By: Valerie Boscia PHISHING. PHISHING OVERVIEW Pronounced “fishing” To Phish: defined by the Oxford English Dictionary as “To perpetrate a fraud on the.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
1 And Tips to Avoid Becoming a Victim Recent Cyber Crime Cases.
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
1 Identity Theft and Phishing: What You Need to Know.
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Phishing and Pharming New Identity Theft Threats Presentation by Jason Guthrie.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
Bsharah Presentation Threats to Information Security Protecting Your Personal Information from Phishing Scams.
DO YOU LOVE FISHING “PHISHING” ? OR Global Wealth Management Group MORGAN STANLEY & SMITH BARNEY A term used to describe fraudulent attempts to steal.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Annual Safety & Security Briefing - 9/22/04 Teresa Downey – SLAC Computer Security Group & SCS Applications Group.
Phishing, Pharming, and Spam Margaret StewartTuesday, Oct. 21, 2006.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Internet Fraud By: Noelle Woodman.
Phishing on the Internet? Presented by Naveed Farooq Naveed Farooq Admin Nidokidos Network Make Money Online | Join Nidokidos Forum |
Internet Scams and Money- Making Models. A way You can be scammed online.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Computer Basics. Computers & Peripherals Safety on the Web Security Software Firewall Antivirus Software Norton Antivirus McAffee Antivirus Security.
Quiz Review.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Matthew Hardaway CSCI101 Thursday 3:30pm.  Fishing (Encyclopedia Britannica): ◦ Sport of catching fish—freshwater or saltwater— typically with rod, line,
Scams & Schemes Common Sense Media.
IT security By Tilly Gerlack.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
What is Phishing?.  Phishing attempts are attempts to get valuable personal information from people via the internet.  Attempts usually come in the.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
CCT355H5 F Presentation: Phishing November Jennifer Li.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
How Phishing Works Prof. Vipul Chudasama.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Topic 5: Basic Security.
By Liam Wright Manga comic group Japan SAFETY on your computer.
U.S. Businesses Targeted Randy Wolverton Brian J. Koechner.
INTRODUCTION & QUESTIONS.
PHISHING PRESENTED BY: ARQAM PASHA. AGENDA What is Phishing? Phishing Statistics Phishing Techniques Recent Examples Damages Caused by Phishing How to.
FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    1 Overall Classification of this Briefing is UNCLASSIFIED//FOUO Phishing.
Fraud, scams and commercial exploitation. The dangers Children are still generally quite trusting and uncritical about what they read online They are.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
is short for electronic mail!. What is ? An electronic message sent from one computer to another. saves money and time compared to regular.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
 77.4% of the perpetrators are male.  50% live in one of the following states: California, New York, Florida, Texas, and Washington.  55.4% complainants.
Important Information Provided by Information Technology Center
Spear Phishing Common cause of data breaches Targeted s
Phishing, identity theft, and more
Done by… Hanoof Al-Khaldi Information Assurance
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
Phishing Don’t take the bait! Dave Beauvais Andrew Sloan
Learn how to protect yourself against common attacks
Identity theft vector of the electronic age
Social Engineering Charniece Craven COSC 316.
Lesson 3 Safe Computing.
Information Security and Privacy Pertaining to Phishing and Internet Scams Brian Corl COSC 316 Information Security and Privacy.
I S P S loss Prevention.
Phishing, what you should know
Phishing is a form of social engineering that attempts to steal sensitive information.
Protect Your Computer Against Harmful Attacks!
Cybersecurity Awareness
Phishing.
9 ways to avoid viruses and spyware
Setting up a Gmail Account & Safety Kamlesh Singh Bisht IT Specialist.
Business Compromise and Cyber Threat
What is Phishing? Pronounced “Fishing”
Phishing “In computing, phishing (also known as carding and spoofing) is a form of social engineering, characterized by attempts to fraudulently acquire.
Cybersecurity Simplified: Phishing
Presentation transcript:

By: Valerie Boscia PHISHING

PHISHING OVERVIEW Pronounced “fishing” To Phish: defined by the Oxford English Dictionary as “To perpetrate a fraud on the internet in order to glean personal information from individuals, esp. by impersonating a reputable company; to engage in online fraud by deceptively ‘angling’ for personal information”.

ORIGINS The first recorded instance of phishing occurred in 1995 through America Online (AOL). The phishers involved would pretend to be AOL workers notifying users of their need to update their billing information. Users would send these phony administrators their personal information and in turn be submitted to fraudulent activity.

EVOLUTION OF PHISHING With the improvement of technology also came the improvement of phishing scams. Between , the amount of phishing scams being sent out increased greatly. Banks and other financial institutions began to be framed which caused distrust in their customers. Patrons would receive s (seemingly) from their banks requiring validation of account information, and instantly be victimized by phishers.

LATEST PHISHING SCHEME In 2015, the FBI revealed the most recent phishing scheme that has been sent out. Called “the Business Compromise (BEC)” Phishers impersonate highly ranked corporate executives belonging to companies, and send personalized s to workers who have access to financial accounts of the business. They ask for urgent wire transfers, and the workers rush to get it done due to the importance of the executive being impersonated.

HOW TO PREVENT THE BEC Companies can require a dual-step authentication when a request for monetary transfer is filed. The person contacted to transfer the money can contact the executive requesting the transfer via a known or phone call, to make sure that it is a legitimate request.

OTHER FORMS OF PHISHING PREVENTION Check for spelling or grammatical errors. When major companies send out mass s they have a team of staff members proofread them so they do not usually contain errors of these sorts. Hover over any links in the with the cursor, and the link that appears will show the true destination. If it does not match the initial link or pertain to the legitimate company website, it is most likely spam. Beware of links with.exe file extensions, as these are known to contain malicious software.

PREVENTION CONTINUED Download accessible security that is available online or as toolbars on internet browsers. Never reply to phishing s, call phone numbers listed within them, or click links contained within them. Always delete s right away when it is discovered that they are a phishing scam.

REFERENCES Abbasi, Ahmed, Fatemeh “Mariam” Zahedi, Daniel Zeng, Yan Chen, Hsinchun Chen, and Jay F. Nunamaker "Enhancing Predictive Analytics for Anti- Phishing by Exploiting Website Genre Information." Journal Of Management Information Systems 31, no. 4: Computer Source, EBSCO host (accessed December 1, 2015). Akerlof, George A., and Robert J. Shiller Phishing for phools : the economics of manipulation and deception. n.p.: Princeton : Princeton University Press, [2015], Penfield Library Catalog, EBSCO host (accessed December 1, 2015). James, Lance, and Joe Stewart Phishing exposed. n.p.: Rockland, MA : Syngress, c2005., Penfield Library Catalog, EBSCO host (accessed December 1, 2015).

REFERENCES (CONT) "How to Recognize Phishing Messages, Links, or Phone Calls." What Is Phishing Accessed December 3, "Phishing | OnGuard Online." Phishing | OnGuard Online. September 1, Accessed December 3, Rabkin, Jeff, Shireen M. Becker, Jonathan Little, Sheila L. Shadmand, Rasha Gerges Shields, Gregory P. Silberman, and Olivier Haas, et al "Phishing for Corporate Dollars: The Emerging Global Threat Posed by Spear Phishing and Business Compromise." Venulex Legal Summaries 1-6. Business Source Complete, EBSCO host (accessed December 1, 2015).