victim's identity to avoid
legal consequences.
● Senior Identity Theft: Individuals aged 60 or older are often targeted for their life
savings and retirement funds.
● Driver's License Identity Theft: Thieves use stolen driver's license information to open
new accounts or commit other crimes.
● Medical Identity Theft: Perpetrators use victims' health insurance information to obtain
medical services or prescription drugs.
● Tax Identity Theft: Criminals file fraudulent tax returns to receive refunds.
● Social Security Identity Theft: Thieves use stolen Social Security numbers to commit
various financial crimes.
● Synthetic Identity Theft: A combination of real and fake information is used to create a
new identity.
● Financial Identity Theft: The most common type, involving the misuse of financial
accounts and credit cards.
Prepared By : Mayank Yadav Cyber Security