Social EngineeringPhishing, Baiting, Ransonware and more
What is Social Engineering?• Social Engineering: the manipulation of people into  performing actions or divulging confiden...
Phishing and Vishing• Phishing: the attempt to acquire   personal information by masquerading  as a trustworthy identity i...
Baiting and Quid Pro Quo•   Baiting: the use of infected•    physical media (disks, flashdrives,•    CD-ROMs) to lure vict...
Spotting Phishing Scams• The next slide is an example of a phishing scam from a  bank. Many Phishing scams have become mor...
Spotting a Phishing Scam
Spotting Phishing Scams• A- Spoof e-mails may include a forged e-mail address in the “From” line. Some  may actually be re...
More on Prevention•   Never trust e-mails or text messages•   from people you do not know•   Listen closely to phone calls...
Safe Internet Practice• Many times phishing attempts may direct you to a fake  website for in order to gain information. A...
Fake Websites• G – Legitimate websites maintain current certificates for  secure pages. To authenticate the sites secure w...
What if its too late?• If you have accidently infected your hardware with a  virus or you feel your computer has been hack...
Day 2
Upcoming SlideShare
Loading in …5
×

Day 2

346 views
184 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
346
On SlideShare
0
From Embeds
0
Number of Embeds
6
Actions
Shares
0
Downloads
5
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Day 2

  1. 1. Social EngineeringPhishing, Baiting, Ransonware and more
  2. 2. What is Social Engineering?• Social Engineering: the manipulation of people into performing actions or divulging confidential information • Phishing/Vishing • Baiting • Ransomware • Malware
  3. 3. Phishing and Vishing• Phishing: the attempt to acquire personal information by masquerading as a trustworthy identity in an electronic communication• Vishing: the criminal practice of using social engineering over the telephone• Smishing: Text messages asking for personal information• These methods of social engineering are used to gain personal information such as passwords, usernames, and credit card information.
  4. 4. Baiting and Quid Pro Quo• Baiting: the use of infected• physical media (disks, flashdrives,• CD-ROMs) to lure victims into• inserting the infected equipment• into their company computers• thus giving the hacker access• to private information.• Quid Pro Quo (something for something): Hackers call random numbers at a company claiming to be calling back from technical support. Eventually someone will respond because they had filed a complaint earlier and while the hacker “helps” he/she will steal valuable information.
  5. 5. Spotting Phishing Scams• The next slide is an example of a phishing scam from a bank. Many Phishing scams have become more sophisticated and may use businesses you’re associated with to get your information. There are various ways to identify an e-mail as a scam. These warning signs are labeled in the picture and will be explained. It is important to be aware of these methods in order to avoid infecting TVA computers when checking your personal e- mail.
  6. 6. Spotting a Phishing Scam
  7. 7. Spotting Phishing Scams• A- Spoof e-mails may include a forged e-mail address in the “From” line. Some may actually be real e-mail addresses that have been forged.• B- Many spoof e-mails will begin with a general greeting such as “Dear Washington Mutual Customer” instead of using your actual identification.• C- Urgency is often implied claiming your account may have been accessed by an unauthorized third party• D- Many spoof e-mails will try to deceive you with the threat that you account is in jeopardy and if you fail to verify or confirm your personal information your account will be suspended.• E- Keep in mind that while many emails may contain links to use to verify information these links may be forged as well• F- Requests that you enter sensitive personal information such as a user ID, password, or bank account number by clicking on a link or completing a form within the e-mail are clear indicators of a scam. TVA will NEVER ask for personal information through e-mail.
  8. 8. More on Prevention• Never trust e-mails or text messages• from people you do not know• Listen closely to phone calls.• Does it sound legitimate? IT• personnel will not need your• password or other personal information• in order to fix any of your issues.• Protect your computer by constantly• updating your antivirus protection• Never insert any hardware not• approved by TVA into the systems• (flash drives, chargers, ect)• Use unique passwords• Change passwords frequently
  9. 9. Safe Internet Practice• Many times phishing attempts may direct you to a fake website for in order to gain information. Also, you may encounter a fake website while using a search system like Google. There are multiple ways to identify websites as potentially fake or dangerous. An example picture is provided on the next slide.
  10. 10. Fake Websites• G – Legitimate websites maintain current certificates for secure pages. To authenticate the sites secure web page follow these steps: • Look at the padlock in the lower right corner of your browser • Look at the address window above, the letters https:// should appear in front of the address of the forms screen. • On the secure web page click on the file menu and go to properties • Click on the button at the bottom of the screen called certificates – it should include the web address with which the security certificate was issued and the validity dates
  11. 11. What if its too late?• If you have accidently infected your hardware with a virus or you feel your computer has been hacked while at work contact there are multiple steps to take.’ • Contact IT cyber security immediately • Run your virus protection to wipe out any viruses • Change your password• Call IT Cyber Security at: 423-555-5555

×