Social Engineering Humans are often the weakest point in security

Slides:



Advertisements
Similar presentations
What Are Scams? Scams are designed to trick you into giving away your money or your personal details. Scams come to you in many forms – by mail, ,
Advertisements

What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Today’s Agenda… Knowledge Check What is Cyber Crime? Identity Theft Phishing Common Scams inc. online and mobile phone scams Prevention Methods.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
© 2005 Convio, Inc. NTEN Webinar: Protecting your organization and donors from online scams February 23, 2006.
Protect Yourself Against Phishing. The good news: The number of US adult victims of identity fraud decreased from 9.3 million in 2005, to 8.4 million.
What is identity theft, and how can you protect yourself from it?
David Abarca, Instructor Del Mar College Computer Corner Phishing, Pharming, Spear-Phishing, and now…. Vishing.
Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Internet Phishing Not the kind of Fishing you are used to.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
STAY SAFE ONLINE. STAY SAFE ONLINE! PLEASE MAKE SURE YOU LOGIN AT THE CORRECT BANK URL / ADDRESS 1.NEVER LOGIN VIA LINKS 2.NEVER REVEAL YOUR PIN.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
SAFETY What to be aware of and how to avoid problems. **This is not meant to make you fearful of . The goal of this discussion is to make sure.
PHISHING FINANCIAL THREATS ON THE INTERNET -Alisha Esshaki 8a.
Reliability & Desirability of Data
Scams & Schemes Common Sense Media.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Phishing, Spoofing, Spamming and Security How To Protect Yourself Additional Credits: Educause/SonicWall, Hendra Harianto Tuty, Microsoft Corporation,
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
CCT355H5 F Presentation: Phishing November Jennifer Li.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
BY : MUHAMMAD KHUZAIMI B. ISHAK 4 ADIL PUAN MAZITA INFORMATION AND COMMUNICATION OF TECHNOLOGY.
How Phishing Works Prof. Vipul Chudasama.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Phishing Dennis Schmidt, CISSP Director, Office of Information Systems HIPAA Security Officer UNC School of Medicine UNC School of Medicine.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
Phishing and online fraud What parents need to know.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
Do you know who you’re dealing with? Social Engineering: Minimise the risk of becoming a victim.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Cyber security. Malicious Code Social Engineering Detect and prevent.
Fall Phishing - attempt to acquire sensitive information, like bank account information or an account password, by posing as a legitimate entity.
Take the Quiz and find out more!
Important Information Provided by Information Technology Center
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
Spear Phishing Common cause of data breaches Targeted s
Edexcel GCSE Cyber security threats Computer Science 1CP1
Phishing, identity theft, and more
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
Misuses of ICT Malpractice and crime © Folens 2008.
Social Engineering Charniece Craven COSC 316.
Big Picture Consider this How many online threats might you be faced with a day?
ISYM 540 Current Topics in Information System Management
Lesson 3 Safe Computing.
Cyber Security Awareness Workshop
What to be aware of and how to avoid problems.
Information Security 101 Richard Davis, Rob Laltrello.
Phishing is a form of social engineering that attempts to steal sensitive information.
Protect Your Computer Against Harmful Attacks!
Staying Austin College
Cybersecurity Awareness
Scams and Schemes.
Phishing.
DON’T GET HOOKED! YOU MAY BE UNAWARE BUT YOU ARE A PHISHING TARGET FOR CYBER CRIMINALS. A. Unknown sender address B. Offer too good to be true &
HOW DO I KEEP MY COMPUTER SAFE?
Security Hardening through Awareness August 2018
Qiyu chen, Xiaomin Dong, Chenhui Lai, Xinteng Chen, Vittorio DiPentino
What is Phishing? Pronounced “Fishing”
Phishing 101.
Communicating in the IT Industry
Cybersecurity Simplified: Phishing
Presentation transcript:

Social Engineering Humans are often the weakest point in security Social engineering is the art of manipulating or ‘conning’ individuals into giving away private information or login ID’s and passwords. Two common techniques are: Phishing Shoulder surfing

Phishing A phishing email is one that tricks you into handing over sensitive or personal information (login details, bank details, etc). You receive what looks like a legitimate email, for example from a bank or an organisation such as PayPal or eBay. The website urges you to visit a bogus website and enter your personal details, which are then captured by the phishers.

How does it work? Phishers send out hundreds of thousands of emails that look as though they are from legitimate companies. For phishing to be successful, the criminals must get you to click on a link in the email to go to a website. A successful phishing campaign has around a 5% response rate – meaning 5% of recipients are conned!

What to look out for Greeting – phishers will not know your name, only your email address, so the greeting is not personalised. The sender’s email address – often a variation on a genuine address Forged link – the link looks genuine, but it may not link to the website given. Requests personal information – genuine organisations never do this. Sense of urgency – usually say something bad will happen if you don’t act fast. Poor spelling and grammar

Protecting against phishing SPAM filter – this email feature will prevent common scams reaching your email inbox. Be suspicious – if you aren’t certain its genuine, don’t click links.

Shoulder Surfing