What is Phishing? Pronounced “Fishing”

Slides:



Advertisements
Similar presentations
Online Privacy A Module of the CYC Course – Personal Security
Advertisements

Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
1 Identity Theft and Phishing: What You Need to Know.
What is identity theft, and how can you protect yourself from it?
Hacker’s tricks for online users to reveal their sensitive information such as credit card, bank account, and social security. Phishing s are designed.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
Internet Phishing Not the kind of Fishing you are used to.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
P HI SH I NG !. WHAT IS PHISHING ? In computer security phishing is trying to acquire important information such as; passwords, usernames and credit card.
IT security By Tilly Gerlack.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Phishing, Spoofing, Spamming and Security How To Protect Yourself Additional Credits: Educause/SonicWall, Hendra Harianto Tuty, Microsoft Corporation,
DIGITAL SECURITY PART 2 TOOLS. phising  Internet criminals can steal your personal and banking information without you ever noticing – they can do it.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
CCT355H5 F Presentation: Phishing November Jennifer Li.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
What is Spam? d min.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    1 Overall Classification of this Briefing is UNCLASSIFIED//FOUO Phishing.
Managing Money Workshop The National Autistic Society AGM
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
JANELL LAYSER Training Manual. AWARENESS! Social Engineers are out there, and everyone should be prepared to deal with them! They can contact you by phone,
Fall Phishing - attempt to acquire sensitive information, like bank account information or an account password, by posing as a legitimate entity.
An Introduction to Phishing and Viruses
Scams & Schemes Common Sense Media.
Phishing, identity theft, and more
Done by… Hanoof Al-Khaldi Information Assurance
how to prevent them from being successful
Learn how to protect yourself against common attacks
IT Security  .
Unit 4 IT Security.
Information Security.
ISYM 540 Current Topics in Information System Management
Lesson 3 Safe Computing.
I S P S loss Prevention.
Phishing, what you should know
What to be aware of and how to avoid problems.
Information Security 101 Richard Davis, Rob Laltrello.
Phishing is a form of social engineering that attempts to steal sensitive information.
Protect Your Computer Against Harmful Attacks!
How to Protect your Identity Online PIYUSH HARSH
Cybersecurity Awareness
IT Security awareness Training.
Robert Leonard Information Security Manager Hamilton
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Phishing.
9 ways to avoid viruses and spyware
Internet Safety – Social Media
Phishing “In computing, phishing (also known as carding and spoofing) is a form of social engineering, characterized by attempts to fraudulently acquire.
Cybersecurity Simplified: Phishing
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

What is Phishing? Pronounced “Fishing” Phishing is the activity of defrauding an online account holder of private information including financial information by posing as a legitimate company or source. Phishing is a form of pretexting, a kind of deception in which an attacker pretends to be someone else in order to obtain information.

How Phishing Works Phishing is a way of fraudulently acquiring sensitive information using social engineering and technical subterfuge. In other words, it tries to trick users with official-looking messages May ask for credit card Bank info EBay account info PayPal account info Or other personal information Some phishing attacks operate through email and can also contain malicious software or other unwanted software that can track your activates and slow your computer.

Phishing in Emails Phishing via an email generally is sent through an official-looking email from a known source. Phishing is different than spam. Spam tries to sell a product or service, whereas phishing messages need to look like it is from a legitimate organization or source Therefore, techniques applied to prevent spam messages cant be applied natively to phishing messages. Check the source of Information from E-mail Banks will never ask for passwords or personal information by email. When in doubt call the source to ensure the email is legitimate.

How to Avoid Phising DO NOT CLICK THE LINK Always type the site name into the browser For example: always type your banks web address in manually to conduct business, never follow the link in an email Never send sensitive account information by e-mail Account numbers, Social Security Number, passwords Never give your password to anyone Verify any person who contacts you (phone or email) If you receive a call requesting sensitive information, do not answer questions unless they can verify their identity. Use only secured sites and practice safe browsing Never enter personal information into unsecured sites

Always Check Your Links Some phishing attacks are very sophisticated and can dupe even the most trained eyes. Always hover over any links before clicking to ensure the address is correct. Only follow links in emails that you can verify to be from a legitimate source or you are expecting. Use the hover link and manually enter into a web browser Phishing sites often duplicate or appear to be legitimate sites. Make sure to check the web address of the site you are on

When in Doubt… If there is the slightest doubt of legitimacy do not risk it. Maintain antimalware, antivirus, anti-phishing software, and ensure updates to other software are regularly completed Be aware of scare tactics Example: IRS or Police will not contact you via mail asking for personal information or banking information Always remember: Do Not Feed The Phish