Phishing, what you should know

Slides:



Advertisements
Similar presentations
Phishing, what you should know L kout Initiative.
Advertisements

Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
You are responsible for security of your internet banking transactions ONLINE.
Phishing, what you should know L kout Initiative Office of Information Technology.
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Keeping Your Identity Your Own Amy Ginther, Project NEThics Coordinator OIT Town Meeting August 24, 2005.
1 Identity Theft and Phishing: What You Need to Know.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Bsharah Presentation Threats to Information Security Protecting Your Personal Information from Phishing Scams.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Internet Phishing Not the kind of Fishing you are used to.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
How It Applies In A Virtual World
STAY SAFE ONLINE. STAY SAFE ONLINE! PLEASE MAKE SURE YOU LOGIN AT THE CORRECT BANK URL / ADDRESS 1.NEVER LOGIN VIA LINKS 2.NEVER REVEAL YOUR PIN.
Social Engineering Training. Why Social Engineering Training? The Department of Energy (DOE) authorized the Red Team to perform vulnerability assessments.
Scholarship Scams Avoiding Scholarship Scams, Phishing & Identity Theft at All Cost.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Day 3 Cybersafety Presented by FJUHSD Teacher Librarian.
Cybersafety.
Reliability & Desirability of Data
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
Information Security Sharon Welna Information Security Officer.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
How Phishing Works Prof. Vipul Chudasama.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
PHISHING PRESENTED BY: ARQAM PASHA. AGENDA What is Phishing? Phishing Statistics Phishing Techniques Recent Examples Damages Caused by Phishing How to.
Fraud, scams and commercial exploitation. The dangers Children are still generally quite trusting and uncritical about what they read online They are.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
JANELL LAYSER Training Manual. AWARENESS! Social Engineers are out there, and everyone should be prepared to deal with them! They can contact you by phone,
Fall Phishing - attempt to acquire sensitive information, like bank account information or an account password, by posing as a legitimate entity.
PHISHING A Melbourne Athenaeum Library Cybersafety Information Guide
Important Information Provided by Information Technology Center
Internet Safety.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Hacking Computer crime and cyber security.
Phishing, identity theft, and more
Done by… Hanoof Al-Khaldi Information Assurance
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
Learn how to protect yourself against common attacks
Unit 4 IT Security.
ISYM 540 Current Topics in Information System Management
Lesson 3 Safe Computing.
Working with Google Applications Gmail, a popular
Information Security and Privacy Pertaining to Phishing and Internet Scams Brian Corl COSC 316 Information Security and Privacy.
I S P S loss Prevention.
Information Security 101 Richard Davis, Rob Laltrello.
FJUHSD Teacher Librarian
Phishing is a form of social engineering that attempts to steal sensitive information.
Social Media Cybersafety.
Protect Your Computer Against Harmful Attacks!
Cybersecurity Awareness
Protecting Your Identity:
Phishing.
Protecting Yourself from Fraud including Identity Theft
HOW DO I KEEP MY COMPUTER SAFE?
9 ways to avoid viruses and spyware
Internet Safety – Social Media
What is Phishing? Pronounced “Fishing”
Presentation transcript:

Phishing, what you should know Office of Information Technology “Lkout” Initiative Phishing, what you should know

Important Note The information published hereafter is just a collection of selected IT industry best practices and tips that might assist you in improving the security levels against computer related threats while exercising your computing activities. The information published hereafter is not meant in any way to provide a comprehensive solution nor to ensure full protection against computer related threats.

What is Phishing? Phishing is a form of social engineering that is executed via electronic means and can lead to identity theft and fraud.

Social Engineering A social engineer is a polite cracker!! A social engineer is a person who will deceive or con others into divulging information that they wouldn’t normally share (credit card numbers, bank account information, passwords…etc.). He/she will build inappropriate trust relationship with insiders.

Social Engineering He/she may seem: Unassuming and respectable Possibly claiming to be a new employee, repair person, or researcher and even offering credentials to support that identity. Social Engineers use these techniques: Appeal to vanity Appeal to authority Appeal to old-fashioned eavesdropping

Social Engineering Human Based: In Person. Third-party authorization: The social engineer obtains the name of someone who has the authority to grant access to information. Impersonation: A social engineer might impersonate any character and use certain privileges.

