THE DHS PHISHING IQ TEST PART 2 LEGITIMATE EMAIL V PHISHING EMAIL How do you know if an email is legitimate, or is a phony, phishing email? Take the.

Slides:



Advertisements
Similar presentations
Geneva Public Library February 15th, What is ? How many of you have had accounts before?
Advertisements

How to protect yourself, your computer, and others on the internet
Developed by Technology Services 1:1 Laptop Initiative
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
THE DHS PHISHING IQ TEST PART 1 LEGITIMATE V PHISHING How do you know if an is legitimate, or is a phony, phishing ? Take the.
Social Engineering Training. Training Goals Increase Laboratory Awareness. Provide the tools required to identify, avoid and report advanced Social Engineering.
What is identity theft, and how can you protect yourself from it?
Facebook Security and Privacy Issues Brian Allen Network Security Analyst Washington University December 2, 2010 Alumni House.
Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
Facebook for RSVP’ers You can do it!. What Questions Do You Have? What are you wanting to learn at this training?
Basics. 2 Class Outline Part 1 - Introduction –Explaining –Parts of an address –Types of services –Acquiring an account.
Basics: Getting Started Uploading and Sharing Videos on YouTube. Basics: Getting Started Uploading and Sharing Videos on YouTube. 1.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Updating User Information Password – use this field to change your own password Confirm Password – retype the new password for verification purposes To.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
1. The first thing you must do is go to Survey Monkey Creating a Survey using SurveyMonkey Gustavo.
ZipLogix® Online Real Estate Training Hosting Online Meetings with zipConsult™
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Social Media Attacks By Laura Jung. How the Attacks Start Popularity of these sites with millions of users makes them perfect places for cyber attacks.
Participant Registration Go to CLICK ON THE GET INVOLVED TAB, CLICK “LEARN MORE ABOUT COMMUNITY SELLER” THEN THE “BECOME A COMMUNITY.
About Facebook Facebook is a social networking service launched in February 2004, owned and operated by Facebook Inc. Facebook was founded by Mark Zuckerberg.
Day 3 Cybersafety Presented by FJUHSD Teacher Librarian.
TODAY’S SMS CODE IS CODE HERE TEXT IT THIS NUMBER: TIPS: Add this number as a contact. We suggest as the contact.
Scams & Schemes Common Sense Media.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Basics. 2 Professional Development Centre Class Outline Part 1 - Introduction –Explaining –Parts of an address –Types of services.
Etiquette – a list of rules that we observe Phishing - sending an to a user falsely claiming to be a legitimate company to scam the user into providing.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
The average door-to-door and booth sale is three packages. The average Cookie Club sale is six!
How to Read Outlook . Make sure the computer is on.
LIBS100 Etiquette and Hoaxes May 16, 2005 L. Galloway.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
Return to the PC Security web page Lesson 6: Improving Security.
Lightspeed is a web-blocking and filtering software program providing safe online security for educational users.
How to Create an Address How to Create a Free Account, Read and Answer your s. Yahoo! provides FREE . To create a free .
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Patient Portal Website Patient Training Powered by the.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
MyMISLab First Day of Class Registration Walkthrough.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Getting Started with. Before you register A valid address Course ID from your instructor Student access code Before you register, be sure you have:
Getting Started with. Before you register A valid address Course ID from your instructor Student access code Before you register, be sure you have:
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Cyber Info Gathering Techniques
Payment Center Self Enrollment and Making a Payment
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
Class Name: Online Safety & Privacy Basics
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
is short for electronic mail!
Parent Portion of the Student Profile
Phishing is a form of social engineering that attempts to steal sensitive information.
Practice Safe Computing
Multifactor Authentication & First Time Login
References & Recommendations
Welcome to WebEx Thanks to the NHS Institute for Innovation & Improvement for their contribution to this document.
Internet Safety – Social Media
InformatiOn Technology Services
What is Phishing? Pronounced “Fishing”
Phishing 101.
Communicating in the IT Industry
References & Recommendations
Presentation transcript:

THE DHS PHISHING IQ TEST PART 2

LEGITIMATE V PHISHING How do you know if an is legitimate, or is a phony, phishing ? Take the DHS Phishing IQ Test, and we’ll show you what to look for in a phishing . The best way to avoid getting “phished” is to NEVER CLICK ON LINKS IN THAT ASK FOR YOUR IDENTIFYING INFORMATION DHS IT Security & Privacy Training 2

LEGITIMATE OR PHISHING? 2014 DHS IT Security & Privacy Training 3 Which answer? Legitimate Phishing This is supposedly from PC Magazine inviting the recipient to participate in a survey by clicking the supplied link.

Putting the cursor over any of the links will show the full link, and these all go back to the sender’s website. Remember: don't use the links in an , instant message, or chat to get to any web page if you suspect the message might not be authentic or you don't know the sender DHS IT Security & Privacy Training 4

LEGITIMATE OR PHISHING? 2014 DHS IT Security & Privacy Training 5 Which answer? Legitimate Phishing This is supposedly an invitation from a friend to view a youtube video by clicking on a link to the video.

The receiver knew the sender, but was wary of clicking on the link. Clicking on the link brings a request for your cell phone number. If you provide it, phishers will have access to your cell phone account, and they can send spam and malware to your cell phone. (The receiver also received multiple copies of this .) Don't use the links in an , instant message, or chat to get to any web page if you suspect the message might not be authentic or you don't know the sender DHS IT Security & Privacy Training 6

LEGITIMATE OR PHISHING? 2014 DHS IT Security & Privacy Training 7 Which answer? Legitimate Phishing This is supposedly from Southwest Airlines advertising a sale. The recipient is instructed to click on the link to go to the website.

Southwest Airlines frequently sends these savings s, but only if the recipient has gone to the site and requested to receive the s. Don't use the links in an to get to any web page if you suspect the message might not be authentic, if you don't know the sender, or if you did not request the information DHS IT Security & Privacy Training 8

LEGITIMATE OR PHISHING? 2014 DHS IT Security & Privacy Training 9 Which answer? Legitimate Phishing This is supposedly from CapitalOne bank and states the recipient’s online account has expired. It gives a link to click to renew the account.

If you’re not a customer, the should be suspect from the beginning. If you are a customer, don’t be taken in. This is a scam. Remember, don't use the links in an to get to any web page if you suspect the message might not be authentic or you don't know the sender DHS IT Security & Privacy Training 10

LEGITIMATE OR PHISHING? 2014 DHS IT Security & Privacy Training 11 Which answer? Legitimate Phishing This is supposedly from Who’s Who and informs the recipient he/she has been selected for inclusion. It asks the recipient to click on a link to verify information and accept the invitation.

If you had clicked on the link on the previous screen, you would have been taken to this screen. If you complete this information and click “Confirm”, you have just given a scammer enough information to impersonate you. Remember: don’t give out personal information in an unless you have manually logged onto a website and you are sure it is authentic DHS IT Security & Privacy Training 12