SlideShare a Scribd company logo
1 of 10
Download to read offline
BANKOLE BOLAJI JAMES | CYBER FORENSIC AND SECURITY EXPERT |CISCO CYBER SECURITY
EXPERT: CCSE |CERTIFIED ETHICAL HACKER: CEH |MCSA, MCSE, MCP, MCITP, MCTS | CISCO
CERTIFIED NETWORK ASSOCIATE: CCNA|
EMAIL: BOLAJICISCO@YAHOO.COM|+2347035654727|+2348027042202
BANKOLE BOLAJI JAMES | CYBER FORENSIC AND SECURITY EXPERT |CISCO CYBER SECURITY
EXPERT: CCSE |CERTIFIED ETHICAL HACKER: CEH |MCSA, MCSE, MCP, MCITP, MCTS | CISCO
CERTIFIED NETWORK ASSOCIATE: CCNA|
EMAIL: BOLAJICISCO@YAHOO.COM|+2347035654727|+2348027042202
A CALL FOR WAR AGAINST IDENTITY THEFT
AND
PHISHING ATTACK
The rate at which employee’s fall victim of Identity Theft and Phishing attack.
Promote the education of employees and conduct training sessions with mock
phishing scenarios.
The fact that organizations have Information Technology/Information Security
Team who could help establish and continuously create awareness
Cyber security has risen to become a national concern as threats
Concerning it now need to be taken more seriously.
• To help people reduce the vulnerability of their Information and
Communication Technology (ICT) systems and networks.
• To help individuals and institutions develop and nurture a
Culture of cyber security.
• To work collaboratively with public, private and international
Experts to secure cyberspace.
• To help understand the current trends in IT/cybercrime, and
Develop effective solutions.
• Availability.
• Integrity, which may include authenticity and non-repudiation.• Confidentiality.
BANKOLE BOLAJI JAMES | CYBER FORENSIC AND SECURITY EXPERT |CISCO CYBER SECURITY
EXPERT: CCSE |CERTIFIED ETHICAL HACKER: CEH |MCSA, MCSE, MCP, MCITP, MCTS | CISCO
CERTIFIED NETWORK ASSOCIATE: CCNA|
EMAIL: BOLAJICISCO@YAHOO.COM|+2347035654727|+2348027042202
Is the fraudulent practice of using another person's name and personal
information in order to obtain credit, loans.
Every 2 seconds, someone becomes a victim of identity theft, that means by
the time you finish reading this sentence, the next victim could be you.
Identity theft is categorized in two ways: true name and account takeover.
True name identity theft means that the thief uses personal information to
open new accounts. The thief might open a new credit card account, establish
cellular phone service, or open a new checking account in order to obtain
blank checks.
Account takeover identity theft means the imposter uses personal information
to gain access to the person's existing accounts. Typically, the thief will change
the mailing address on an account and run up a huge bill before the person
whose identity has been stolen realizes there is a problem. The Internet has
made it easier for an identity thief to use the information they've stolen
because transactions can be made without any personal interaction.
BANKOLE BOLAJI JAMES | CYBER FORENSIC AND SECURITY EXPERT |CISCO CYBER SECURITY
EXPERT: CCSE |CERTIFIED ETHICAL HACKER: CEH |MCSA, MCSE, MCP, MCITP, MCTS | CISCO
CERTIFIED NETWORK ASSOCIATE: CCNA|
EMAIL: BOLAJICISCO@YAHOO.COM|+2347035654727|+2348027042202
Your best defense starts with educating yourself about the threat, the risk you
are facing as an Internet player or a Technology owner or user.
Understanding the threat and the types of attack
Internet connectivity and email system is an Important integral part of every
business that need attention professionals in which such Infrastructure is to be
managed by concerns experts in each field of practice. there is no guaranteed way
to stop a determined intruder from accessing a business network, Reliance on
email and the internet brings vulnerabilities which must be recognized and
addressed appropriately.
The IT security community has assessed that Spear Phishing is a remarkably
effective cyber-attack technique and its use to gain access to business systems is
unlikely to decline in the near future.
 Spear Phishing attack is a lunched to successfully deceive the users so as to gain
access to confidential information..
 There is a great increase in the rate at which phishing attack is been lunched
against an organizations.
 Spear Phishing has a high success rate and its use as a means of attack looks set
to continue.
 Successful attacks can result in exploitation or compromise of individual devices
and organizational networks. This can have significant implications for an
organization.
BANKOLE BOLAJI JAMES | CYBER FORENSIC AND SECURITY EXPERT |CISCO CYBER SECURITY
EXPERT: CCSE |CERTIFIED ETHICAL HACKER: CEH |MCSA, MCSE, MCP, MCITP, MCTS | CISCO
CERTIFIED NETWORK ASSOCIATE: CCNA|
EMAIL: BOLAJICISCO@YAHOO.COM|+2347035654727|+2348027042202
 The risk from Spear Phishing can be reduced through good
educational awareness and effective technical controls.
BANKOLE BOLAJI JAMES | CYBER FORENSIC AND SECURITY EXPERT |CISCO CYBER SECURITY
EXPERT: CCSE |CERTIFIED ETHICAL HACKER: CEH |MCSA, MCSE, MCP, MCITP, MCTS | CISCO
CERTIFIED NETWORK ASSOCIATE: CCNA|
EMAIL: BOLAJICISCO@YAHOO.COM|+2347035654727|+2348027042202
The purpose of phishing is to collect sensitive information with the intention of
using that information to gain access to otherwise protected data, networks, etc.
A phisher's success is contingent upon establishing trust with its victims. We live
