321 Phishing Vishing SMiShing Social Engineering Techniques.

Slides:



Advertisements
Similar presentations
Current Fraud Trends Kathy Druckenmiller, CFCI, CIRM, ACT Specialist April 29, /29/2014.
Advertisements

1 MIS 2000 Class 22 System Security Update: Winter 2015.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
What is identity theft, and how can you protect yourself from it?
INTERNET SAFETY FOR STUDENTS
DO YOU LOVE FISHING “PHISHING” ? OR Global Wealth Management Group MORGAN STANLEY & SMITH BARNEY A term used to describe fraudulent attempts to steal.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
INTERNET SAFETY FOR STUDENTS
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Information Security Information Technology and Computing Services Information Technology and Computing Services
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
INTRODUCTION Coined in 1996 by computer hackers. Hackers use to fish the internet hoping to hook users into supplying them the logins, passwords.
Identity Theft Kayla Brooks 7 th Grade Marshall Middle School Mr. Dryer.
1 Introduction to Security Chapter 11 Information Technology (IT) Security.
Washington State Department of Financial Institutions “Regulating financial services to protect and educate the public and promote economic vitality.”
Cyber Crimes.
Malware and Spyware Attacking Cell Phones Chris Gooch, Jessica Russell, Destiny Logan.
VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Preventing Identity Theft in Aspen Falls Helping citizens protect themselves IdentityTheft.
Viruses & Destructive Programs
Instructional Technology & Design Office or Digital Security Basics Presented by Mark Baldwin &
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Malware & Phishing By: mackenzie olson. Internet fraudsters send out spam, pop-ups, appealing websites, and desirable downloads.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
Topic 5: Basic Security.
What is Spam? d min.
 Malicious Code  Hacking  Natural Disaster  Theft.
By: Nikki Tucker MARSHALL MIDDLE SCHOOL 7 TH GRADE MR. DRYER.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Sources of Network Intrusion Security threats from network intruders can come from both internal and external sources.  External Threats - External threats.
Information Systems Design and Development Security Risks Computing Science.
FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    1 Overall Classification of this Briefing is UNCLASSIFIED//FOUO Phishing.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
IDENTITY THEFT Seneca Stairs. #1- Phishing  Phishing is when you get an from someone claiming to be an agency that you have an account in.  They.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Security Risks Todays Lesson Security Risks Security Precautions
Topic 4: E-safety, Health and Safety
Mrs. Esman Computer Special
Scams & Schemes Common Sense Media.
Done by… Hanoof Al-Khaldi Information Assurance
how to prevent them from being successful
Digital Citizenship Middle School
Social Engineering Charniece Craven COSC 316.
Instructor Materials Chapter 7 Network Security
CHAPTER 6 – BASIC SECURITY
Security Fundamentals
Cyber Security Awareness Workshop
Protecting our institutional and your personal data
Phishing is a form of social engineering that attempts to steal sensitive information.
Cybersecurity Awareness
Information Technology Services Education and Awareness Team
Jeff loses his identity!
Internet Safety Vocabulary
Information Technology Services Education and Awareness Team
Security in mobile technologies
What devices use the internet?
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

321 Phishing Vishing SMiShing Social Engineering Techniques

Identity information

I’m senior manager. I need your password authorize a transaction for a client. It’s urgent. The client is waiting, I will hold. Hacker pretending to be Senior Manager Victim My password is

A combination of voice and phishing Software engineers use a telephone system that uses a Voice over IP (VoIP) Vishing is used for financial gain to steal credit card number or other personal information used in identity thief schemes from around the world.

A combination of SMs and phiSHING Scammers are targeting mobile devices to get you to reveal your personal information. Send text messages to you and ask to validate or respond to the request. Once responded, scammer just got you and launched a worm or a malware on your mobile device. Once downloaded on your mobile devices, spyware can eavesdrop on all your conversations gathering information about you.