beware of phishing scams

Download Beware of Phishing Scams

Post on 12-Nov-2014

948 views

Category:

Documents

2 download

Embed Size (px)

DESCRIPTION

The cyber threat to our Army and Nation is pervasive and most often target, human behavior through social engineering. The best mitigation measure for this risk is to increase cyber awareness by educating our Soldiers, Family Members, Government Civilians, and Contractors. HQDA has directed Army Antiterrorism Quarterly Theme Cyber Threat Awareness (2Q/FY13). For more information on Cyber Security, visit http://www.staysafeonline.org/stay-safe-online/

TRANSCRIPT

  • 1. Enterprise Center (NEC) Assurance Officer and your servicing Network http://www.us-cert.gov/reading_room/emailscams_0905.pdfReport Phishing Attacks to Your Local Information Recognizing & Avoiding Email Scams:SUSPICIOUS ACTIVITY REPORTING servicing Network Enterprise Center (NEC). your local Information Assurance Officer and If you are using a government computer, contact just experienced. and inform them about the phishing attack you Click the contact us link found on most websites account information and password. Follow the websites instructions to change your or change password link. Sign into your account and click the user profile address bar. Type the website name in your browsers real website: Change your password immediately at the Anti Phishing Quick Reaction Drill Phished! I think Ive been Help! What is Phishing? Why Phishing WorksPhishing is an attempt by an individual or group tosolicit personal information from unsuspecting usersby employing social engineering techniques (i.e., We are easily enticed we trust knownmanipulatingpeople into performing actions or divulging brands/logosconfidential information). Phishing emails are crafted toappear as if they were sent from a legitimate organization Lack of user education and awarenessor known individual. These emails often attempt to attractusers to click on a link that will take the user to a fraudulent Lack of Information Assurance knowledgewebsite that appears legitimate. The user then may be and warning indicatorsasked to provide personal information, such as accountusernames and passwords that can further expose them,their network, and their unit to future compromises. Visually deceptive textIn order to fully understand phishing and how it can impact Image maskingyou and your unit, you should be aware that there aredifferent types of phishing: Image mimicking WindowsPhishing is usually an e-mail sent to a large group ofpeople that attempts to scam the recipients. The peoplethe message is sent to often do not have anything incommon.Spear phishing is a message sent to a smaller, moreselect group of targeted people or to a single individual.Whaling or whale phishing is a highly personalizedmessage sent to senior executives, high-level officials ,ortheir personal executive staff members.
  • 2. Enterprise Center (NEC) Assurance Officer and your servicing Network http://www.us-cert.gov/reading_room/emailscams_0905.pdfReport Phishing Attacks to Your Local Information Recognizing & Avoiding Email Scams:SUSPICIOUS ACTIVITY REPORTING servicing Network Enterprise Center (NEC). your local Information Assurance Officer and If you are using a government computer, contact just experienced. and inform them about the phishing attack you Click the contact us link found on most websites account information and password. Follow the websites instructions to change your or change password link. Sign into your account and click the user profile address bar. Type the website name in your browsers real website: Change your password immediately at the Anti Phishing Quick Reaction Drill Phished! I think Ive been Help! What is Phishing? Why Phishing WorksPhishing is an attempt by an individual or group tosolicit personal information from unsuspecting usersby employing social engineering techniques (i.e., We are easily enticed we trust knownmanipulatingpeople into performing actions or divulging brands/logosconfidential information). Phishing emails are crafted toappear as if they were sent from a legitimate organization Lack of user education and awarenessor known individual. These emails often attempt to attractusers to click on a link that will take the user to a fraudulent Lack of Information Assurance knowledgewebsite that appears legitimate. The user then may be and warning indicatorsasked to provide personal information, such as accountusernames and passwords that can further expose them,their network, and their unit to future compromises. Visually deceptive textIn order to fully understand phishing and how it can impact Image maskingyou and your unit, you should be aware that there aredifferent types of phishing: Image mimicking WindowsPhishing is usually an e-mail sent to a large group ofpeople that attempts to scam the recipients. The peoplethe message is sent to often do not have anything incommon.Spear phishing is a message sent to a smaller, moreselect group of targeted people or to a single individual.Whaling or whale phishing is a highly personalizedmessage sent to senior executives, high-level officials ,ortheir personal executive staff members.
  • 3. Enterprise Center (NEC) Assurance Officer and your servicing Network http://www.us-cert.gov/reading_room/emailscams_0905.pdfReport Phishing Attacks to Your Local Information Recognizing & Avoiding Email Scams:SUSPICIOUS ACTIVITY REPORTING servicing Network Enterprise Center (NEC). your local Information Assurance Officer and If you are using a government computer, contact just experienced. and inform them about the phishing attack you Click the contact us link found on most websites account information and password. Follow the websites instructions to change your or change password link. Sign into your account and click the user profile address bar. Type the website name in your browsers real website: Change your password immediately at the Anti Phishing Quick Rea

Recommended

View more >