SlideShare a Scribd company logo
1 of 12
Navy IO Center of Excellence



                                       Phishing Awareness




                                      Naval OPSEC Support Team (NOST)
                             Navy Information Operations Command (NIOC) Norfolk
                                             (757) 417-7100 DSN 537
                                                OPSEC@navy.mil
                                            www.nioc-norfolk.navy.mil
                                     http://www.facebook.com/NavalOPSEC

                                                      UNCLASSIFIED//FOUO
Updated: 27 Mar 2013
Phishing
           Navy IO Center of Excellence


Phishing is an illegal activity using social engineering techniques to
fraudulently solicit sensitive information or install malicious software.
Phishing attempts solicit sensitive information such as usernames,
passwords, personal information, military operations details, financial
information and so on.
Phishing emails can also include malicious links or attachments.
Common phishing techniques:
        - Phishing
        - Spear phishing
        - Whaling
        - Vishing
        - Smishing
                                          UNCLASSIFIED//FOUO
What is phishing?
         Navy IO Center of Excellence

Phishing: An email scam intended to lure a user into providing sensitive
information.



                                                         • Yahoo link URL spoofing
                                                             • A fake or forged URL which
                                                               impersonates a legitimate
                                                               website.
                                                         • Requests credit card information
                                                         • Threatens service interruption




                                        UNCLASSIFIED//FOUO
What is spear phishing?
         Navy IO Center of Excellence

Spear phishing: A targeted scam directed at a specific person or
department.
                                                   • Addresses the target/recipient by
                                                     name or other personal detail
                                                        • Attacker generally references
                                                          specific personal information
                                                          about the target.
                                                   • Emails appear legitimate
                                                        • References factually correct
                                                          details, operational terms, etc.
                   Malicious URL
                                                   • Links or attachments malicious in
                                                     nature.
                                                        • Viruses, malware, URL spoofing


                                        UNCLASSIFIED//FOUO
What is whaling?
          Navy IO Center of Excellence

Whaling: A phishing scam directed specifically at high ranking officers
or other high profile targets within the government, military or business.

                                                   •   Addresses the high profile target by
                                                       name or other personal detail
                                                        • Attacker knows specific personal
                                                          information about the target.
                                                   • Emails appear legitimate
                                                        • Include specific, accurate details,
                                                          such as names and operational
                                                          details, to stress legitimacy.
            Download includes a keystroke
            logger virus                           • Links or attachments malicious in
                                                     nature.
                                                        • Viruses, malware, URL spoofing

                                         UNCLASSIFIED//FOUO
What is vishing?
         Navy IO Center of Excellence

Vishing: A phone scam intended to lure a user into providing sensitive
personal information.
                                                 •    Typically solicit personal
                                                     information through scare tactics
                                                      • Warns of credit card fraud,
                                                        instruct target to provide account
                                                        details to prove identity
                                                 • Callers often imitate legitimate call
                                                   centers
                                                 • Target specific, critical details
                                                      • Financial information,
                                                        operational dates, locations, etc.



                                        UNCLASSIFIED//FOUO
What is smishing?
         Navy IO Center of Excellence

Smishing: A phishing scam that sends bogus text messages to mobile
phones.
                                                  •    Direct a target to call a number or
                                                      link to a website.
                                                       • Personal, sensitive information is
                                                         requested
                                                       • Malicious websites install
                                                         malware on mobile devices,
                                                         collect sensitive information
                                                  • Callers often imitate legitimate call
                                                    centers
                                                  • Target specific, critical details
                                                       • Financial information,
                                                         operational dates, locations, etc

                                        UNCLASSIFIED//FOUO
What is sextortion?
         Navy IO Center of Excellence

Sextortion: Sexual exploitation as a means of blackmail or extortion.

                                                 • Sexually explicit content obtained
                                                   through enticement or theft is
                                                   leveraged against a person.
                                                      • Money
                                                      • Sex
                                                      • Information
                                                 • Extortionists commonly find targets
                                                   on:
                                                      • Social networking sites
                                                      • Mobile applications (i.e. instagram)
                                                      • Private chat messages & chat rooms
                                                      • Web cams


                                        UNCLASSIFIED//FOUO
Identifying a phishing scam
              Navy IO Center of Excellence


Phishing scams tend to have common characteristics which make them easy to identify.
• Spelling and punctuation errors.
• Include a redirect to malicious URL’s which require you input usernames and passwords
   to access.
• Scare tactics to entice a target to provide personal information or follow links.
• Sensational subject lines to entice targets to click on attached links or provide personal
   information.
• Try to appear genuine by using legitimate operational terms, key words and accurate
   personal information.
• Fake or unknown sender.




