SlideShare uma empresa Scribd logo
1 de 14
Baixar para ler offline
Phishing and Prevention
Profile
Stephen Hasford
Cyber Security Engineer, Cybrary TA, BIC Location Ambassador@Ghana
https://www.linkedin.com/in/stephenhasford
Certifications:
• Certified Ethical Hacker
• CCNA Cyber Ops
• Microsoft Certified Systems Engineer
• Qualys Certified Specialist
• CyberArk Certified Trustee
Education:
• BEng, Electrical and Electronics Engineering
• Diploma, Hardware and Networking Engineering
What is phishing?
Techniques used by cybercriminals to con you into revealing sensitive information or
installing malware on your computer.
Phishing Variants
◦ email phishing - Phishing email will typically direct the user to visit a website where they are
asked to update personal information, such as a password, credit card, social security, or bank
account numbers, that the legitimate organization already has.
◦ smishing - the fraudulent practice of sending text messages purporting to be from reputable
companies in order to induce individuals to reveal personal information, such as passwords or
credit card numbers.
◦ Vishing - the fraudulent practice of making phone calls or leaving voice messages purporting to
be from reputable companies in order to induce individuals to reveal personal information, such
as bank details and credit card numbers.
◦ USBishing - attackers usually try to lure victims to use unknown USB devices on their
laptops/computers. Attackers will leave high-capacity drives in public areas such as restrooms.
When a phish connects the drive with a device, the drive automatically installs a malware onto
the device without the user knowing.
Phishing Types
◦ Mass Phishing - emails sent to a group of people with some common interest based on their
brand preferences, demographics, and choices. Example: emails sent to potential victims are
clones of transactional emails like receipts, payment reminders, or gift cards.
◦ Spear Phishing - typically targeted in nature, and the emails are carefully designed to target a
particular user.
◦ Whaling - not very different from spear phishing, but the targeted group becomes more specific
and confined in this type of phishing attack. Targets are CEO, CFO, COO or any other senior
management positions who are considered to be big players in the information chain of any
organization.
Phishing Prevention
◦ Two factor authentication should be deployed to prevent hackers who have compromised a
user's credentials from ever gaining access.
◦ Keep all systems current with the latest security patches and updates.
◦ Be sure to look at any hyperlinks by hovering over them before you click. The text of the
hyperlink might look legit but the actual redirect URL could be something bogus.
◦ Encrypt all sensitive company information
◦ Look for misspellings or poor grammar. Many scammers are not native English speakers and
make grammatical mistakes
◦ Think before clicking links
◦ Do NOT click on any attachments from unknown sources. If this is your corporate email, notify
your IT staff.
◦ Never share your email passwords unless you are logging in to your email provider's website
◦ Never click on links in an email - always type the address directly into the address bar.
◦ Always pick up the phone and call to confirm an out-of-band request, even if you think the CEO
may be mad.
Phishing Demo
Questions
Thank You
References
◦ https://digitalguardian.com/blog/phishing-attack-prevention-how-identify-avoid-phishing-scams
◦ https://www.ulm.edu/it/phish.html
◦ https://www.webopedia.com/TERM/P/phishing.html
◦ https://jpthegeek.com/what-is-phishing-and-what-does-it-mean-to-me/
◦ https://www.officefront.co.uk/2018/12/12/phishing-vishing/
◦ https://computertroubleshooters.co.uk/glasgow/tag/phishing/
◦ https://blog.syscloud.com/types-of-phishing/

Mais conteúdo relacionado

Mais procurados

Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
Aryan Ragu
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
Fred Beck MBA, CPA
 

Mais procurados (20)

Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You Safe
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Phishing
PhishingPhishing
Phishing
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Phishing awareness
Phishing awarenessPhishing awareness
Phishing awareness
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Cyber security
Cyber securityCyber security
Cyber security
 
Phishing
PhishingPhishing
Phishing
 
Spamming
SpammingSpamming
Spamming
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 

Semelhante a Phishing and prevention

Phishing scams in banking ppt
Phishing scams in banking pptPhishing scams in banking ppt
Phishing scams in banking ppt
Krishma Sandesra
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
aleeya91
 

Semelhante a Phishing and prevention (20)

Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptx
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
IT2252_Presentation_Group03.pptx
IT2252_Presentation_Group03.pptxIT2252_Presentation_Group03.pptx
IT2252_Presentation_Group03.pptx
 
