DoD Spear-Phishing Awareness Training Joint Task Force - Global Network Operations UNCLASSIFIED//FOUO Updated: 16 NOV 2006.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Social Engineering Training. Training Goals Increase Laboratory Awareness. Provide the tools required to identify, avoid and report advanced Social Engineering.
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
SECURITY AND SOCIAL ENGINEERING US Department of Commerce Office of Security Updated 09/26/11 Security is Everyone's Responsibility – See Something, Say.
Phishing and Pharming New Identity Theft Threats Presentation by Jason Guthrie.
Bsharah Presentation Threats to Information Security Protecting Your Personal Information from Phishing Scams.
Internet Phishing Not the kind of Fishing you are used to.
Threats To A Computer Network
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Discovering Computers 2010
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
How It Applies In A Virtual World
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Protecting Information. Who We Are We are working on our Information Assurance MBA This is part of our curriculum; to present on information security.
Topics Basic Internet Concepts. Types of Information. Search Tools & Techniques. Managing Internet Resources. Browsing a mail. Composing a mail. Attaching.
Information Security Phishing Update CTC
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Cyber Crimes.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)

About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
Phishing A practical case study. What is phishing? Phishing involves fraudulently acquiring sensitive information (e.g. passwords, credit card details.
How Phishing Works Prof. Vipul Chudasama.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
A Matter of Your Personal Security Phishing. Beware of Phishing s Several employees received an that looked legitimate, as if it was being.
Topic 5: Basic Security.
A Matter of Your Personal Security Phishing Revised 11/30/15.
DoD Spear-Phishing Awareness Training Joint Task Force - Global Network Operations UNCLASSIFIED//FOUO Updated: 16 NOV 2006.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
This Guide is going to be about how to  attach files  create a signature  send to multiple recipients with using ‘Cc’ and ‘Bcc’  change the priority.
INTRODUCTION & QUESTIONS.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
PHISHING PRESENTED BY: ARQAM PASHA. AGENDA What is Phishing? Phishing Statistics Phishing Techniques Recent Examples Damages Caused by Phishing How to.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    1 Overall Classification of this Briefing is UNCLASSIFIED//FOUO Phishing.
Safe Computing Practices. What is behind a cyber attack? 1.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
Fall Phishing - attempt to acquire sensitive information, like bank account information or an account password, by posing as a legitimate entity.
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
Spear Phishing Common cause of data breaches Targeted s
Edexcel GCSE Cyber security threats Computer Science 1CP1
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
how to prevent them from being successful
Learn how to protect yourself against common attacks
links and attachments: Help stop malware from spreading
IT Security  .
Lesson 3 Safe Computing.
Information Security and Privacy Pertaining to Phishing and Internet Scams Brian Corl COSC 316 Information Security and Privacy.
Network security threats
Phishing, what you should know
Information Security 101 Richard Davis, Rob Laltrello.
Phishing is a form of social engineering that attempts to steal sensitive information.
Protect Your Computer Against Harmful Attacks!
Cybersecurity Awareness
Malware, Phishing and Network Policies
HOW DO I KEEP MY COMPUTER SAFE?
Social Engineering Humans are often the weakest point in security
What is Phishing? Pronounced “Fishing”
Security in mobile technologies
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

DoD Spear-Phishing Awareness Training Joint Task Force - Global Network Operations UNCLASSIFIED//FOUO Updated: 16 NOV 2006

Inform and increase the awareness of all Department of Defense personnel of the dangers and threats imposed on DoD information systems as a result of “spear-phishing” s. Instruct personnel on how to recognize these threats while offering methods to help counter the threat. Objective UNCLASSIFIED Instructions - To advance to the next slide, click the button. - Click to return to the previous slide. - Click on the hyperlinked (blue, underlined) text to get more information on an item. - Click to return from the hyperlinked location.

Phishing is a criminal activity using social engineering techniques.social engineering “Phishers” attempt to fraudulently acquire sensitive information, such as passwords, personal information, military operations, and credit card/financial details, by masquerading as a trustworthy person or business in an electronic communication. BUT, DID YOU KNOW……. What is “Phishing”? UNCLASSIFIED

Phishing s not only attempt to trick you into giving out sensitive information, but also can include malicious software. What this means… These s may contain mini-programs that will be installed on your computer. They may capture your keystrokes or capture your personal files and send them to people they shouldn’t be going to …without you knowing it!!! Hidden Threats of “Phishing” UNCLASSIFIED

Most phishing attempts are for identity theft, but there is a rise in attempts at gaining access to online banking, federal, and defense information. These hidden/unknown threats can capture your passwords/login credentials and also compromise unclassified, but yet sensitive, information that can put Department of Defense operations at risk. Hidden Threats of “Phishing” UNCLASSIFIED

Spear Phishing is a GREATER threat!!! Spear Phishing is a highly targeted phishing attempt. The attacker selectively chooses the recipient (target) and usually has a thorough understanding of the target’s command or organization. What is “Spear Phishing”? UNCLASSIFIED

The attacker may: Address the recipient by name Use lingo/jargon of the organization Reference actual procedures, SOPs/TTPs, or DOD Instructions The may appear very genuine. Sometime these s have legitimate operational and exercise nicknames, terms, and key words in the subject and body of the message. What is “Spear Phishing”? UNCLASSIFIED

Phishing is not anything new and many of you may have seen examples in s from your personal / at-home accounts. Common Examples of Phishing UNCLASSIFIED You may have seen s that appear to come from your bank or other online financial institutions. Commonly Seen Commercial Examples: eBay, PayPal, all banking and financial institutions

