Safe Computing Practices
What is behind a cyber attack? 1
2
Phishing Example 1 - Red Flags 3
Phishing Example 2 – Spoofed Senders 4 s sent from a account!
Phishing Example 3 – Context and Links 5
Phishing Example 4 - Malicious Attachment 6
Scams – Common Attacks to Watch For Credit Card or Bank Scams: Often mimic common banks and card companies trying to entice a potential card folder to expose their user credentials or account information. PayPal Scams: Have become increasingly prevalent from fake offers of PayPal benefits to scams around account information. The goal of these is always to elicit account credentials. C-Level Scams: Attackers have increased their efforts targeting C-Level or management level individuals. These attacks often are singular in their target (spear phishing) and extremely well crafted. Managers should practice extra caution when exposing their credentials Vacation/Travel or Sales Scams: Traditionally done a spoofs of major travel or retail outlet firms but can be designed to look like any online store or company. These scams have the sole intent of taking the attacker to a fake web site for the harvesting of sensitive information such as credit card information. Tax/IRS Scams: Most common around the New Year and tax season, these scams come in many forms to entice the victim to expose sensitive data such as social security numbers. Phishing: Usually in the form of , a scam defrauding an online user of account, financial, or other sensitive information by posing as a legitimate source. Pharming: The act of redirecting traffic from a web site to a fake site for the purpose of defrauding the site users. 7
Malicious Downloads when-downloading-free-software/
Malicious Add-Ons and Plugins when-downloading-free-software/
Please Don’t Share Passwords 10
There’s no such thing as a free lunch USB storage key 2011: Ponemon Institute and Kingston Digital release a report showing 70% of businesses lost data due to USB sticks and 55% of those were due to malware infections. 2012: Two US Power Plants infected with malware from USB Drives 2014: Nohl & Lell identify a critical flaw in the design behind USB technology that allows for the introduction of malware. 11
Data Classification – What to Collect and How 12 ● ●
Resources on Information Security Policies: Privacy Policy =Confidentiality of Data Network Monitoring Policy = Protection of College Technology Resources Technical Incident Response Policy = Response to Information Security Events Data Classification Policy = Defines Data Types Red Flags Policy = Identity Theft Protection Not presently in hand book PCI Policy = Payment Card Data Handling Web Sites: Middlebury’s Information Security Phishing Information Protect Yourself On-line Parents Resource for Kids On-line Best Practices for Home and Work Best_Practices_Datasheets.pdf
Discussion and Links Please share your thoughts! Information Security Resources: Report Information Security Events To: