Download presentation
Presentation is loading. Please wait.
1
I S P S loss Prevention
2
HACKING & PHISHING - BASIC AWRENESS
3
Hacking and phishing Ways of obtaining information – Differ by choice of methods
4
Hacking Gain access to a computer/system without having authorization
Hacking Gain access to a computer/system without having authorization
5
Hacking Information is extracted, “involuntarily”, forcing the perpetrator to take over your computer/system, through brute force or other sophisticated methods, to gain access to sensitive data
6
Phishing Masquerading as a trustworthy source in an attempt to bait a user to surrender sensitive information “voluntarily” (username, password, credit card number, etc.)
7
Phishing Scams are typically fraudulent messages or websites appearing as legitimate enterprises (e.g., university, Internet service provider, bank) attempting to gather personal, financial and sensitive information.
8
Link might connect to another website
9
Who are the victims? Any individual or organization – small or large — can be targeted.
10
Why do they do that? Just for fun Show off Ideology DOS Seize and use sensitive/important information
11
How Can We Know? Your credit cards has been compromised Your account has been compromised Computer’s passwords changed New programs are installed Redirected Internet searches Random pop-ups
12
What Should Be Done? Staff Network Procedures
13
Network Install commercial Anti-Virus software with personal firewall Keep your computer software updated Install a firewall on your office network Conduct regular scans of your network Limit remote access Perform Backups
14
Network Create a policy for password complexity and lifetime Remove x-employees users from all systems Disable pop ups Ensure that downloads are checked by anti-virus software
15
Procedures Make sure to maintain a set of updated procedures that will “cover all the bases” of your work place
16
Procedures Never respond to requests for personal information via or phone! Be leery of URLs that do not have the company name directly before the top-level domain Routinely review your credit card and bank statements for unusual activity. Do not click on links or attachments in unexpected/sender-unknown s
17
AWARNESS!!! AWARNESS!!! AWARNESS!!!
Staff AWARNESS!!! AWARNESS!!! AWARNESS!!!
18
What to do in case….? Disconnect the machine from the Internet completely Run backups Change passwords Antivirus OS re-installation Seek help from a professional Report
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.