Phishing, what you should know L kout Initiative Office of Information Technology.

Slides:



Advertisements
Similar presentations
CSWA Provider: Program and Tech Review
Advertisements

1. XP 2 * The Web is a collection of files that reside on computers, called Web servers. * Web servers are connected to each other through the Internet.
1 Web Based A Module of the CYC Course – Internet Basics
Setting up a Gmail Account & Safety
1 SLIDE Insurance Company Regulation Division Insurance Market Regulation Division Medical Professional Liability Insurance Claim Reports Online Claim.
Phishing, what you should know L kout Initiative.
Review Ch. 3 – Connecting to the Worlds Information © 2010, 2006 South-Western, Cengage Learning.
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
You are responsible for security of your internet banking transactions ONLINE.
Cyber Safety Assessment Review
Account HIGHJACKING & IDENTITY THEFT GPCE Credit Union has prepared a slide show presentation to examine the most prevalent financial crimes at work today.
COM Orientation The template can be used to create presentations for community, civic, advocacy and government relations groups. It is also appropriate.
PowerPoint 1: fraud/ phishing Lesson 2-2. WHAT IS PHISHING?
1 And Tips to Avoid Becoming a Victim Recent Cyber Crime Cases.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Kelly Corning Julie Sharp.  Human-based techniques: impersonation  Computer-based techniques: malware and scams.
Keeping Your Identity Your Own Amy Ginther, Project NEThics Coordinator OIT Town Meeting August 24, 2005.
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
1 Identity Theft and Phishing: What You Need to Know.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Bsharah Presentation Threats to Information Security Protecting Your Personal Information from Phishing Scams.
DO YOU LOVE FISHING “PHISHING” ? OR Global Wealth Management Group MORGAN STANLEY & SMITH BARNEY A term used to describe fraudulent attempts to steal.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Internet Phishing Not the kind of Fishing you are used to.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
How It Applies In A Virtual World
Security Issues: Phishing, Pharming, and Spam
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
STAY SAFE ONLINE. STAY SAFE ONLINE! PLEASE MAKE SURE YOU LOGIN AT THE CORRECT BANK URL / ADDRESS 1.NEVER LOGIN VIA LINKS 2.NEVER REVEAL YOUR PIN.
Social Engineering Training. Why Social Engineering Training? The Department of Energy (DOE) authorized the Red Team to perform vulnerability assessments.
Scholarship Scams Avoiding Scholarship Scams, Phishing & Identity Theft at All Cost.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Day 3 Cybersafety Presented by FJUHSD Teacher Librarian.
Cybersafety.
PHISHING FINANCIAL THREATS ON THE INTERNET -Alisha Esshaki 8a.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Reliability & Desirability of Data
IT security By Tilly Gerlack.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
Information Security Sharon Welna Information Security Officer.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
How Phishing Works Prof. Vipul Chudasama.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
What is Spam? d min.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
PHISHING PRESENTED BY: ARQAM PASHA. AGENDA What is Phishing? Phishing Statistics Phishing Techniques Recent Examples Damages Caused by Phishing How to.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
Done by… Hanoof Al-Khaldi Information Assurance
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
Learn how to protect yourself against common attacks
ISYM 540 Current Topics in Information System Management
Information Security and Privacy Pertaining to Phishing and Internet Scams Brian Corl COSC 316 Information Security and Privacy.
Phishing, what you should know
FJUHSD Teacher Librarian
Phishing is a form of social engineering that attempts to steal sensitive information.
Social Media Cybersafety.
9 ways to avoid viruses and spyware
Presentation transcript:

Phishing, what you should know L kout Initiative Office of Information Technology

2 Important Note The information published hereafter is just a collection of selected IT industry best practices and tips that might assist you in improving the security levels against computer related threats while exercising your computing activities. The information published hereafter is not meant in any way to provide a comprehensive solution nor to ensure full protection against computer related threats.

3 Office of Information Technology >Phishing is a form of social engineering that is executed via electronic means and can lead to identity theft and fraud. What is Phishing?

4 Office of Information Technology Social Engineering >A social engineer is a polite cracker!! >A social engineer is a person who will deceive or con others into divulging information that they wouldnt normally share (credit card numbers, bank account information, passwords…etc.). >He/she will build inappropriate trust relationship with insiders.

