Social Engineering © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
7 Effective Habits when using the Internet Philip O’Kane 1.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
Quiz Review.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Commercial eSecurity Training and Awareness. Common Online Threats Most electronic fraud falls into one of three categories:  PHISHING – Fraudulent s.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
Social Engineering Training. Why Social Engineering Training? The Department of Energy (DOE) authorized the Red Team to perform vulnerability assessments.
Lecture 14. Lecture’s outline Privacy The sender and the receiver expect confidentiality. The transmitted message must make sense only to the intended.
Computer Safety Workshop Presented by Roy Coleman April 14, 2015 © 2015 Roy Coleman.
Phishing And Malware By Joey Pawoll. Major problems for you and your computer Phishing and malware are major problems for your computer This powerpoint.
Security Chapter What Should I Ask Santa Claus For? spoofing: fraudulent activity in which the sender address and other parts of the.
Computer and Information Security Protecting yourself and your clients in the wild and wooly online world.
1 Kids on the Web. Child’s play? September, 2008.
Keeping Information Safe Task 4. Basic security measures Passwords Change password on regular basis Do not use names or words easily linked to yourself.
Safe Internet Use Mark Wheatley CSI Onsite
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Types of Electronic Infection
Computer Security Hacking, Phishing, Passwords Kausalya S. And Sushil Mujumdar (CCCF) 04 - Aug - 15.
Ch9QQ T F 1.Hacking is an example of unauthorized access. T F 2.A Trojan horse is a type of malware that masquerades as another type of program. T F 3.A.

By: Gloria Watkins.  Use antivirus software and keep it up-to-date. You should check for new definition updates daily. Most antivirus software can.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
How Phishing Works Prof. Vipul Chudasama.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
What is Spam? d min.
Software for Cyber Hygiene © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Any criminal action perpetrated primarily through the use of a computer.
Malicious Attacks By: Jamie Woznicki Rahul-Anaadi Kurl Alexander Kaufmann Curtis Songer Daniel Cardenas Rivero.
FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    1 Overall Classification of this Briefing is UNCLASSIFIED//FOUO Phishing.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
 77.4% of the perpetrators are male.  50% live in one of the following states: California, New York, Florida, Texas, and Washington.  55.4% complainants.
Cyber security. Malicious Code Social Engineering Detect and prevent.
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
Learn how to protect yourself against common attacks
ISYM 540 Current Topics in Information System Management
Software Applications for end-users
Phishing, what you should know
Spoofing Basics Presentation developed by A.F.M Bakabillah Cyber Security and Networking Consultant MCSA: Messaging, MCSE RHCE ITIL CEH.
Protect Your Computer Against Harmful Attacks!
Staying Austin College
Cybersecurity Awareness
Practice Safe Computing
Stealing Credentials.
DON’T GET HOOKED! YOU MAY BE UNAWARE BUT YOU ARE A PHISHING TARGET FOR CYBER CRIMINALS. A. Unknown sender address B. Offer too good to be true &
Computer Security.
9 ways to avoid viruses and spyware
WJEC GCSE Computer Science
Wireless Spoofing Attacks on Mobile Devices
Presentation transcript:

Social Engineering © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering

Attackers use social engineering to trick people Used to gather information or install malware Social Engineering

Attackers send millions of s, text messages, or phone calls Not tailored to recipient From random –Do not follow a link –Do not open an attachment –Do not respond to a message Start in a browser to go to a site, retrieve a document, or initiate a transaction Phishing

Message tailored to you, using your hobbies, your contact names, imposter look-alikes of web sites you visit From unexpected , beware: –following a link –opening an attachment Start in a browser to go to a site, retrieve a document, or initiate a transaction Confirm with sender Targeted Attacks

Do not be tricked by warnings that "Your computer may be infected" Use known software and beware imitations Beware: Rogue Security Software

Beware URL spoofs in links –1 and l –O and 0 –international characters like i and í Use bookmarks or type a URL to ensure a true site when using passwords and money Beware: Malicious Websites

Can clog Internet traffic and spread malware Urban Legends – – Anti-virus Hoaxes – – Hoaxes and Chain Letters