Phishing Storyboard_Final
-
Upload
jill-gosby -
Category
Documents
-
view
19 -
download
1
Transcript of Phishing Storyboard_Final
![Page 1: Phishing Storyboard_Final](https://reader033.fdocuments.in/reader033/viewer/2022042821/55d23e79bb61eb85768b4648/html5/thumbnails/1.jpg)
![Page 2: Phishing Storyboard_Final](https://reader033.fdocuments.in/reader033/viewer/2022042821/55d23e79bb61eb85768b4648/html5/thumbnails/2.jpg)
ObjectivesAt the end of this demo, you will be able to:• Identify phishing attempts after reinforced training•Separate legitimate Information-seeking requests from scamming/phishing attempts•Demonstrate the appropriate response to Social Engineering exercises
![Page 3: Phishing Storyboard_Final](https://reader033.fdocuments.in/reader033/viewer/2022042821/55d23e79bb61eb85768b4648/html5/thumbnails/3.jpg)
What is Social Engineering?
![Page 4: Phishing Storyboard_Final](https://reader033.fdocuments.in/reader033/viewer/2022042821/55d23e79bb61eb85768b4648/html5/thumbnails/4.jpg)
What is Phishing?
![Page 5: Phishing Storyboard_Final](https://reader033.fdocuments.in/reader033/viewer/2022042821/55d23e79bb61eb85768b4648/html5/thumbnails/5.jpg)
Types of Phishing Vishing Smishing Spearing
To: SusanFrom: DavidClick on the link to continue…http://mail.yahoo.com
Whaling
To: SusanFrom: DavidClick on the link to continue…http://mail.yahoo.si.com
Cloning
![Page 6: Phishing Storyboard_Final](https://reader033.fdocuments.in/reader033/viewer/2022042821/55d23e79bb61eb85768b4648/html5/thumbnails/6.jpg)
Signs of Attack
Key signs include: •Requesting personal information •Refusal to give contact information•Rushing-Instilling a sense of urgency•Name-dropping o• Intimidation to induce panic
![Page 7: Phishing Storyboard_Final](https://reader033.fdocuments.in/reader033/viewer/2022042821/55d23e79bb61eb85768b4648/html5/thumbnails/7.jpg)
Protecting Yourself • Be aware of public data and
manage social media practices (i.e. Facebook)
• Be suspicious of requests for personal information
![Page 8: Phishing Storyboard_Final](https://reader033.fdocuments.in/reader033/viewer/2022042821/55d23e79bb61eb85768b4648/html5/thumbnails/8.jpg)
Protecting Yourself • Remember, TSA will never ask for confidential information • Never supply personal
information via email or phone, never download attachments or click hyperlinks from unreliable sources (make sure that the automatic download option is not selected)
![Page 9: Phishing Storyboard_Final](https://reader033.fdocuments.in/reader033/viewer/2022042821/55d23e79bb61eb85768b4648/html5/thumbnails/9.jpg)
Knowledge Check
![Page 10: Phishing Storyboard_Final](https://reader033.fdocuments.in/reader033/viewer/2022042821/55d23e79bb61eb85768b4648/html5/thumbnails/10.jpg)
For More Information TSA Cyber Security Awareness and Outreach Team – [email protected]
TSA Single Point of Contact (SPOC) – (800) 253 8571
SPAM Reporting – [email protected]