Phishing sent portraying Bank of America, Military Bank Entices the user to complete a survey and receive a $20 or $25 credit Bank of America Military Bank UNCLASSIFIED

Convincing website linked from BOA Military Bank UNCLASSIFIED Bank of America Military Bank

UNCLASSIFIED Bank of America Military Bank Convincing website linked from BOA Military Bank

YES, this is occurring within DOD The attacker’s primary focus is to get you to open an attachment or follow a web link. These actions may install the malicious software. Most spear phishing attacks within DOD are not for identity theft. Should I be worried? UNCLASSIFIED

Everyone within DOD is a target. Attempts have been seen at all levels and areas. Military, Civilians, Contractors All Ranks All Services All Geographic Locations Discovered “spear phishing” messages within the DOD can be very convincing Who should be worried? UNCLASSIFIED

“From” field of an can be easily faked (spoofed). It might appear completely correct, or have a similar variation. On the other hand, the message may come from a legitimate account, because that account has been compromised. This can occur when the attackers obtain someone’s login credentials and contacts in their address book in order to obtain more accounts. How can I be sure? Is the message digitally signed? Recognition UNCLASSIFIED

Other recognition factors of phishing attempts: 1) Generic Greeting 2) Fake Sender’s Address 3) False Sense of Urgency 4) Fake Web Links. Deceptive Web Links. is requiring that you follow a link to sign up for a great deal, or to log in and verify your account status, or encourages you to view/read an attachment. 5) s that appear like a website 6) Misspellings and Bad Grammar Recognition UNCLASSIFIED

Sanitized example of a message with a link to a website that installs malicious software. DO NOT FOLLOW THESE LINKS Recognition (Example 1) UNCLASSIFIED//FOUO

Sanitized example of a message with an attachment that contained malware. DO NOT OPEN THE ATTACHMENT IF YOU RECEIVE A SIMILARLY COMPOSED NOTE: VALIANT SHIELD was an actual exercise event. Message was sent from a supposed exercise account. Recognition (Example 2) UNCLASSIFIED//FOUO

Recognition (Example 3) UNCLASSIFIED//FOUO Sanitized example of a message with an attachment that contained malware. DO NOT OPEN THE ATTACHMENT IF YOU RECEIVE A SIMILARLY COMPOSED

Recognition (Example 4) UNCLASSIFIED//FOUO Sanitized example of a message with an attachment that contained malware. DO NOT OPEN THE ATTACHMENT IF YOU RECEIVE A SIMILARLY COMPOSED

Be cognizant and vigilant of this threat. Before clicking on any weblink within a message or opening up an attachment, be sure the source of the is legitimate. Is it digitally signed? The links and attachments can contain malware, spyware, viruses, and trojan horses. If you click on these illegitimate links/attachments, your computer or account will likely be compromised. Prevention (as a receiver) UNCLASSIFIED

At a minimum, Digitally Sign All s? If your position involves official direct contact with outside DoD entities, digital signatures might not be an option. If this is the case, be suspect of the format and enclosed attachments with these individuals. Prevention (as a sender) UNCLASSIFIED

Note on Operations Security (OPSEC) Users should digitally sign and encrypt all messages that contain: (at a minimum) For Official Use Only (FOUO) Privacy Act / personal information technical and contract data proprietary information foreign government information financial information source selection information Prevention (as a sender) UNCLASSIFIED

Do not send s using “HTML” formatting. Use “Plain Text” or “Rich Text” formatted s. “Plain Text” (or ASCII) is preferred because Rich Text looks the same as HTML formatting. How do I set this up? Prevention (as a sender) UNCLASSIFIED

The importance of digitally signing your messages can’t be stressed enough. To date, there are no known “spoofs” to digital signatures, other than compromised PKI credentials due to negligence. Digital Signing UNCLASSIFIED Digitally Signed MessageDigitally Signed and Encrypted Message

Be aware of current information systems threats and targets within DOD Command and organization Information Security professionals should be following these current threats and continually educating you on them. Specific reports and alerts are published by JTF-GNO. Awareness UNCLASSIFIED

JTF-GNO Portal: NIPRNET: (CAC required) JTF-GNO J2/J3 Alert (PDF, CAC required)JTF-GNO J2/J3 Alert SIPRNET: DOD Information Awareness Training Resources / Further Details UNCLASSIFIED

UNCLASSIFIED//FOUO The JTF-GNO directs the operation and defense of the Global Information Grid across strategic, operational, and tactical boundaries in support of DoD’s full spectrum of war fighting, intelligence, and business operations. The End

Social engineering is a collection of techniques used to manipulate people into performing actions or divulging confidential information. All Social Engineering techniques are based on flaws in human logic known as cognitive biases. [ Cognitive biases won’t be expanded here, but it involves the different ways we all perceive reality and how “bad people” use these facts to get what they need.] What is “Social Engineering”? UNCLASSIFIED

1) In Outlook, in the menu bar, select “Tools” -> “Options” 2) Select the “Mail Format” tab and select “Plain Text” 3) Click on “Internet Format” (then… next slide)next slide Sending Plain Text UNCLASSIFIED 2 3

4) Under “Outlook Rich Text” options, select either “Convert to Plain Text format” or “Send using Outlook Rich Text format” Sending Plain Text UNCLASSIFIED 4

When composing a message in Outlook, ensure you sign the message by selecting the button below. To encrypt, select the envelope with the blue lock icon. Sign a Message UNCLASSIFIED