Phishing Dennis Schmidt, CISSP Director, Office of Information Systems HIPAA Security Officer UNC School of Medicine UNC School of Medicine.

Slides:



Advertisements
Similar presentations
By: Jason Baltazar MIS 304 Credit Card Fraud and Prevention.
Advertisements

Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
© 2005 Convio, Inc. NTEN Webinar: Protecting your organization and donors from online scams February 23, 2006.
1 Identity Theft and Phishing: What You Need to Know.
Protect Yourself Against Phishing. The good news: The number of US adult victims of identity fraud decreased from 9.3 million in 2005, to 8.4 million.
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
What is identity theft, and how can you protect yourself from it?
David Abarca, Instructor Del Mar College Computer Corner Phishing, Pharming, Spear-Phishing, and now…. Vishing.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
1 What is Phishing? …listening to music by the band called Phish or perhaps …a hobby, sport or recreation involving the ocean, rivers or streams…nope.
Lesson 11 Using Online Banking. Key Terms Account Transfer – online transfer of money; ex. Savings to checking acct. Fraud – using trickery to convince.
Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Internet Phishing Not the kind of Fishing you are used to.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Cryptography: Keeping Your Information Safe. Information Assurance/Information Systems –What do we do? Keep information Safe Keep computers Safe –What.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Day 3 Cybersafety Presented by FJUHSD Teacher Librarian.
PHISHING FINANCIAL THREATS ON THE INTERNET -Alisha Esshaki 8a.
Matthew Hardaway CSCI101 Thursday 3:30pm.  Fishing (Encyclopedia Britannica): ◦ Sport of catching fish—freshwater or saltwater— typically with rod, line,
Keeping Information Safe Task 4. Basic security measures Passwords Change password on regular basis Do not use names or words easily linked to yourself.
Safe Internet Use Mark Wheatley CSI Onsite
Reliability & Desirability of Data
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Phishing & Spam.
Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
CCT355H5 F Presentation: Phishing November Jennifer Li.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
How Phishing Works Prof. Vipul Chudasama.
Don’t Be “Phooled” By Phishing Federal Trade Commission National Consumers League Microsoft Corporation March 31, 2005.
LIBS100 Etiquette and Hoaxes May 16, 2005 L. Galloway.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
 Http  Edu  Net  Gov  Org These are just some of them without these pass the site by!
A Matter of Your Personal Security Phishing. Beware of Phishing s Several employees received an that looked legitimate, as if it was being.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
A Matter of Your Personal Security Phishing Revised 11/30/15.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
Santa’s s By Alexander Britton. Sending an .
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
PHISHING PRESENTED BY: ARQAM PASHA. AGENDA What is Phishing? Phishing Statistics Phishing Techniques Recent Examples Damages Caused by Phishing How to.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
Don’t click on that! Kevin Hill.  Spam: Unwanted commercial ◦ Advertising ◦ Comes from people wanting to sell you stuff. ◦ Headers may be forged.
Fall Phishing - attempt to acquire sensitive information, like bank account information or an account password, by posing as a legitimate entity.
Take the Quiz and find out more!
Objectives Define phishing and identify various types of phishing scams Recognize common baiting tactics used in phishing scams Examine real phishing messages.
An Introduction to Phishing and Viruses
Scams & Schemes Common Sense Media.
Phishing, identity theft, and more
ISYM 540 Current Topics in Information System Management
What to be aware of and how to avoid problems.
Phishing is a form of social engineering that attempts to steal sensitive information.
Presented by: Brendan Walsh Manager, Security and Access Management
Robert Leonard Information Security Manager Hamilton
Scams and Schemes.
Multifactor Authentication & First Time Login
Ethics Tutorial Assignment#2
If I’d only known then what I know now about phishing…
Phishing Don’t fall for fake
Setting up a Gmail Account & Safety Kamlesh Singh Bisht IT Specialist.
Social Engineering Humans are often the weakest point in security
What is Phishing? Pronounced “Fishing”
Phishing 101.
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Phishing Dennis Schmidt, CISSP Director, Office of Information Systems HIPAA Security Officer UNC School of Medicine UNC School of Medicine

Phishing Phishing is fraud where the perpetrator sends out legitimate-looking in an attempt to gather personal and financial information from recipients. Phishing is fraud where the perpetrator sends out legitimate-looking in an attempt to gather personal and financial information from recipients. Messages appear to come from well known and trustworthy Web sites such as: Messages appear to come from well known and trustworthy Web sites such as: PayPal PayPal eBay eBay Amazon Amazon Major banks Major banks

Note the difference between the URL Label and the Actual URL

Fake Web Site

Real Web Site

Notice the Difference

Dots, not slashes after.com.info not.com Fake Site

Bad password still brings you to this page

Real Site Slashes after.com

Bad password gives you this error! That’s good!

Protect Yourself from Phishing Be suspicious of any unsolicited . Be suspicious of any unsolicited . Never provide sensitive information to their query. Never provide sensitive information to their query. Check it out from second source (Telephone, etc.) Check it out from second source (Telephone, etc.) Don’t use the phone number provided in the . Don’t use the phone number provided in the . Misspellings, bad grammar, etc., should be clues. Misspellings, bad grammar, etc., should be clues. Look out for link names that don’t match actual link addresses. Look out for link names that don’t match actual link addresses. Remember: Your bank will not ask you to verify that your account information is still accurate. Remember: Your bank will not ask you to verify that your account information is still accurate. If it does, you need to find a new bank! If it does, you need to find a new bank!

Questions?