                                             UNCLASSIFIED//FOUO
How to avoid a phishing scam
              Navy IO Center of Excellence


Protect yourself from phishing scams:
• Do not register official government/.mil email accounts with any commercial websites.
• Patch/update web browsers as needed.
• Beware the unknown sender or sensational subject line.
• You will never get a free iPad, don’t fill anything out.
• When in doubt, call your financial institutions to verify if your account has been
   compromised.
• Do not follow links included in emails or text messages, use a known good link instead.
• Digitally sign and encrypt emails where ever possible.
• Only follow links or download attachments from digitally signed emails.
• Do not follow links to unsubscribe from spam, simply mark as spam and delete.
• Do not make security challenge answers for account validation easy to guess/learn
   details.



                                             UNCLASSIFIED//FOUO
Digital signatures &
                                                              encryption
Navy IO Center of Excellence




                               UNCLASSIFIED//FOUO
Questions?
Navy IO Center of Excellence




         Naval OPSEC Support Team (NOST)
Navy Information Operations Command (NIOC) Norfolk
                (757) 417-7100 DSN 537
                   OPSEC@navy.mil
               www.nioc-norfolk.navy.mil
        http://www.facebook.com/NavalOPSEC
                               UNCLASSIFIED//FOUO

More Related Content

Viewers also liked

OPSEC for OMBUDSMEN
OPSEC for OMBUDSMENOPSEC for OMBUDSMEN
OPSEC for OMBUDSMENNaval OPSEC
 
Ventajas de la biodiversidad
Ventajas de la biodiversidadVentajas de la biodiversidad
Ventajas de la biodiversidadCARRANZA41255782
 
Uk computer emergency response team (cert) introduction to social engineering
Uk computer emergency response team (cert) introduction to social engineeringUk computer emergency response team (cert) introduction to social engineering
Uk computer emergency response team (cert) introduction to social engineeringPublicLeaker
 
An Approach to Detect Packets Using Packet Sniffing
An Approach to Detect Packets Using Packet SniffingAn Approach to Detect Packets Using Packet Sniffing
An Approach to Detect Packets Using Packet Sniffingijcses
 
Phishing-Email-Fraud-General
Phishing-Email-Fraud-GeneralPhishing-Email-Fraud-General
Phishing-Email-Fraud-GeneralAndrew Voorhies
 
Wired concept ppt-restaurants-fezz
Wired concept   ppt-restaurants-fezzWired concept   ppt-restaurants-fezz
Wired concept ppt-restaurants-fezzFaisal Khan
 
[Vietnam Mobile Day 2014] The new mobile marketing channel: Social Wifi Marke...
[Vietnam Mobile Day 2014] The new mobile marketing channel: Social Wifi Marke...[Vietnam Mobile Day 2014] The new mobile marketing channel: Social Wifi Marke...
[Vietnam Mobile Day 2014] The new mobile marketing channel: Social Wifi Marke...AiTi Education
 
Programa historia de la medicina Universidad Catolica Nordestana
Programa historia de la medicina Universidad Catolica NordestanaPrograma historia de la medicina Universidad Catolica Nordestana
Programa historia de la medicina Universidad Catolica NordestanaJorge Amarante
 
Curso online - Administracion de infraestructuras de red cisco
Curso online - Administracion de infraestructuras de red ciscoCurso online - Administracion de infraestructuras de red cisco
Curso online - Administracion de infraestructuras de red ciscoSantiago García Arroyo
 
Hypnose lernen Buch
Hypnose lernen BuchHypnose lernen Buch
Hypnose lernen Buchsuperantix
 
Loan Fund Annual Report 2014
Loan Fund Annual Report 2014Loan Fund Annual Report 2014
Loan Fund Annual Report 2014Seth Asimakos
 
Montana Farmers Market EBT Manual
Montana Farmers Market EBT ManualMontana Farmers Market EBT Manual
Montana Farmers Market EBT ManualElisaMendelsohn
 

Viewers also liked (20)

OPSEC for OMBUDSMEN
OPSEC for OMBUDSMENOPSEC for OMBUDSMEN
OPSEC for OMBUDSMEN
 
Day 3
Day 3Day 3
Day 3
 
Ventajas de la biodiversidad
Ventajas de la biodiversidadVentajas de la biodiversidad
Ventajas de la biodiversidad
 
