Cybersecurity
Awareness
Phishing and Social Engineering
WHAT IS PHISHING?
Phishing is a cyber attack that masquerades as a
trustworthy entity to deceive individuals into revealing
personal information.
Example: An email that looks like it’s from your bank,
asking you to verify your account information.
Types of Phishing
 1. Email Phishing: General emails sent to a large number of people.
 - Example: An email claiming you've won a lottery and need to provide bank
details.
 2. Spear Phishing: Targeted attacks on specific individuals.
 - Example: An email that appears to be from your colleague requesting
sensitive documents.
 3. Whaling: Attacks aimed at high-profile targets, such as executives.
 - Example: A CEO receives an email that looks like it’s from the CFO asking
for financial information.
Vishing and Smishing
 Vishing: Voice phishing via phone calls.
 Example: A caller claims to be from tech support asking for your login details.
 Smishing: SMS phishing using text messages.
 Example: A text message claiming you’ve won a prize and asking for personal
details.
What is Social Engineering?
 Manipulation of individuals into divulging confidential information.
 Example: A scammer impersonating IT support to extract passwords.
Common Techniques
 1. Pretexting: Creating a fabricated scenario.
 - Example: Claiming to be from the HR department to gather employee
data.
 2. Baiting: Offering a reward for information.
 - Example: Leaving a USB drive labeled 'Salary Information' in a public area.
Recognizing Phishing Attempts
 1. Look for poor grammar or spelling.
 2. Check the sender's email address closely.
 3. Be wary of urgent requests for personal information.
 Example: 'Your account will be suspended unless you respond immediately.'
How to Protect Yourself
 1. Use multi-factor authentication.
 2. Verify unexpected requests by contacting the company directly.
 3. Keep software and antivirus updated.
 Be Cautious with Links and Attachments
 Limit Sharing Personal Information
 Report Suspicious Activity
CONCLUSION
• Stay vigilant! Understanding phishing and social engineering
is key to protecting yourself and your organization.

Cybersecurity_Awareness_educational_presentation.pdf

  • 1.
  • 2.
    WHAT IS PHISHING? Phishingis a cyber attack that masquerades as a trustworthy entity to deceive individuals into revealing personal information. Example: An email that looks like it’s from your bank, asking you to verify your account information.
  • 3.
    Types of Phishing 1. Email Phishing: General emails sent to a large number of people.  - Example: An email claiming you've won a lottery and need to provide bank details.  2. Spear Phishing: Targeted attacks on specific individuals.  - Example: An email that appears to be from your colleague requesting sensitive documents.  3. Whaling: Attacks aimed at high-profile targets, such as executives.  - Example: A CEO receives an email that looks like it’s from the CFO asking for financial information.
  • 4.
    Vishing and Smishing Vishing: Voice phishing via phone calls.  Example: A caller claims to be from tech support asking for your login details.  Smishing: SMS phishing using text messages.  Example: A text message claiming you’ve won a prize and asking for personal details.
  • 5.
    What is SocialEngineering?  Manipulation of individuals into divulging confidential information.  Example: A scammer impersonating IT support to extract passwords.
  • 6.
    Common Techniques  1.Pretexting: Creating a fabricated scenario.  - Example: Claiming to be from the HR department to gather employee data.  2. Baiting: Offering a reward for information.  - Example: Leaving a USB drive labeled 'Salary Information' in a public area.
  • 7.
    Recognizing Phishing Attempts 1. Look for poor grammar or spelling.  2. Check the sender's email address closely.  3. Be wary of urgent requests for personal information.  Example: 'Your account will be suspended unless you respond immediately.'
  • 8.
    How to ProtectYourself  1. Use multi-factor authentication.  2. Verify unexpected requests by contacting the company directly.  3. Keep software and antivirus updated.  Be Cautious with Links and Attachments  Limit Sharing Personal Information  Report Suspicious Activity
  • 9.
    CONCLUSION • Stay vigilant!Understanding phishing and social engineering is key to protecting yourself and your organization.