Information Security Social Engineering. To make you more aware of threats regarding information security Give you examples of real life threats Show.

Slides:



Advertisements
Similar presentations
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Advertisements

Fraud Protection. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
Social Engineering Training. Training Goals Increase Laboratory Awareness. Provide the tools required to identify, avoid and report advanced Social Engineering.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
Social Network Security Issues: Social Engineering and Phishing Attacks Jeffrey Allen, Leon Gomez, Marlon Green, Phillip Ricciardi, Christian Sanabria.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
What is identity theft, and how can you protect yourself from it?
Cyberbullying When good technology goes bad…….. Stay safe in cyberspace.
This week is anti-bullying week.
Using internet and cell phones safely
Smartphone Security How safe are you?. Main Points 1. Malware/Spyware 2. Other Mischief 3. How a phone might get infected 4. Staying Safe a. Malware b.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Internet Fraud By: Noelle Woodman.
Scams Stevie's Scam School videos
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
By Paul Capers.  A cell phone is a portable telephone that does not use a wired connection. It connects to a wireless carrier network using radio waves.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
 Communicating with friends is now easier than ever, for example on Facebook you can connect with all your friends and chat to them very easily and instantly.
E safety. Ads It’s always best to not click on ads when you see them, and it’s always a good idea to ignore them, but if there are too many you can always.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Cyber Crimes.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
Scams & Schemes Common Sense Media.
Online Safety and Awareness. Introductions We are students at UNM We are taking an Information Security course this semester. It is our mission to teach.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Year 10 ICT. What is it about?  This module sets out essential concepts and skills relating to the ability to understand main concepts underlying the.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Grades 3-5. Question #1  A) address and phone number  B) names of your friends  C) your school name and town you live in  D) All of the above Personal.
Topic 5: Basic Security.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
U.S. Businesses Targeted Randy Wolverton Brian J. Koechner.
INTRODUCTION & QUESTIONS.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Mobile Device Security Threats Christina Blakley Host Computer Security.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
CDAC ITS Security Awareness How to help your daily computer activities remain safe and sane.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
JANELL LAYSER Training Manual. AWARENESS! Social Engineers are out there, and everyone should be prepared to deal with them! They can contact you by phone,
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
Facebook privacy policy
Edexcel GCSE Cyber security threats Computer Science 1CP1
Fraud protection.
IT Security  .
Information Security.
The Best Way To Secure U R Self
Lesson 2- Protecting Yourself Online
Passwords.
Cybersecurity Awareness
Information Security Awareness 101
Robert Leonard Information Security Manager Hamilton
9 ways to avoid viruses and spyware
Lesson 2- Protecting Yourself Online
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Information Security Social Engineering

To make you more aware of threats regarding information security Give you examples of real life threats Show you a hacking scenario Let you know what you can do to prevent. Why are we here?

What is Social Media & Engineering? Social MediaSocial Engineering Process of using social skills to convince people to reveal access credentials or other valuable information to the attacker. Any method of social interaction where people create, share, or exchange ideas and information. Social media is a tool hackers use to build social engineering. We give them that.

Why care? Survey Results Primary use of internet is for social media and then school work Group is aware of cyber security and cyber attacks About 50% have answered personal questions online Group uses smartphones, tablets, and computers to access internet Hackers always find new ways and with advancement in technology it is becoming easier to exploit people STAY INFORMED!!!!

Misconception about Phone Security 57% of adult smartphone users are unaware that there are security solutions for smartphones 52% of users store sensitive files on their phones Last year, 38% of smartphone users were victims of cybercrime This number is expected to grow as the smartphone user base continues to grow Smartphones can become infected with many different variations of malware, just as computers can

Cell Phone Attacks NFC –Near Field Communication Radio-frequency identification Activate within 3 centimeters –Debuted in 2010 Samsung Nexus S –Used for Mobile Payments Device Pairing Data transfers Eavesdropping Antenna to intercept radio communication Steal/corrupt data being transmitted

Cell Phone Attacks Gyroscope –Detect devices orientation in space –Android Frequencies from 80Hz – 250Hz –iOS Frequencies 0Hz – 100Hz –Consequence Record human voices (80Hz – 250 Hz) No explicit permissions required No microphone necessary

Cell Phone Attacks Bluetooth –Ultra High Frequency Radio Waves –Short distance (~30ft) –Used for Data transfers Device communication –Bluesnarfing Connect without authentication CRUD  data –i.e. Calendar or contacts data –Bluebugging Connect by posing as headset or previously authenticated device Listen to phone calls Interact with text messages

Social Engineering Scams 419 Fraud Employment Scam Lottery Scam Online sales and rentals Romance Scam Purchase Order Scam Scams retailers and universities Sends money overseas Uses victims from Romance Scam to facilitate money wiring

Local Scams “Peg” Romance Victim Used online dating Fell in love with an “antic dealer” Mike Perry Helped wire money for her “boyfriend” from “antic sales” Money laundering scheme Papageorgiu Also a victim of online dating “girlfriend” was a woman living in Albuquerque Sold his condo to help his “girlfriend”

Social Engineering Tactics Nontechnical Pretexting Diversion theft Tailgaiting Shoulder Surfing Techie Talk Neuro-linguistic programming Technical Phishing Baiting Social Networking Social Engineering in reverse

Social Network Scam Example Offender Creates fake facebook with full content (pictures, hobbies, etc.) Pretend to be someone you should know (transfer student, fellow employee, etc.) Sends friend request Victim Has security options enabled to only allow friends to see information Is that enough?

Art of BS How to invade personal space and gain credibility Use of same language/ slang Humor Build trust 3 layers of space Demonstration

Prevention Never give out: Personal information Medical Information Financial Information Be aware of who is asking Doctor, Employer, friend? Should they already have the information? Do they need this information? Why do they need this?

Prevention Be aware what they ask via phone Ask for full name of caller Correct spelling A call back number Why they need information When in doubt, put caller on hold and see if they wait. Most scammers will not. Log the strange call Be aware what they ask via internet Watch out for any attachments in they want you to run Avoid any requests to enter account information if you don’t know the sender or site. When in doubt, you can contact sender or send a new to address with same subject.

Short Video and Live Demo 16:58 Live Demo of Hacking

Q&A Can you find a difference between the secured session and insecure session?

Q&A True True or false: Social Engineering scams need your trust to happen

Q&A False- there are more online and is increasing, but can happen in person or over the phone. True or false: Social attacks can only happen online

Q&A Three How many layers of protection are there?