PhishingMalwareSpam
A QuizIdentify the following as eitherphishing or malware.
1.
2.
3.
4.
5.
6.
PhishingScamming method used to elicitinformation from uninformed computerusers through impersonation of trustedsources; r...
MalwareAnycode, program, script, software orany instructions interpreted asattacking a computer operatingsystem. Malwarein...
Both have a similar delivery. Emailmessages will contain:1. Threats2. Company Logo or Name3. Links4. +/- misspelled words ...
Example 1:
Example 2:
Subject: Faculty / Staff / Student Mail WarningNotification !Mail account compromised, Confirm and verifyyour account by c...
A Legitimate Business will NEVER ask foraccount/information verification via email.
Hover over links:
When you get suspected phishing ormalware email:Enter your organization’s preferred method ofhandling phishing and malware...
If you/your user clicked on a link and/orentered username and password information(credit card #, social security #, etc):
• Notify your Department IT and get yourpasswords reset.• Run a virus scan.• If you provided a login or account details fo...
SpamUnsolicited e-mail sent out inmass quantities.
When you receive spam:1. Mark the message as spam2. Create rules/filters to blockfuture spam messages.3. Delete the message.
Quiz Answers
1. Malware
2. Phishing or Malware
3. Malware
4. Phishing or Malware
5. Malware
6. Phishing or Malware
Questions?
More info:Enter your organization’s contact info here.
Phishing: Training Your Help Desk
Phishing: Training Your Help Desk
Upcoming SlideShare
Loading in …5
×

Phishing: Training Your Help Desk

263 views

Published on

Instructor led training and discussion on the difference between phishing, malware and spam and what to do with them.

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
263
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Phishing but it could be either.
  • Malware but it could be either.
  • Example from last Friday; the link does not go anywhere.
  • This is less important but should be covered to avoid confusion.
  • Example
  • Example
  • Some answers are intentionally vague as to whether they are phishing or malware. I use this for discussion with users.
  • Malware
  • Could be either, we don’t really know the goal in this link.
  • Malware
  • Could be both but could also be legit, were you expecting this? Don’t click the links, go to the main website for Canada Post and manually type in the tracking #.
  • Malware
  • Could be both.
  • Phishing: Training Your Help Desk

    1. 1. PhishingMalwareSpam
    2. 2. A QuizIdentify the following as eitherphishing or malware.
    3. 3. 1.
    4. 4. 2.
    5. 5. 3.
    6. 6. 4.
    7. 7. 5.
    8. 8. 6.
    9. 9. PhishingScamming method used to elicitinformation from uninformed computerusers through impersonation of trustedsources; respelling of fishing used toevade scans and filters by mainstreamservers policing the internet.
    10. 10. MalwareAnycode, program, script, software orany instructions interpreted asattacking a computer operatingsystem. Malwareincludes spyware, trojans, viruses denial of service/DoS attacks.
    11. 11. Both have a similar delivery. Emailmessages will contain:1. Threats2. Company Logo or Name3. Links4. +/- misspelled words and typos
    12. 12. Example 1:
    13. 13. Example 2:
    14. 14. Subject: Faculty / Staff / Student Mail WarningNotification !Mail account compromised, Confirm and verifyyour account by clicking Mailbox Verification .IMPORTANT NOTICE: Current Mailbox Quota-size:95.6% You will not be able to send and receiveemail messages at 98.8% quota size.Admin Help-desk© Copyright 2013
    15. 15. A Legitimate Business will NEVER ask foraccount/information verification via email.
    16. 16. Hover over links:
    17. 17. When you get suspected phishing ormalware email:Enter your organization’s preferred method ofhandling phishing and malware. It is importantthat these be reported as soon as possible sosecurity measures can be taken.
    18. 18. If you/your user clicked on a link and/orentered username and password information(credit card #, social security #, etc):
    19. 19. • Notify your Department IT and get yourpasswords reset.• Run a virus scan.• If you provided a login or account details for afinancial institution, call them immediately.
    20. 20. SpamUnsolicited e-mail sent out inmass quantities.
    21. 21. When you receive spam:1. Mark the message as spam2. Create rules/filters to blockfuture spam messages.3. Delete the message.
    22. 22. Quiz Answers
    23. 23. 1. Malware
    24. 24. 2. Phishing or Malware
    25. 25. 3. Malware
    26. 26. 4. Phishing or Malware
    27. 27. 5. Malware
    28. 28. 6. Phishing or Malware
    29. 29. Questions?
    30. 30. More info:Enter your organization’s contact info here.

    ×