THE DHS PHISHING IQ TEST PART 1 LEGITIMATE EMAIL V PHISHING EMAIL How do you know if an email is legitimate, or is a phony, phishing email? Take the.

Slides:



Advertisements
Similar presentations
Developed by Technology Services 1:1 Laptop Initiative
Advertisements

Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
My System Profile and Password Reset Instructions PART 1 For every Core-CT User ID follow these steps to use the Automated Password Reset feature: 1.Log.
THE DHS PHISHING IQ TEST PART 2 LEGITIMATE V PHISHING How do you know if an is legitimate, or is a phony, phishing ? Take the.
Cisco Confidential 1 © Cisco and/or its affiliates. All rights reserved. Last Updated: April 2014 Instructions for Navigating in the Training.
Employee Self Service (ESS) Registration
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Phishing Scams use spoofed s and websites as lures to prompt people to voluntarily hand over sensitive information Phishing s may contain.
REQUESTING TRANSCRIPTS Student Training Presentation.
How to stay safe online A guide for students. e-Safety e-Safety relies on selecting appropriate privacy levels, knowing how to behave online and understanding.
Industrial Process Learning Management System (LMS) User Guide How to self register, browse our course catalog, view our training schedule, and purchase.
Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
e-safety and cyber bullying
Facebook for RSVP’ers You can do it!. What Questions Do You Have? What are you wanting to learn at this training?
What do I need to know?.   Instant Messages  Social Networking.
Basics: Getting Started Uploading and Sharing Videos on YouTube. Basics: Getting Started Uploading and Sharing Videos on YouTube. 1.
To Add a 2 nd to your NGIN Account October 9, 2012.
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
Created by Mr. Hemmert.  Have you ever received a mean or instant message? Have you ever sent one? This is called cyberbullying. A cyberbully uses.
Taking the Headache out of. Reach your sphere of influence on a daily basis – AT NO COST? Reconnect with friends and stay in touch with family – AT NO.
Quiz Review.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Social Media Attacks By Laura Jung. How the Attacks Start Popularity of these sites with millions of users makes them perfect places for cyber attacks.
Welcome! – Audio Check Audio Check Instructions Press Talk or Hold CTRL Check Options > Filters< click Audio Gain Control off Check your headset Please.
TODAY’S SMS CODE IS CODE HERE TEXT IT THIS NUMBER: TIPS: Add this number as a contact. We suggest as the contact.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
EDW647: Internet for Educators Dr. Roger Webster Department of Computer Science Millersville University July 23, 2008 Create.
DIGITAL SECURITY PART 2 TOOLS. phising  Internet criminals can steal your personal and banking information without you ever noticing – they can do it.
Instructions for Administrators Choose the Enrollment slide decks that match your environment, either for SaaS or On Premise. Edit the red text to match.
Getting started with myitlab. before you register  A valid address  Course ID from your instructor  Student access code Before you register,
Suspend/Remove/Restore Transit Benefits Jessie has decided to leave her employment with your company. You have already paid WMATA for her benefits for.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
Changing Your Case Password And a few other words about IT Security.
How to Create an Address How to Create a Free Account, Read and Answer your s. Yahoo! provides FREE . To create a free .
Registering for Virtual Labs™
Internet Safety 101! Instant Messaging Social Networking Sites (i.e. Facebook) Sending personal Information Sending pictures online Talking to strangers.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Windows Vista Configuration MCTS : Productivity Applications.
Creating A CCO ID.
Password Reset Instructions
Social Media Security: Understanding how to keep yourself safe.
An Introduction to Phishing and Viruses
Social Media Attacks.
Creating A CCO ID.
Supplier Portal Self-Registration
Assess Survey Invitations
Granting Access to Services for Users from Other Companies
How To Create Cox New Account?
STOP. THINK. CONNECT. Online Safety Quiz.
Granting Access to Services for Users from Other Companies
What is it? Why do I keep getting from Barracuda? SPAM.
Understanding SAMT Administrator Messages
9 ways to avoid viruses and spyware
References & Recommendations
Internet Safety – Social Media
What is Phishing? Pronounced “Fishing”
Phishing 101.
WELCOME How to Setup Yahoo Account Key Feature in Browser? CONTACT US
List Administration Using Mailman
Parent Introduction.
Applying to College *Create a list of colleges- include admission and FAFSA deadlines and required documents. *Understand the difference between Early.
References & Recommendations
Presentation transcript:

THE DHS PHISHING IQ TEST PART 1

LEGITIMATE V PHISHING How do you know if an is legitimate, or is a phony, phishing ? Take the DHS Phishing IQ Test, and well show you what to look for in a phishing . The best way to avoid getting phished is to NEVER CLICK ON LINKS IN THAT ASK FOR YOUR IDENTIFYING INFORMATION DHS IT Security & Privacy Training 2

INSTRUCTIONS FOR THE DHS PHISHING IQ TEST You will see an example of an on the screen. Decide whether it is legitimate or phishing DHS IT Security & Privacy Training 3

LEGITIMATE OR PHISHING? 2014 DHS IT Security & Privacy Training 4 Legitimate Phishing Which answer? This is supposedly a message from PayPal stating you have added a named person to your PayPal account. The message threatens to suspend your PayPal account if you do not respond.

If you download, complete, and send the Personal Profile Form at the end of this , you may have given away your personal information. Remember, don't use the links in an , instant message, or chat to get to any web page if you suspect the message might not be authentic or you don't know the sender DHS IT Security & Privacy Training 5

LEGITIMATE OR PHISHING? 2014 DHS IT Security & Privacy Training 6 Which answer? LegitimatePhishing This is supposedly a notification from Facebook. It provides a link to click to remove the message.

One way you can tell is to put your cursor over the link, then look at the link in the bottom of the browser. Do they match? This doesnt. So its easy to see this is phishing for your information. Remember, don't use the links in an , instant message, or chat to get to any web page if you suspect the message might not be authentic or you don't know the sender DHS IT Security & Privacy Training 7

LEGITIMATE OR PHISHING? 2014 DHS IT Security & Privacy Training 8 Which answer? Legitimate Phishing This is supposedly from Prevention Magazine. It is for a subscription confirmation.

This was legitimate. The receiver was a subscriber to the magazine and she later received a paper bill through the USPS mail. However, the receiver was not sure if the was legitimate, so she did not use the links in this to get to the web page DHS IT Security & Privacy Training 9