VirtualPrivateNetwork base on VPN Phishing.pptx

shivanshgupta2811 7 views 20 slides Aug 25, 2024
Slide 1
Slide 1 of 20
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20

About This Presentation

It is made for any class


Slide Content

DIGITAL CITIZENSHIP prepared by Piyush Gupta Class 8M

Virtual Private Network (VPN)

Virtual Private Network (VPN) VPNs are private data networks over public network – usually the Internet. VPNs extend corporate networks to remote offices, mobile users, telecommuters and other extranet partners. VPNs use advanced encryption and ‘tunneling’ technology to establish secure, end-to-end private network connections over Internet.

A typical VPN

VPN Solutions Remote access VPNs e stablish secure, encrypted connections between mobile or remote users and their corporate networks via a third-party network, such as a Internet Service Provider(ISP) - VPN client – software, hardware as well as router, or firewall based solutions available. - Reduced cost of long distance access calls and internal equipment inventory

VPN Solutions Site-to-Site VPNs are an alternative WAN infrastructure that used to connect branch offices, home offices, or business partners' sites to all or portions of a company's network. - Intranet VPNs provide full access to company’s network - Extranet VPNS provide business partners with limited access to a company’s network

VPN Technology Trusted VPNs – companies lease circuits from communication providers and use them in the same manner they use physical cables in a private LAN - Communication provider is ‘t rusted ’ for data integrity and security. - Used before Internet became universal

VPN Technology Secure VPNs use Internet as a corporate communication medium. Data is encrypted before sending, moved over to Internet, and then decrypted at the receiving end. - Encryption creates a security ‘tunnel’ that can’t be attacked - More desirable than Trusted VPNs

VPN Protocols IPSec – Internet standard protocol for tunneling. Encryption, and authentication. Layer2Tunneling Protocol (L2TP) – Provides a means for tunneling IP traffic in layer 2, encloses non-Internet protocols i.e. IPX, SNA, and AppleTalk inside IP envelope. Point-to-Point tunneling - proprietary Microsoft

Benefits of using VPN Lower costs – remote access costs have reduced by 80 percent while LAN-to-LAN connectivity costs is reduced by 20-40 percent. For companies just setting up their network VPN provides low-cost alternative to backbone equipment, in-house terminal equipment and access modems. Connectivity Improvements – VPN based links are easy and inexpensive ways to meet changing business demands.

PHISHING

INTRODUCTION Phishing is a form of cyberattack where attackers impersonate legitimate organizations or individuals to deceive people into revealing sensitive information, such as passwords, credit card numbers, or other personal data.

TYPES OF PHISHING Email Phishing Spear Phishing Whaling Vishing (Voice Phishing) Smishing ( SMS Phishing)

EMAIL PHISHING Meaning: Email phishing involves fraudulent emails that appear to come from trusted sources, aiming to steal sensitive information like passwords or credit card details. How It Works: Deceptive Emails: Imitate legitimate organizations . Malicious Links/Attachments: Contain harmful links or files. Urgent Requests: Create a false sense of urgency.

SPEAR PHISHING Meaning: Spear phishing targets specific individuals with personalized attacks to steal sensitive information . How It Works : Targeted Approach: Attackers research their victims, using personal information to craft convincing messages Customized Content: Emails or messages are tailored to the victim's role, interests, or connections. Malicious Intent: The goal is to gain access to sensitive data or systems

WHALING Meaning: Whaling phishing is a type of spear phishing targeting high-profile individuals like executives or key decision-makers within an organization . How It Works High-Value Targets: Focuses on senior leaders or important figures. Sophisticated Attacks : Uses highly personalized and convincing message Critical Requests: Often involves requests for sensitive company data or financial transactions

VISHING (VOICE PHISHING) Meaning: Vishing is a type of phishing attack conducted over the phone, where attackers impersonate legitimate entities to steal personal or financial information. How It Works Phone Calls: Attackers call victims, pretending to be from trusted organizations like banks or government agencies . Deceptive Requests: They may ask for sensitive information, such as account numbers or Social Security numbers . Urgency or Authority: Often use a sense of urgency or authority to pressure the victim.

SMISHING Introduction : Smishing is a type of phishing attack conducted via text messages (SMS) to deceive recipients into revealing personal or financial information. How It Works: Text Messages: Attackers send fraudulent SMS messages pretending to be from legitimate organizations . Malicious Links or Requests: The message often contains a link to a fake website or asks for sensitive information. Urgency or Threats: Messages may create a sense of urgency or threaten consequences to prompt immediate action.

How To Prevent It Always verify the person who is on the other side and verify links as well as e-mails Do not share any private information to anyone online even if its your well wisher Contact to police as soon as possible when you are trapped into phishing
Tags