Day 2
Day 2Day 2
Day 2
 
Phishing scams in banking ppt
Phishing scams in banking pptPhishing scams in banking ppt
Phishing scams in banking ppt
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
 
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awarenessOWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the bait
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
 
Identity theft in internet
Identity theft in internetIdentity theft in internet
Identity theft in internet
 
Phishing & Cyber Attack Awareness
Phishing & Cyber Attack AwarenessPhishing & Cyber Attack Awareness
Phishing & Cyber Attack Awareness
 
Phishing
PhishingPhishing
Phishing
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber Monday
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Phishing Awareness Training.pptx
Phishing Awareness Training.pptxPhishing Awareness Training.pptx
Phishing Awareness Training.pptx
 
Pp8
Pp8Pp8
Pp8
 
Cybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxCybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptx
 

Último

Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
amilabibi1
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
Sheetaleventcompany
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
raffaeleoman
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
Kayode Fayemi
 

Último (20)

Air breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsAir breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animals
 
Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
 
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verifiedSector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, YardstickSaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubs
 
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
Causes of poverty in France presentation.pptx
Causes of poverty in France presentation.pptxCauses of poverty in France presentation.pptx
Causes of poverty in France presentation.pptx
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 

Phishing and prevention

  • 2. Profile Stephen Hasford Cyber Security Engineer, Cybrary TA, BIC Location Ambassador@Ghana https://www.linkedin.com/in/stephenhasford Certifications: • Certified Ethical Hacker • CCNA Cyber Ops • Microsoft Certified Systems Engineer • Qualys Certified Specialist • CyberArk Certified Trustee Education: • BEng, Electrical and Electronics Engineering • Diploma, Hardware and Networking Engineering
  • 3. What is phishing? Techniques used by cybercriminals to con you into revealing sensitive information or installing malware on your computer.
  • 4. Phishing Variants ◦ email phishing - Phishing email will typically direct the user to visit a website where they are asked to update personal information, such as a password, credit card, social security, or bank account numbers, that the legitimate organization already has. ◦ smishing - the fraudulent practice of sending text messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords or credit card numbers. ◦ Vishing - the fraudulent practice of making phone calls or leaving voice messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as bank details and credit card numbers. ◦ USBishing - attackers usually try to lure victims to use unknown USB devices on their laptops/computers. Attackers will leave high-capacity drives in public areas such as restrooms. When a phish connects the drive with a device, the drive automatically installs a malware onto the device without the user knowing.
  • 5. Phishing Types ◦ Mass Phishing - emails sent to a group of people with some common interest based on their brand preferences, demographics, and choices. Example: emails sent to potential victims are clones of transactional emails like receipts, payment reminders, or gift cards. ◦ Spear Phishing - typically targeted in nature, and the emails are carefully designed to target a particular user. ◦ Whaling - not very different from spear phishing, but the targeted group becomes more specific and confined in this type of phishing attack. Targets are CEO, CFO, COO or any other senior management positions who are considered to be big players in the information chain of any organization.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. Phishing Prevention ◦ Two factor authentication should be deployed to prevent hackers who have compromised a user's credentials from ever gaining access. ◦ Keep all systems current with the latest security patches and updates. ◦ Be sure to look at any hyperlinks by hovering over them before you click. The text of the hyperlink might look legit but the actual redirect URL could be something bogus. ◦ Encrypt all sensitive company information ◦ Look for misspellings or poor grammar. Many scammers are not native English speakers and make grammatical mistakes ◦ Think before clicking links ◦ Do NOT click on any attachments from unknown sources. If this is your corporate email, notify your IT staff. ◦ Never share your email passwords unless you are logging in to your email provider's website ◦ Never click on links in an email - always type the address directly into the address bar. ◦ Always pick up the phone and call to confirm an out-of-band request, even if you think the CEO may be mad.
  • 14. References ◦ https://digitalguardian.com/blog/phishing-attack-prevention-how-identify-avoid-phishing-scams ◦ https://www.ulm.edu/it/phish.html ◦ https://www.webopedia.com/TERM/P/phishing.html ◦ https://jpthegeek.com/what-is-phishing-and-what-does-it-mean-to-me/ ◦ https://www.officefront.co.uk/2018/12/12/phishing-vishing/ ◦ https://computertroubleshooters.co.uk/glasgow/tag/phishing/ ◦ https://blog.syscloud.com/types-of-phishing/