SlideShare a Scribd company logo
Phishing (and other
threats)
A basic introduction
Phishing (and
other threats)
Detect and deal with email traps and other
potential security problems by using good
judgement and knowledge. Technology can
and will fail, it is up to us humans to be last
line of defense
What are their general
goals?
Money
Information
Access
Control
?
What are their specific goals?
Account Numbers/Names
Social Security Numbers
PINs/Passwords
Logon Credentials
Secure Access
Entity Impersonation
What are their tactics?
Existing trust
Building Trust
Fear
Sympathy
Greed
Appeals to human nature
Traditional Phishing is
combined with other exploits
Phishing emails may contain
malicious software in
attachments
Or links to sites with downloads
Attackers with your access
become you
Macs are NOT safe from
malware
At one time Macs were safer
that windows PCs, but this was
due to marketshare not security
features
As Macs get more use, so
follows the attacks
Anti-virus is based on known
threats - does not detect
potential threats
Phones are NOT safe from
malware
Phones were only safe because
they were “dumb”
Phones did not have storage
space, program running space,
or the ability to conduct
transactions
Phones and all mobile devices
(endpoints) are now bridges for
attackers into networks
Even trusted sites can be
dangerous
Attackers can and will use
trusted platforms to gain
automatic trust
LinkedIn, Amazon, Facebook,
etc. are routinely used for fraud
Cross-site scripting - third party
advertising with exploits
People you know and trust
could be compromised
themselves
What to do?
Verify, verify, verify
Follow your gut
If suspicious, call before
responding
Go directly to websites, not
links in emails and never use
forms inside of emails
Ask…

More Related Content

What's hot

Awareness seminar on Advanced Persistent Threats
Awareness seminar on Advanced Persistent ThreatsAwareness seminar on Advanced Persistent Threats
Awareness seminar on Advanced Persistent Threats
Gary Hinson
 
Risks & secutiry in e commerce
Risks & secutiry in e commerceRisks & secutiry in e commerce
Risks & secutiry in e commerce
Arti Parab Academics
 
Mobile Strategy Partners Mobile Security
Mobile Strategy Partners Mobile SecurityMobile Strategy Partners Mobile Security
Mobile Strategy Partners Mobile Security
David Eads
 
Smartphone security
Smartphone  securitySmartphone  security
Smartphone security
Manish Gupta
 
Security researcher
Security researcherSecurity researcher
Security researcher
NoumanShah20
 
Smartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsSmartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkits
Jimmy Shah
 
Mobile security
Mobile securityMobile security
Mobile security
Naveen Kumar
 
Security Threats in E-Commerce
Security Threats in E-CommerceSecurity Threats in E-Commerce
Security Threats in E-Commerce
Dattatreya Reddy Peram
 
Cyber security slideshare_oct_2020
Cyber security slideshare_oct_2020Cyber security slideshare_oct_2020
Cyber security slideshare_oct_2020
Arun Velayudhan
 
What is IT security[1]
What is IT security[1]What is IT security[1]
What is IT security[1]
justin johnson
 
How to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkataHow to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkataamiyadutta
 
System Security enviroment in operating system
System Security enviroment in operating system System Security enviroment in operating system
System Security enviroment in operating system
Kushagr sharma
 
Mobile security
Mobile securityMobile security
Mobile security
dilipdubey5
 
internet and intra net
internet and intra netinternet and intra net
internet and intra net
Naga Dinesh
 
keamanan komputer / computer security
keamanan komputer / computer securitykeamanan komputer / computer security
keamanan komputer / computer securityHendra Fillan
 
Presentation
PresentationPresentation
Presentation
Worik42
 
Public WiFi Hot Spots
Public WiFi Hot SpotsPublic WiFi Hot Spots
Public WiFi Hot Spots
Centextech
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanism
CAS
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ramiro Cid
 

What's hot (20)

Awareness seminar on Advanced Persistent Threats
Awareness seminar on Advanced Persistent ThreatsAwareness seminar on Advanced Persistent Threats
Awareness seminar on Advanced Persistent Threats
 
Risks & secutiry in e commerce
Risks & secutiry in e commerceRisks & secutiry in e commerce
Risks & secutiry in e commerce
 
Mobile Strategy Partners Mobile Security
Mobile Strategy Partners Mobile SecurityMobile Strategy Partners Mobile Security
Mobile Strategy Partners Mobile Security
 
Smartphone security
Smartphone  securitySmartphone  security
Smartphone security
 
Security researcher
Security researcherSecurity researcher
Security researcher
 
What is Malware?
What is Malware? What is Malware?
What is Malware?
 
Smartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsSmartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkits
 
Mobile security
Mobile securityMobile security
Mobile security
 
Security Threats in E-Commerce
Security Threats in E-CommerceSecurity Threats in E-Commerce
Security Threats in E-Commerce
 
Cyber security slideshare_oct_2020
Cyber security slideshare_oct_2020Cyber security slideshare_oct_2020
Cyber security slideshare_oct_2020
 
What is IT security[1]
What is IT security[1]What is IT security[1]
What is IT security[1]
 
How to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkataHow to Keep Yourself secure while browsing internet pre null meet kolkata
How to Keep Yourself secure while browsing internet pre null meet kolkata
 
System Security enviroment in operating system
System Security enviroment in operating system System Security enviroment in operating system
System Security enviroment in operating system
 
Mobile security
Mobile securityMobile security
Mobile security
 
internet and intra net
internet and intra netinternet and intra net
internet and intra net
 
keamanan komputer / computer security
keamanan komputer / computer securitykeamanan komputer / computer security
keamanan komputer / computer security
 
Presentation
PresentationPresentation
Presentation
 
Public WiFi Hot Spots
Public WiFi Hot SpotsPublic WiFi Hot Spots
Public WiFi Hot Spots
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanism
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

Viewers also liked

Privacy Primer
Privacy PrimerPrivacy Primer
Privacy Primer
ConnectSafely
 
How to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique PasswordsHow to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique Passwords
ConnectSafely
 
Phising
PhisingPhising
Phising
teresamiraa
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing Attacks
Jagan Mohan
 
Multimedia immersif
Multimedia immersifMultimedia immersif
Multimedia immersif
Kak Yong
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
Sanjay Kumar
 
PHISING Y HACKING
PHISING Y HACKINGPHISING Y HACKING
PHISING Y HACKING
carmenprietobarroso
 
A presentation on Phishing
A presentation on PhishingA presentation on Phishing
A presentation on Phishing
Creative Technology
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks pptAryan Ragu
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORTvineetkathan
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
bensonoo
 

Viewers also liked (13)

Privacy Primer
Privacy PrimerPrivacy Primer
Privacy Primer
 
How to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique PasswordsHow to Create (use use) Strong & Unique Passwords
How to Create (use use) Strong & Unique Passwords
 
Phising
PhisingPhising
Phising
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing Attacks
 
Multimedia immersif
Multimedia immersifMultimedia immersif
Multimedia immersif
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
PHISING Y HACKING
PHISING Y HACKINGPHISING Y HACKING
PHISING Y HACKING
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing
PhishingPhishing
Phishing
 
A presentation on Phishing
A presentation on PhishingA presentation on Phishing
A presentation on Phishing
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 

Similar to phishing

7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine
The Lifesciences Magazine
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
Ben Rothke
 
L N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.pptL N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.ppt
lowlesh1
 
L N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.pptL N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.ppt
lowlesh1
 
laudon-traver_ec10_ppt_ch05.ppt
laudon-traver_ec10_ppt_ch05.pptlaudon-traver_ec10_ppt_ch05.ppt
laudon-traver_ec10_ppt_ch05.ppt
PriyalPatel158383
 
Ensuring Mobile Device Security
Ensuring Mobile Device SecurityEnsuring Mobile Device Security
Ensuring Mobile Device Security
Quick Heal Technologies Ltd.
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
Tapan Khilar
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and securityAkhil Kumar
 
It security &_ethical_hacking
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hacking
satish kumar
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
Sukhdev48
 
