Phishing.

Slides:



Advertisements
Similar presentations
ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
Advertisements

Fraud Protection. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Phishing Scams use spoofed s and websites as lures to prompt people to voluntarily hand over sensitive information Phishing s may contain.
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
What is identity theft, and how can you protect yourself from it?
David Abarca, Instructor Del Mar College Computer Corner Phishing, Pharming, Spear-Phishing, and now…. Vishing.
Phishing and Pharming New Identity Theft Threats Presentation by Jason Guthrie.
Internet Phishing Not the kind of Fishing you are used to.
Hey check out this cool PHISHING presentation! Benjamin Ross Lyerly.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Internet Fraud By Jessica Habermehl &Ally Erwine Period 9.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
PHISHING FINANCIAL THREATS ON THE INTERNET -Alisha Esshaki 8a.
P HI SH I NG !. WHAT IS PHISHING ? In computer security phishing is trying to acquire important information such as; passwords, usernames and credit card.
Preventing Identity Theft in Aspen Falls Helping citizens protect themselves IdentityTheft.
What is Social Engineering. Pretexting Pretexting is the act of creating and using an invented scenario called the Pretext to persuade a target to release.
Scams & Schemes Common Sense Media.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Phishing, Spoofing, Spamming and Security How To Protect Yourself Additional Credits: Educause/SonicWall, Hendra Harianto Tuty, Microsoft Corporation,
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
How Phishing Works Prof. Vipul Chudasama.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
Phishing and online fraud What parents need to know.
INTRODUCTION & QUESTIONS.
Staff addresses Availability tradeoffs December 13, 2012.
PHISHING PRESENTED BY: ARQAM PASHA. AGENDA What is Phishing? Phishing Statistics Phishing Techniques Recent Examples Damages Caused by Phishing How to.
Sources of Network Intrusion Security threats from network intruders can come from both internal and external sources.  External Threats - External threats.
FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    1 Overall Classification of this Briefing is UNCLASSIFIED//FOUO Phishing.
Safe Computing Practices. What is behind a cyber attack? 1.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
In this tutorial, you will be shown security considerations that you should keep in mind while accessing or using any GW systems, including GWeb. Remember.
Cyber security. Malicious Code Social Engineering Detect and prevent.
Important Information Provided by Information Technology Center
Objectives Define phishing and identify various types of phishing scams Recognize common baiting tactics used in phishing scams Examine real phishing messages.
A Student’s Guide to Proper and Safe Web Behavior
Media education: from passive consumers to active creators
Fraud Protection.
An Introduction to Phishing and Viruses
Fraud protection.
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
how to prevent them from being successful
Learn how to protect yourself against common attacks
Digital Citizenship Middle School
Social Engineering Charniece Craven COSC 316.
Information Security and Privacy Pertaining to Phishing and Internet Scams Brian Corl COSC 316 Information Security and Privacy.
I S P S loss Prevention.
A Student’s Guide to Proper and Safe Web Behavior
Cyber Security Awareness Workshop
Phishing is a form of social engineering that attempts to steal sensitive information.
Internet Fraud By (NAMES).
Cybersecurity Awareness
IT Security awareness Training.
Information Security Session October 24, 2005
Personal IT Security Cyber Security – Basic Steps
DON’T GET HOOKED! YOU MAY BE UNAWARE BUT YOU ARE A PHISHING TARGET FOR CYBER CRIMINALS. A. Unknown sender address B. Offer too good to be true &
If I’d only known then what I know now about phishing…
Protecting Senior Citizens from Phishing s
Phishing Don’t fall for fake
Security Hardening through Awareness August 2018
Social Engineering Humans are often the weakest point in security
What is Phishing? Pronounced “Fishing”
Phishing “In computing, phishing (also known as carding and spoofing) is a form of social engineering, characterized by attempts to fraudulently acquire.
Spear Phishing Awareness
Phishing 101.
Presentation transcript:

Phishing

What is Phishing

What is Phishing The process where a targeted individual is contacted by email by someone posing as a legitimate institution to lure the individual into providing sensitive information such as banking information, credit card details, and passwords

Phishing Email

Phishing Email

Spear-Phishing Messages appear to come from a trusted source. Phishing messages usually appear to come from a large and well-known company or website with a broad membership base. This technique has raised e-scams to a new level and has lately become the go-to choice for many attacks threatening individuals and businesses.

Spear-Phishing

Phishing Phishers can only find you if you respond. Please note that you are the most effective way to detect and stop phishing. Remember, if something looks too good to be true, it probably is. Legitimate organizations will not ask you for your personal information.

Phishing Indicators

What should you do If you identify an email you think is a phishing attack, or you are concerned you may have fallen victim, contact the service desk at x4357 or email us at itsecurity@brocku.ca Forward email to phish@office365.microsoft.com And delete it from your mailbox

What we do

Phishing IQ Test https://www.sonicwall.com/phishing/

Security Awareness Campaign https://brocku.ca/information-technology/security/

Questions