Information Security Session October 24, 2005

Slides:



Advertisements
Similar presentations
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Advertisements

Phishing Scams use spoofed s and websites as lures to prompt people to voluntarily hand over sensitive information Phishing s may contain.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
1 Identity Theft and Phishing: What You Need to Know.
Protect Yourself Against Phishing. The good news: The number of US adult victims of identity fraud decreased from 9.3 million in 2005, to 8.4 million.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
What is identity theft, and how can you protect yourself from it?
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Hacker’s tricks for online users to reveal their sensitive information such as credit card, bank account, and social security. Phishing s are designed.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Phishing and Pharming New Identity Theft Threats Presentation by Jason Guthrie.
Don’t Lose Your Identity – Protect Yourself from Spyware Dan Frommer Sherry Minton.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
How It Applies In A Virtual World
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
CCT355H5 F Presentation: Phishing November Jennifer Li.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
BY JESSICA SCHOLEY p1. Id Fraud Is When Someone Pretends To Be Someone Else Using There Address, Birthday And Other Information. People Also Use Id Fraud.
Cybersecurity Test Review Introduction to Digital Technology.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Fall Phishing - attempt to acquire sensitive information, like bank account information or an account password, by posing as a legitimate entity.
Important Information Provided by Information Technology Center
Internet Safety.
Lesson 10A: The Three D’s of Identify Theft
Protecting Your Assets By Preventing Identity Theft
Protecting Your Credit Identity
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Scams & Schemes Common Sense Media.
Done by… Hanoof Al-Khaldi Information Assurance
Learn how to protect yourself against common attacks
IT Security  .
Unit 4 IT Security.
Digital Citizenship Middle School
ISYM 540 Current Topics in Information System Management
Protecting Your Identity:
Information Security and Privacy Pertaining to Phishing and Internet Scams Brian Corl COSC 316 Information Security and Privacy.
Unit 4 IT Security.
I S P S loss Prevention.
Information Security 101 Richard Davis, Rob Laltrello.
Social Media Cybersafety.
Protect Your Computer Against Harmful Attacks!
How to Protect your Identity Online PIYUSH HARSH
Protecting Yourself Keeping Your Secrets Secret November 11, 2004
Cybersecurity Awareness
Scams, Identity Theft, and Viruses Kelly & Caitlin
Information Security Session October 23, 2006
Protecting Yourself from Fraud including Identity Theft
HOW DO I KEEP MY COMPUTER SAFE?
Bethesda Cybersecurity Club
Protecting Your Credit Identity
Being Aware of What You Share
Security in mobile technologies
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Cybersecurity Simplified: Phishing
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Information Security Session October 24, 2005 11/10/2018 Information Security Session October 24, 2005 Bill Eaheart Network Security Coordinator DePaul University NIDS with Snort

What is spam? Email advertising for some product or service Unsolicited Commercial Email (UCE) Electronic version of junk mail Not necessarily virus or malware 11/10/2018 Information Security

How do ‘spammers’ get my email? 11/10/2018 How do ‘spammers’ get my email? Harvesting WebPages Harvesting Newsgroups Guessing Buying lists from other spammers or companies From a mailing list By people themselves Other ways 11/10/2018 Information Security NIDS with Snort

Can you limit the amount of spam? Don't give your email address out arbitrarily Check privacy policies Be aware of options selected by default. Use filters Don't follow links in spam messages Disable the automatic downloading of graphics in HTML mail Consider opening an additional email account. Don't spam other people 11/10/2018 Information Security

What is ‘Phishing’? Scam to steal valuable information – Online Fraud Attacks use ‘spoofed’ emails and fraudulent websites Designed to fool users into divulging personal data – credit card numbers, user ID’s, passwords and social security numbers. Hijack trusted brands of well-known banks, retailers and credit card companies Anti-Phishing Working Group – Up to 5% success rate 11/10/2018 Information Security

Why is ‘Phishing’ so popular? Effective Social Engineering Technique for manipulating people to disclose sensitive information People trust information in emails or websites Simple for people to disguise email addresses and location of websites 11/10/2018 Information Security

Gartner Study STAMFORD, Conn., June 23, 2005 — Increasing reports of lost consumer data files and disclosures of unauthorized access to sensitive personal data are taking a toll on consumers' confidence in online commerce, according to Gartner Inc., the world's largest technology research and advisory firm. A Gartner survey of 5,000 U.S. adults showed that phishing attacks grew at double-digit rates last year in the United States. In the twelve months ending in May 2005, an estimated 73 million U.S. adults who use the Internet said they definitely, or think, they received an average of more than 50 phishing e-mails in the past year. 2.4 million online consumers report losing money directly because of the phishing attacks. Of these, approximately 1.2 million consumers lost $929 million during the year preceding the survey. Survey participants indicated most of the money stolen was repaid by banks and credit cards. 11/10/2018 Information Security

How do I spot a Phishing scam? Attempt to grab your attention Suspicious email Can be difficult to tell without research Closely resembles website – same graphics 11/10/2018 Information Security

Examples 11/10/2018 Information Security

Examples – Bank of America Phish Target: Bank of America customers Spoofed Sender: Online Banking Notice<5thvtc@alert.bankofamerica.com> Goal: Bank Username/Password and ATM card information Visible Link: ‘Sign in to Online Banking’ www.bankofamerica.com : 171.159.193.173 Phish site IP Address: 216.119.179.191 11/10/2018 Information Security

Recommended Steps Use Caution/Common Sense - Be suspicious of emails asking for sensitive information Reputable organizations will not request information through email Never respond to an email for personal information Never follow the links in an email you suspect might be phishing Use a browser to type in the site mentioned in the e-mail Check to see if the site has an announcement about phishing attacks targeting it. Check to see if the privacy policy of the website has a policy about collecting private data. If you determine that a website is legitimate, make sure it encrypts your data by using SSL. 11/10/2018 Information Security

How do I report Phishing scams Federal Trade Commission http://www.consumer.gov/idtheft FBI's Internet Fraud Complaint Center http://www.ifccfbi.gov/index.asp Attacks targeting DePaul University abuse@depaul.edu 11/10/2018 Information Security

Additional Information If you think you are a victim to a phishing scam: http://www.antiphishing.org/consumer_recs2.html Anti-Phishing Work group http://www.antiphishing.org/ Microsoft Video: Phishing and Identity Theft http://www.microsoft.com/athome/security/email/phishing/video1.mspx 11/10/2018 Information Security

The End! Thank you Any questions weaheart@depaul.edu 11/10/2018 Information Security