IT Security
IT SecurityIT Security
IT Security
Mohsin Laiq
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
WritingHubUK
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
ijsrd.com
 
Computer Security 101 by Montaigne
Computer Security 101 by Montaigne Computer Security 101 by Montaigne
Computer Security 101 by Montaigne
MontaigneStudios
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ncell
 
Heavy Chef Session - Justin Stanford's presentation on Online Security
Heavy Chef Session - Justin Stanford's presentation on Online SecurityHeavy Chef Session - Justin Stanford's presentation on Online Security
Heavy Chef Session - Justin Stanford's presentation on Online Security
Heavy Chef
 
mobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptxmobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptx
vrandmandora1
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information SecurityAna Meskovska
 
Cyber Crime PPT
Cyber Crime PPTCyber Crime PPT
Cyber Crime PPT
AnandKaGe
 
1-Domain ComTIA Security+.pdf
1-Domain ComTIA Security+.pdf1-Domain ComTIA Security+.pdf
1-Domain ComTIA Security+.pdf
Shamsherkhan36
 

Similar to phishing (20)

7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
 
L N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.pptL N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.ppt
 
L N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.pptL N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.ppt
 
laudon-traver_ec10_ppt_ch05.ppt
laudon-traver_ec10_ppt_ch05.pptlaudon-traver_ec10_ppt_ch05.ppt
laudon-traver_ec10_ppt_ch05.ppt
 
Ensuring Mobile Device Security
Ensuring Mobile Device SecurityEnsuring Mobile Device Security
Ensuring Mobile Device Security
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
cellphone virus and security
cellphone virus and securitycellphone virus and security
cellphone virus and security
 
It security &_ethical_hacking
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hacking
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
IT Security
IT SecurityIT Security
IT Security
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
Computer Security 101 by Montaigne
Computer Security 101 by Montaigne Computer Security 101 by Montaigne
Computer Security 101 by Montaigne
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Heavy Chef Session - Justin Stanford's presentation on Online Security
Heavy Chef Session - Justin Stanford's presentation on Online SecurityHeavy Chef Session - Justin Stanford's presentation on Online Security
Heavy Chef Session - Justin Stanford's presentation on Online Security
 
mobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptxmobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptx
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
 
Cyber Crime PPT
Cyber Crime PPTCyber Crime PPT
Cyber Crime PPT
 
1-Domain ComTIA Security+.pdf
1-Domain ComTIA Security+.pdf1-Domain ComTIA Security+.pdf
1-Domain ComTIA Security+.pdf
 

phishing

  • 1. Phishing (and other threats) A basic introduction
  • 2. Phishing (and other threats) Detect and deal with email traps and other potential security problems by using good judgement and knowledge. Technology can and will fail, it is up to us humans to be last line of defense
  • 3. What are their general goals? Money Information Access Control ?
  • 4. What are their specific goals? Account Numbers/Names Social Security Numbers PINs/Passwords Logon Credentials Secure Access Entity Impersonation
  • 5. What are their tactics? Existing trust Building Trust Fear Sympathy Greed Appeals to human nature
  • 6. Traditional Phishing is combined with other exploits Phishing emails may contain malicious software in attachments Or links to sites with downloads Attackers with your access become you
  • 7. Macs are NOT safe from malware At one time Macs were safer that windows PCs, but this was due to marketshare not security features As Macs get more use, so follows the attacks Anti-virus is based on known threats - does not detect potential threats
  • 8. Phones are NOT safe from malware Phones were only safe because they were “dumb” Phones did not have storage space, program running space, or the ability to conduct transactions Phones and all mobile devices (endpoints) are now bridges for attackers into networks
  • 9. Even trusted sites can be dangerous Attackers can and will use trusted platforms to gain automatic trust LinkedIn, Amazon, Facebook, etc. are routinely used for fraud Cross-site scripting - third party advertising with exploits People you know and trust could be compromised themselves
  • 10. What to do? Verify, verify, verify Follow your gut If suspicious, call before responding Go directly to websites, not links in emails and never use forms inside of emails Ask…