FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    1 Overall Classification of this Briefing is UNCLASSIFIED//FOUO Phishing.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Victoria ISD Common Sense Media Grade 6: Scams and schemes
Protect Yourself Against Phishing. The good news: The number of US adult victims of identity fraud decreased from 9.3 million in 2005, to 8.4 million.
What is identity theft, and how can you protect yourself from it?
Phishing and Pharming New Identity Theft Threats Presentation by Jason Guthrie.
Internet Phishing Not the kind of Fishing you are used to.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Phishing, Pharming, and Spam Margaret StewartTuesday, Oct. 21, 2006.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Quiz Review.
How It Applies In A Virtual World
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crimes.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Scams & Schemes Common Sense Media.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Information Security Sharon Welna Information Security Officer.
CCT355H5 F Presentation: Phishing November Jennifer Li.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
How Phishing Works Prof. Vipul Chudasama.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
What is Spam? d min.
Social Engineering © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
321 Phishing Vishing SMiShing Social Engineering Techniques.
INTRODUCTION & QUESTIONS.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Safe Computing Practices. What is behind a cyber attack? 1.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
 77.4% of the perpetrators are male.  50% live in one of the following states: California, New York, Florida, Texas, and Washington.  55.4% complainants.
Overall Classification of this Briefing is UNCLASSIFIED//FOUO
Fall Phishing - attempt to acquire sensitive information, like bank account information or an account password, by posing as a legitimate entity.
Important Information Provided by Information Technology Center
Objectives Define phishing and identify various types of phishing scams Recognize common baiting tactics used in phishing scams Examine real phishing messages.
Spear Phishing Common cause of data breaches Targeted s
Scams & Schemes Common Sense Media.
Phishing, identity theft, and more
Done by… Hanoof Al-Khaldi Information Assurance
IT Security  .
Social Engineering Charniece Craven COSC 316.
Overall Classification of this Briefing is UNCLASSIFIED
Lesson 3 Safe Computing.
Information Security and Privacy Pertaining to Phishing and Internet Scams Brian Corl COSC 316 Information Security and Privacy.
Cyber Security Awareness Workshop
Phishing is a form of social engineering that attempts to steal sensitive information.
Protect Your Computer Against Harmful Attacks!
Cybersecurity Awareness
Phishing DD MMM YY.
Command Indoctrination Operations Security DD MMM YY
Spear Phishing Ways to Minimize its Risks
Phishing.
Staying safe on the internet
HOW DO I KEEP MY COMPUTER SAFE?
9 ways to avoid viruses and spyware
Security Hardening through Awareness August 2018
How to keep the bad guys out and your data safe
What is Phishing? Pronounced “Fishing”
Spear Phishing Awareness
Phishing DD MMM YY.
Presentation transcript:

FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    1 Overall Classification of this Briefing is UNCLASSIFIED//FOUO Phishing

FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    2 Summary  OPSEC Overview  What is Phishing  IRS and Phishing  Spear Phishing  Whaling, Vishing, Smishing  Identification of attack and how to protect against  NOST Contact Info

FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    3  A 5 step process that …  Identifies, controls and protects sensitive, critical unclassified information about a mission, operation or activity  Assesses potential threats, vulnerabilities, and risk  Utilizes countermeasures to mitigate an adversary's effectiveness against a friendly operation Operations Security

FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    4 Phishing  Phishing is an illegal activity using social engineering techniques to fraudulently solicit sensitive information or install malicious software.  Objective is to gain knowledge of sensitive information  Usernames/passwords  Personal information  Military operations  Financial information

FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    5 Characterized by a lure, hook, and catch The Lure  The lure is an enticement delivered through . The contains a message encouraging the recipient to follow an included hypertext link. The hyperlink often masks a spoofed uniform resource locator (URL) of a legitimate website. The Hook  The hook is a malicious website designed to look and feel like a legitimate website. The authentic-looking website asks the victim to disclose privacy-related information, such as user identification and password. Often the hook is an obfuscated URL that is very close to one the victim finds legitimate and is really a site under the attacker’s control. The Catch  The catch is when the originator of the phishing message uses the information collected from the hook to masquerade as the victim and conduct illegal financial transactions. Phishing Attack

FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    6 Phishing  Phishing: attempts, via , to acquire personal information from an Internet user by pretending to be a credible source  Indicators:  Spelling errors  Links in the (malicious)  Communicated threats  Will be from a prominent business or company

FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    7 Internal Revenue Service  Phishing Remains on the IRS “Dirty Dozen” List of Tax Scams for the 2016 Filing Season  The IRS does not initiate taxpayer communications through  Scammers send claiming to be from IRS  Requests that you click on a link to fill out a form  Malicious link  Form asks for personal information

FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    8 Spear Phishing  Information is collected on a person and then used to convince the individual that the sender is a legitimate entity that “knows” the victim

FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    9 Spear Phishing

FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    10 Whaling  Phishing attempt that is purported to come from a senior employee of an organization  Any links are most likely malicious  March 2016: Snapchat’s payroll department was targeted by an isolated phishing scam in which a scammer impersonated a CEO and asked for employee payroll information. Download includes a keystroke logger virus

FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    11 Vishing  Scam that attempts to gain personal knowledge via phone call  Imitates legitimate business  Usually warns victim of fraudulent use of credit card or bank account  Requests banking information

FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    12 Smishing  Scam that uses text messages to trick victims into downloading a Trojan horse or virus onto their mobile device  May prompt victim to call a number  Personal information (bank, credit card, etc) will be requested

FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    13 Identifying a phishing scam  Phishing scams have easily recognizable characteristics  Spelling and punctuation errors  Using threats to get people to give up their personal information  Enticing subject lines  Include a link to a web site requesting personal information

FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    14 Protect yourself  Do not open s form someone you don't know  Your bank will never you for personal information  Visit or call the bank if you have doubt about your account  Never unsubscribe from spam s  Mark as spam and delete

FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    15 Summary  OPSEC Overview  What is Phishing  IRS and Phishing  Spear Phishing  Whaling, Vishing, Smishing  Identification of attack and how to protect against  NOST Contact Info

FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    16 JEB – Little Creek (Bldg 1126) 2555 Amphibious Drive Virginia Beach, VA Naval OPSEC App Collaboration at Sea Questions Facebook.com/NavalOPSEC Youtube.com/USNOPSEC