Social Engineering Electronic Based: Targeted e-mail messages Spam, chain letters and hoaxes E-mail attachments Pop windows Spoofed Websites Instant Messaging and Chat rooms Cell phone text messages (SMS) (details in slides ahead)

Phishing: Real Life Example 1 - AUB

Phishing: Real Life Example 1 - AUB

Phishing: Real Life Example 2 - AUB

Phishing: Real Life Example 2 - AUB

Phishing: Real Life Example 3 - Common Tricks Same old story, but a different version

Phishing: Real Life Example 4 - Silly Reasoning Yeah, right

Phishing: Real Life Example 5 - Fake Sites This one is Easy! This is not eBay site but a fake One.

Phishing: Real Life Example 6 - Tricky URLs

Phishing: Real Life Example 6 - Tricky URLs

Phishing: Real Life Example 7 - Spyware

How to Avoid Becoming a Phishing Victim? IMPORTANT NOTICE - EMAIL ALERT Rule 1: NEVER provide your PASSWORD to anyone Rule 2: AUB staff will NEVER request your PASSWORD via email You may have read or heard of fraudulent e-mails that encourage recipients to provide their personal details such as user names and passwords. At AUB, we will never request your password via e-mail. If you receive such an e-mail request, please delete it immediately.

How to Avoid Becoming a Phishing Victim? Phishers’ emails are typically NOT personalized, while valid messages from your bank or e-commerce company generally are. Phishers typically include upsetting (usually a threat) information to get people to react immediately (i.e., claiming they will shut off your account). Is it that urgent?

How to Avoid Becoming a Phishing Victim? Phishers typically include exciting (but false) statements in their e-mails or pop ups to entice people to access their web sites, i.e. claiming that you have won a prize, lottery or inherited wealth. Never respond to requests for personal or confidential information via email. When in doubt: Call the institution that claims to have sent you the email. Login to their web site by typing their address at the browser address bar. Does this sound too good to be true? Who is this person?

How to Avoid Becoming a Phishing Victim? If you suspect the message might not be authentic, don't use the links within the email to get to a web page, the web page can be spoofed. Never fill out forms in email messages that ask for confidential information, you should only communicate confidential information via a secure website.

How to Avoid Becoming a Phishing Victim? Always ensure that you're using a secure website when submitting credit card or other sensitive information via your web browser. Check the beginning of the Web address in your browsers address bar - it should be ‘https://’ rather than just ‘http://’ Look for the locked padlock icon on your browser (IE; Netscape/Mozilla)

How to Avoid Becoming a Phishing Victim? Never continue to a secure web site that has a problem with its security certificate. Internet browsers do present the user with an error message (example: IE7 message below).

How to Avoid Becoming a Phishing Victim? Regularly check your bank, credit and debit card statements to ensure that all transactions are legitimate and if anything is suspicious, contact your bank and all card issuers Ensure that your browser and OS software is up-to-date and that security patches are applied (Example: MS Outlook signatures of spam e-mails) Ensure antivirus and anti-spyware software is installed and current.

How to Avoid Becoming a Phishing Victim? Ensure that your browser phishing filter is turned ON. Example: IE7 phishing filter controls.

What to do if you Suspect a Phishing e-mail? Stop, never reply, or use any of the URL links embedded in the body, or open attachments, or fill in online forms embedded in the e-mail body. Report to IT: spam@aub.edu.lb

What to do if you Think you were a Victim? If you believe you might have revealed sensitive AUB information or might have revealed information that could be used for identity theft or fraud, contact auditor@aub.edu.lb.

Test your Phishing IQ Check this Website: http://survey.mailfrontier.com/survey/quiztest.html See website put example

Acknowledgements Office of Information Technology team Work-Study students: Marwa Abdul Baki Donna Bazzi Comic strips are reproduced with permission. Please visit www.securityCartoon.com for more material. www.CartoonStock.com