5 Office of Information Technology Social Engineering >He/she may seem: Unassuming and respectable Possibly claiming to be a new employee, repair person, or researcher and even offering credentials to support that identity. >Social Engineers use these techniques: Appeal to vanity Appeal to authority Appeal to old-fashioned eavesdropping

6 Office of Information Technology Social Engineering >Human Based: In Person. Third-party authorization: The social engineer obtains the name of someone who has the authority to grant access to information. Impersonation: A social engineer might impersonate any character and use certain privileges.

7 Office of Information Technology Social Engineering >Electronic Based: Targeted messages Spam, chain letters and hoaxes attachments Pop windows Spoofed Websites Instant Messaging and Chat rooms Cell phone text messages (SMS) (details in slides ahead)

8 Office of Information Technology Phishing: Real Life Example 1 - AUB

9 Office of Information Technology Phishing: Real Life Example 1 - AUB

10 Office of Information Technology Phishing: Real Life Example 2 - AUB

11 Office of Information Technology Phishing: Real Life Example 2 - AUB

12 Office of Information Technology Phishing: Real Life Example 3 - Common Tricks Same old story, but a different version

13 Office of Information Technology Phishing: Real Life Example 4 - Silly Reasoning Yeah, right

14 Office of Information Technology Phishing: Real Life Example 5 - Fake Sites This one is Easy! This is not eBay site but a fake One.

15 Office of Information Technology Phishing: Real Life Example 6 - Tricky URLs

16 Office of Information Technology Phishing: Real Life Example 6 - Tricky URLs

17 Office of Information Technology Phishing: Real Life Example 7 - Spyware

18 Office of Information Technology How to Avoid Becoming a Phishing Victim? IMPORTANT NOTICE - ALERT Rule 1: NEVER provide your PASSWORD to anyone Rule 2: AUB staff will NEVER request your PASSWORD via You may have read or heard of fraudulent s that encourage recipients to provide their personal details such as user names and passwords. At AUB, we will never request your password via e- mail. If you receive such an request, please delete it immediately.

19 Office of Information Technology Phishers s are typically NOT personalized, while valid messages from your bank or e-commerce company generally are. Phishers typically include upsetting (usually a threat ) information to get people to react immediately (i.e., claiming they will shut off your account). How to Avoid Becoming a Phishing Victim? Is it that urgent?

20 Office of Information Technology Phishers typically include exciting (but false) statements in their s or pop ups to entice people to access their web sites, i.e. claiming that you have won a prize, lottery or inherited wealth. Never respond to requests for personal or confidential information via . When in doubt: Call the institution that claims to have sent you the . Login to their web site by typing their address at the browser address bar. How to Avoid Becoming a Phishing Victim? Does this sound too good to be true? Who is this person?

21 Office of Information Technology If you suspect the message might not be authentic, don't use the links within the to get to a web page, the web page can be spoofed. Never fill out forms in messages that ask for confidential information, you should only communicate confidential information via a secure website. How to Avoid Becoming a Phishing Victim?

22 Office of Information Technology How to Avoid Becoming a Phishing Victim? Always ensure that you're using a secure website when submitting credit card or other sensitive information via your web browser. Check the beginning of the Web address in your browsers address bar - it should be rather than just Look for the locked padlock icon on your browser (IE; Netscape/Mozilla)

23 Office of Information Technology How to Avoid Becoming a Phishing Victim? Never continue to a secure web site that has a problem with its security certificate. Internet browsers do present the user with an error message (example: IE7 message below).

24 Office of Information Technology Regularly check your bank, credit and debit card statements to ensure that all transactions are legitimate and if anything is suspicious, contact your bank and all card issuers Ensure that your browser and OS software is up-to-date and that security patches are applied (Example: MS Outlook signatures of spam s) Ensure antivirus and anti-spyware software is installed and current. How to Avoid Becoming a Phishing Victim?

25 Office of Information Technology Ensure that your browser phishing filter is turned ON. Example: IE7 phishing filter controls. How to Avoid Becoming a Phishing Victim?

26 Office of Information Technology What to do if you Suspect a Phishing ? 1. Stop, never reply, or use any of the URL links embedded in the body, or open attachments, or fill in online forms embedded in the body. 2. Report to IT :

27 Office of Information Technology What to do if you Think you were a Victim? 1.If you believe you might have revealed sensitive AUB information or might have revealed information that could be used for identity theft or fraud, contact

28 Office of Information Technology Test your Phishing IQ Check this Website:

29 Office of Information Technology Acknowledgements >Office of Information Technology team >Work-Study students: Marwa Abdul Baki Donna Bazzi >Comic strips are reproduced with permission. Please visit for more material. >