JANELL LAYSER Training Manual. AWARENESS! Social Engineers are out there, and everyone should be prepared to deal with them! They can contact you by phone,

Slides:



Advertisements
Similar presentations
What Are Scams? Scams are designed to trick you into giving away your money or your personal details. Scams come to you in many forms – by mail, ,
Advertisements

Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
Fraud Protection. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
Social Engineering Training. Training Goals Increase Laboratory Awareness. Provide the tools required to identify, avoid and report advanced Social Engineering.
Kelly Corning Julie Sharp.  Human-based techniques: impersonation  Computer-based techniques: malware and scams.
Social Network Security Issues: Social Engineering and Phishing Attacks Jeffrey Allen, Leon Gomez, Marlon Green, Phillip Ricciardi, Christian Sanabria.
Friday June 6, 2014 OBJ: SWBAT understand what identity theft is, what the consequences are, and how to prevent it. Drill: What statement is this cartoon.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
The Art of Social Hacking
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
What is identity theft, and how can you protect yourself from it?
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
SECURITY AND SOCIAL ENGINEERING US Department of Commerce Office of Security Updated 09/26/11 Security is Everyone's Responsibility – See Something, Say.
Social Engineering J Nivethan. Social Engineering The process of deceiving people into giving away access or confidential information Onlinne Phone Offline.
Social Engineering Networks Reid Chapman Ciaran Hannigan.
Network & Computer Security Training.  Prevents unauthorized access to our network and your computer  Helps keep unwanted viruses and malware from entering.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
1 Social Engineering Dr.Talal Alkharobi. 2 Social Engineering - Definition Webster — management of human beings in accordance with their place and function.
Social Engineering PA Turnpike Commission. “Social Engineering is the practice of obtaining confidential information by manipulation of legitimate users”
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
IDENTITY THEFT What it is & how to prevent it. What is identity theft?  Identity theft happens when someone steals your personal information & uses it.
Social Engineering Training. Why Social Engineering Training? The Department of Energy (DOE) authorized the Red Team to perform vulnerability assessments.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Washington State Department of Financial Institutions “Regulating financial services to protect and educate the public and promote economic vitality.”
Preventing Identity Theft in Aspen Falls Helping citizens protect themselves IdentityTheft.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
IT security By Tilly Gerlack.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
PHYSICAL ITSECURITY scope. 1.What is password security?. 2.Why can't I tell anyone my password? 3.What about writing my password down 4.Social engineering.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
By: Bonnie Vo Identity Theft Identity theft is the possession of another person’s personal information for criminal purposes. Identity Theft: What is.
Jeff loses his identity! Lesson 8: Identity Theft.
Identity Theft How it happens and how to avoid it.
Review Internet Safety. Definition Phishing is fishing for personal and financial information disguised at legitimate business .
Protecting Your Assets By Preventing Identity Theft 1.
Sources of Network Intrusion Security threats from network intruders can come from both internal and external sources.  External Threats - External threats.
Do you know who you’re dealing with? Social Engineering: Minimise the risk of becoming a victim.
Designed By: Jennifer Gohn.  “Getting people to do things they wouldn’t ordinarily do for a stranger” –Kevin Mitnick  There are several different.
Jeff loses his identity! Lesson 5: Identity Theft.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
Cyber security. Malicious Code Social Engineering Detect and prevent.
Fall Phishing - attempt to acquire sensitive information, like bank account information or an account password, by posing as a legitimate entity.
Social Engineering: The Human Element of Computer Security
Fraud Protection.
Fraud protection.
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
SOCIAL ENGINEERING.
Social Engineering Charniece Craven COSC 316.
Information Security.
Social Engineering: The Art of Manipulation
Phishing is a form of social engineering that attempts to steal sensitive information.
Cybersecurity Awareness
IT Security awareness Training.
Robert Leonard Information Security Manager Hamilton
Mary Kummer Jim McNall PRIMA Spring Training 2018
Protecting Your Identity:
Don’t Get Scammed on Your Way to College and Avoiding Identity Theft
Protecting Your Credit Identity
What is Phishing? Pronounced “Fishing”
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

JANELL LAYSER Training Manual

AWARENESS! Social Engineers are out there, and everyone should be prepared to deal with them! They can contact you by phone, or through or other online sites, as well as in person! If you know the signs, and are properly trained, you CAN stop social engineers! Social Engineering: -The act of manipulating people into performing actions or divulging confidential information, rather than by breaking in or using technical cracking techniques. 3 Common Techniques Social Engineers use: 1. Pretexting: the act of creating and using an invented scenario to engage a targeted victim in a manner that increases the chance the victim will divulge information or perform activities that would be unlikely in ordinary circumstances. 2. Diversion theft: The objective is to persuade the person responsible for a legitimate delivery that the consignment is requested elsewhere. 3. Phishing: a technique to gain private information. The phisher sends an pretending to be from a legitimate company, requesting “verification” of information and warning of some dire consequence if it is not provided. *However there are many more scams!

Awareness Social Engineers use their excellent social skills to obtain the information they want. He/she may sound polite, respectable, friendly and overall trusting. They may try to act like a new employee, repair person, researcher, or an employee that’s under stress. They may even offer credentials to support that identity. They will study your company and know the inside lingo, and may know other employees names and/or managers name and phone number. BUT- DON’T LET THEM FOOL YOU!!!

PREVENTION! All employees should be properly trained!! Do NOT trust anyone! You never know really know who the person is on the phone/internet! Always get verification before giving out private/personal information! Trust your instincts! It’s better to be safe, than sorry! Be suspicious of anyone asking about employees or other internal information. If he claims to be from a certain company, try to verify his identity directly with the company. Do not provide any internal information, or any personal or financial information

Stopping Social Engineers Anyone entering the building, must have ID badge, if not they are not allowed on the property. ID must be checked and verified. NO EXCEPTIONS! All financial and other important documents must be locked in a file drawer. (Keys to drawer must always be put back in it’s proper place) All documents with personal or company information must be shredded before throwing away. Always keep dumpsters locked. Never give out user names and definitely never passwords! Passwords should be changed often, and you should be the only one who knows it.

ACTION! Mistakes happen, and social engineers are good at their job! It is extremely easy to be tricked by them! If you do fall for their scam, report it immediately! If you think you leaked out personal or private information to a social engineer, report it right away. Report it to the appropriate people. (managers, network administrators, owners) They can then be alert for any suspicious or unusual activity If concerned about financial accounts, contact your financial institution immediately and close any accounts. Watch for any charges to your account that you did not do.

Responding to Social Engineering Attacks If you think you are on the phone with a social engineer, do not give them any information. Alert your manager, or a member of the Incident Response Team (IRT). Also, notify other employees, for they may be contacted by the same person. The IRT will then be in charge from there, trying to track them down.

WE CAN PROTECT OURSELVES FROM SOCIAL ENGINEERS! BE SMART & RESPONSIBLE!