Day 2
Day 2Day 2
Day 2
 
Uk computer emergency response team (cert) introduction to social engineering
Uk computer emergency response team (cert) introduction to social engineeringUk computer emergency response team (cert) introduction to social engineering
Uk computer emergency response team (cert) introduction to social engineering
 
Link Baiting
Link BaitingLink Baiting
Link Baiting
 
An Approach to Detect Packets Using Packet Sniffing
An Approach to Detect Packets Using Packet SniffingAn Approach to Detect Packets Using Packet Sniffing
An Approach to Detect Packets Using Packet Sniffing
 
Phishing-Email-Fraud-General
Phishing-Email-Fraud-GeneralPhishing-Email-Fraud-General
Phishing-Email-Fraud-General
 
Dossier de Capacidades de I+D+i del CITIC
Dossier de Capacidades de I+D+i del CITICDossier de Capacidades de I+D+i del CITIC
Dossier de Capacidades de I+D+i del CITIC
 
Wired concept ppt-restaurants-fezz
Wired concept   ppt-restaurants-fezzWired concept   ppt-restaurants-fezz
Wired concept ppt-restaurants-fezz
 
User Manual Tobii X120
User Manual Tobii X120User Manual Tobii X120
User Manual Tobii X120
 
[Vietnam Mobile Day 2014] The new mobile marketing channel: Social Wifi Marke...
[Vietnam Mobile Day 2014] The new mobile marketing channel: Social Wifi Marke...[Vietnam Mobile Day 2014] The new mobile marketing channel: Social Wifi Marke...
[Vietnam Mobile Day 2014] The new mobile marketing channel: Social Wifi Marke...
 
Milipol 2013
Milipol 2013Milipol 2013
Milipol 2013
 
Programa historia de la medicina Universidad Catolica Nordestana
Programa historia de la medicina Universidad Catolica NordestanaPrograma historia de la medicina Universidad Catolica Nordestana
Programa historia de la medicina Universidad Catolica Nordestana
 
wasilewski
wasilewskiwasilewski
wasilewski
 
Fondos publicos (5)
Fondos publicos (5)Fondos publicos (5)
Fondos publicos (5)
 
Curso online - Administracion de infraestructuras de red cisco
Curso online - Administracion de infraestructuras de red ciscoCurso online - Administracion de infraestructuras de red cisco
Curso online - Administracion de infraestructuras de red cisco
 
Hypnose lernen Buch
Hypnose lernen BuchHypnose lernen Buch
Hypnose lernen Buch
 
Loan Fund Annual Report 2014
Loan Fund Annual Report 2014Loan Fund Annual Report 2014
Loan Fund Annual Report 2014
 
Montana Farmers Market EBT Manual
Montana Farmers Market EBT ManualMontana Farmers Market EBT Manual
Montana Farmers Market EBT Manual
 

Similar to Phishing

Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxStephen Jesukanth Martin
 
Beware of Phishing Scams
Beware of Phishing ScamsBeware of Phishing Scams
Beware of Phishing ScamsNoel Waterman
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldAvishek Datta
 

Similar to Phishing (6)

phishing.pptx
phishing.pptxphishing.pptx
phishing.pptx
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptx
 
Phishing and prevention
Phishing and preventionPhishing and prevention
Phishing and prevention
 
Beware of Phishing Scams
Beware of Phishing ScamsBeware of Phishing Scams
Beware of Phishing Scams
 
edu 3 ppt.pptx
edu 3 ppt.pptxedu 3 ppt.pptx
edu 3 ppt.pptx
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark World
 

More from Naval OPSEC

Twitter 11 mar15
Twitter 11 mar15Twitter 11 mar15
Twitter 11 mar15Naval OPSEC
 
Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14Naval OPSEC
 
Smartphone 7 aug14
Smartphone 7 aug14Smartphone 7 aug14
Smartphone 7 aug14Naval OPSEC
 
Smartphone exif removal 30 jul14
Smartphone exif removal 30 jul14Smartphone exif removal 30 jul14
Smartphone exif removal 30 jul14Naval OPSEC
 
Securing home wifi 16 mar15
Securing home wifi 16 mar15Securing home wifi 16 mar15
Securing home wifi 16 mar15Naval OPSEC
 
Photo sharing services 10 mar15
Photo sharing services 10 mar15Photo sharing services 10 mar15
Photo sharing services 10 mar15Naval OPSEC
 
Opt out-3 jul2014
Opt out-3 jul2014Opt out-3 jul2014
Opt out-3 jul2014Naval OPSEC
 
Online registration 25 aug14
Online registration 25 aug14Online registration 25 aug14
Online registration 25 aug14Naval OPSEC
 
Mobile wallets 5 nov14
Mobile wallets 5 nov14Mobile wallets 5 nov14
Mobile wallets 5 nov14Naval OPSEC
 
Linked in 10mar15
Linked in 10mar15Linked in 10mar15
Linked in 10mar15Naval OPSEC
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15Naval OPSEC
 
Google plus 10 mar15
Google plus 10 mar15Google plus 10 mar15
Google plus 10 mar15Naval OPSEC
 
Facebook mobile 11mar15
Facebook mobile 11mar15Facebook mobile 11mar15
Facebook mobile 11mar15Naval OPSEC
 
Facebook 10 mar15
Facebook 10 mar15Facebook 10 mar15
Facebook 10 mar15Naval OPSEC
 
Anonymous email 26 aug14
Anonymous email 26 aug14Anonymous email 26 aug14
Anonymous email 26 aug14Naval OPSEC
 
Child safety 16 jun14
Child safety 16 jun14Child safety 16 jun14
Child safety 16 jun14Naval OPSEC
 
Opsec & sns for distro (no vid)
Opsec & sns for distro (no vid)Opsec & sns for distro (no vid)
Opsec & sns for distro (no vid)Naval OPSEC
 
FB Privacy Settings Jan 2015
FB Privacy Settings Jan 2015FB Privacy Settings Jan 2015
FB Privacy Settings Jan 2015Naval OPSEC
 

More from Naval OPSEC (20)

Twitter 11 mar15
Twitter 11 mar15Twitter 11 mar15
Twitter 11 mar15
 
Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14
 
Smartphone 7 aug14
Smartphone 7 aug14Smartphone 7 aug14
Smartphone 7 aug14
 
Smartphone exif removal 30 jul14
Smartphone exif removal 30 jul14Smartphone exif removal 30 jul14
Smartphone exif removal 30 jul14
 
Securing home wifi 16 mar15
Securing home wifi 16 mar15Securing home wifi 16 mar15
Securing home wifi 16 mar15
 
Photo sharing services 10 mar15
Photo sharing services 10 mar15Photo sharing services 10 mar15
Photo sharing services 10 mar15
 
Opt out-3 jul2014
Opt out-3 jul2014Opt out-3 jul2014
Opt out-3 jul2014
 
Online registration 25 aug14
Online registration 25 aug14Online registration 25 aug14
Online registration 25 aug14
 
Mobile wallets 5 nov14
Mobile wallets 5 nov14Mobile wallets 5 nov14
Mobile wallets 5 nov14
 
Linked in 10mar15
Linked in 10mar15Linked in 10mar15
Linked in 10mar15
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15
 
Google plus 10 mar15
Google plus 10 mar15Google plus 10 mar15
Google plus 10 mar15
 
Facebook mobile 11mar15
Facebook mobile 11mar15Facebook mobile 11mar15
Facebook mobile 11mar15
 
Facebook 10 mar15
Facebook 10 mar15Facebook 10 mar15
Facebook 10 mar15
 
Anonymous email 26 aug14
Anonymous email 26 aug14Anonymous email 26 aug14
Anonymous email 26 aug14
 
Child safety 16 jun14
Child safety 16 jun14Child safety 16 jun14
Child safety 16 jun14
 
Opsec & sns for distro (no vid)
Opsec & sns for distro (no vid)Opsec & sns for distro (no vid)
Opsec & sns for distro (no vid)
 
FB Privacy Settings Jan 2015
FB Privacy Settings Jan 2015FB Privacy Settings Jan 2015
FB Privacy Settings Jan 2015
 
Smartphone
SmartphoneSmartphone
Smartphone
 
Opsec SNS
Opsec SNSOpsec SNS
Opsec SNS
 

Recently uploaded

Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 

Recently uploaded (20)

Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 

Phishing

  • 1. Navy IO Center of Excellence Phishing Awareness Naval OPSEC Support Team (NOST) Navy Information Operations Command (NIOC) Norfolk (757) 417-7100 DSN 537 OPSEC@navy.mil www.nioc-norfolk.navy.mil http://www.facebook.com/NavalOPSEC UNCLASSIFIED//FOUO Updated: 27 Mar 2013
  • 2. Phishing Navy IO Center of Excellence Phishing is an illegal activity using social engineering techniques to fraudulently solicit sensitive information or install malicious software. Phishing attempts solicit sensitive information such as usernames, passwords, personal information, military operations details, financial information and so on. Phishing emails can also include malicious links or attachments. Common phishing techniques: - Phishing - Spear phishing - Whaling - Vishing - Smishing UNCLASSIFIED//FOUO
  • 3. What is phishing? Navy IO Center of Excellence Phishing: An email scam intended to lure a user into providing sensitive information. • Yahoo link URL spoofing • A fake or forged URL which impersonates a legitimate website. • Requests credit card information • Threatens service interruption UNCLASSIFIED//FOUO
  • 4. What is spear phishing? Navy IO Center of Excellence Spear phishing: A targeted scam directed at a specific person or department. • Addresses the target/recipient by name or other personal detail • Attacker generally references specific personal information about the target. • Emails appear legitimate • References factually correct details, operational terms, etc. Malicious URL • Links or attachments malicious in nature. • Viruses, malware, URL spoofing UNCLASSIFIED//FOUO
  • 5. What is whaling? Navy IO Center of Excellence Whaling: A phishing scam directed specifically at high ranking officers or other high profile targets within the government, military or business. • Addresses the high profile target by name or other personal detail • Attacker knows specific personal information about the target. • Emails appear legitimate • Include specific, accurate details, such as names and operational details, to stress legitimacy. Download includes a keystroke logger virus • Links or attachments malicious in nature. • Viruses, malware, URL spoofing UNCLASSIFIED//FOUO
  • 6. What is vishing? Navy IO Center of Excellence Vishing: A phone scam intended to lure a user into providing sensitive personal information. • Typically solicit personal information through scare tactics • Warns of credit card fraud, instruct target to provide account details to prove identity • Callers often imitate legitimate call centers • Target specific, critical details • Financial information, operational dates, locations, etc. UNCLASSIFIED//FOUO
  • 7. What is smishing? Navy IO Center of Excellence Smishing: A phishing scam that sends bogus text messages to mobile phones. • Direct a target to call a number or link to a website. • Personal, sensitive information is requested • Malicious websites install malware on mobile devices, collect sensitive information • Callers often imitate legitimate call centers • Target specific, critical details • Financial information, operational dates, locations, etc UNCLASSIFIED//FOUO
  • 8. What is sextortion? Navy IO Center of Excellence Sextortion: Sexual exploitation as a means of blackmail or extortion. • Sexually explicit content obtained through enticement or theft is leveraged against a person. • Money • Sex • Information • Extortionists commonly find targets on: • Social networking sites • Mobile applications (i.e. instagram) • Private chat messages & chat rooms • Web cams UNCLASSIFIED//FOUO
  • 9. Identifying a phishing scam Navy IO Center of Excellence Phishing scams tend to have common characteristics which make them easy to identify. • Spelling and punctuation errors. • Include a redirect to malicious URL’s which require you input usernames and passwords to access. • Scare tactics to entice a target to provide personal information or follow links. • Sensational subject lines to entice targets to click on attached links or provide personal information. • Try to appear genuine by using legitimate operational terms, key words and accurate personal information. • Fake or unknown sender. UNCLASSIFIED//FOUO
  • 10. How to avoid a phishing scam Navy IO Center of Excellence Protect yourself from phishing scams: • Do not register official government/.mil email accounts with any commercial websites. • Patch/update web browsers as needed. • Beware the unknown sender or sensational subject line. • You will never get a free iPad, don’t fill anything out. • When in doubt, call your financial institutions to verify if your account has been compromised. • Do not follow links included in emails or text messages, use a known good link instead. • Digitally sign and encrypt emails where ever possible. • Only follow links or download attachments from digitally signed emails. • Do not follow links to unsubscribe from spam, simply mark as spam and delete. • Do not make security challenge answers for account validation easy to guess/learn details. UNCLASSIFIED//FOUO
  • 11. Digital signatures & encryption Navy IO Center of Excellence UNCLASSIFIED//FOUO
  • 12. Questions? Navy IO Center of Excellence Naval OPSEC Support Team (NOST) Navy Information Operations Command (NIOC) Norfolk (757) 417-7100 DSN 537 OPSEC@navy.mil www.nioc-norfolk.navy.mil http://www.facebook.com/NavalOPSEC UNCLASSIFIED//FOUO

Editor's Notes

  1. Source: http://www.wired.com/dangerroom/2013/03/air-force-sextortion/