in a digital age, and gathering information has become much easier as we are well
beyond the dumpster diving days.
There are various phishing techniques used by attackers:
 Embedding a link in an email that redirects your employee to an unsecure
website that requests sensitive information
 Installing a Trojan via a malicious email attachment or ad which will allow
the intruder to exploit loopholes and obtain sensitive information
 Spoofing the sender address in an email to appear as a reputable source and
request sensitive information
 Attempting to obtain company information over the phone by impersonating
a known company vendor or IT department
BANKOLE BOLAJI JAMES | CYBER FORENSIC AND SECURITY EXPERT |CISCO CYBER SECURITY
EXPERT: CCSE |CERTIFIED ETHICAL HACKER: CEH |MCSA, MCSE, MCP, MCITP, MCTS | CISCO
CERTIFIED NETWORK ASSOCIATE: CCNA|
EMAIL: BOLAJICISCO@YAHOO.COM|+2347035654727|+2348027042202
They must keep a pulse on the current phishing strategies and confirm their
security policies and solutions can eliminate threats as they evolve.
It is equally as important to make sure that their employees understand the types of
attacks they may face, the risks, and how to address them. Informed employees and
properly secured systems are key when protecting your company from phishing
attacks.
What to do if you’re a victim
How to protect yourself
Here are a few steps a company can take to
protect itself against phishing:
 Educate your employees and conduct training sessions with mock phishing
scenarios.
 Deploy a SPAM filter that detects viruses, blank senders, etc.
 Keep all systems current with the latest security patches and updates.
 Install an antivirus solution, schedule signature updates, and monitor the
antivirus status on all equipment.
 Develop a security policy that includes but isn't limited to password
expiration and complexity.
 Deploy a web filter to block malicious websites.
 Encrypt all sensitive company information.
 Convert HTML email into text only email messages or disable HTML email
messages.
 Require encryption for employees that are telecommuting.
BANKOLE BOLAJI JAMES | CYBER FORENSIC AND SECURITY EXPERT |CISCO CYBER SECURITY
EXPERT: CCSE |CERTIFIED ETHICAL HACKER: CEH |MCSA, MCSE, MCP, MCITP, MCTS | CISCO
CERTIFIED NETWORK ASSOCIATE: CCNA|
EMAIL: BOLAJICISCO@YAHOO.COM|+2347035654727|+2348027042202
This plans to steal PayPal Information and credential
If this becomes successful they will Impersonate as the owner of account information and
credential and the link below will simply allow them have your confidential information on
their server without stress.
BANKOLE BOLAJI JAMES | CYBER FORENSIC AND SECURITY EXPERT |CISCO CYBER SECURITY
EXPERT: CCSE |CERTIFIED ETHICAL HACKER: CEH |MCSA, MCSE, MCP, MCITP, MCTS | CISCO
CERTIFIED NETWORK ASSOCIATE: CCNA|
EMAIL: BOLAJICISCO@YAHOO.COM|+2347035654727|+2348027042202
BANKOLE BOLAJI JAMES | CYBER FORENSIC AND SECURITY EXPERT |CISCO CYBER SECURITY
EXPERT: CCSE |CERTIFIED ETHICAL HACKER: CEH |MCSA, MCSE, MCP, MCITP, MCTS | CISCO
CERTIFIED NETWORK ASSOCIATE: CCNA|
EMAIL: BOLAJICISCO@YAHOO.COM|+2347035654727|+2348027042202
PROPOSED MITIGATION PLAN
Develop an effective Information security awareness
training for all employee alongside the Implementation of
effective technical/system control for the organization
This document is developed for educational purposes in other to help bring to
mind current threats, proffer ways to mitigate attacks ,Inspire someone to
develop proactive approach to combat cyber crime with proven security solutions
and services that protect systems, networks, and mobile devices for business
and personal use around the world and give everyone the confidence to live and
work safely and securely in the digital world

More Related Content

What's hot

September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9seadeloitte
 
Strong authentication implementation guide
Strong authentication   implementation guideStrong authentication   implementation guide
Strong authentication implementation guideNis
 
Cyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access managementCyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access managementseadeloitte
 
August 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber AttackerAugust 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber Attackerseadeloitte
 
Anatomy of a spear phishing attack
Anatomy of a spear phishing attackAnatomy of a spear phishing attack
Anatomy of a spear phishing attackMark Mair
 
Application security meetup data privacy_27052021
Application security meetup data privacy_27052021Application security meetup data privacy_27052021
Application security meetup data privacy_27052021lior mazor
 
Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Entersoft Security
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber securityHelen Carpenter
 
Weak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your AssetsWeak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your AssetsOilPriceInformationService
 
Laudon traver ec11-im_ch05
Laudon traver ec11-im_ch05Laudon traver ec11-im_ch05
Laudon traver ec11-im_ch05BookStoreLib
 
Cyber security master class 2018
Cyber security master class 2018Cyber security master class 2018
Cyber security master class 2018Sanjana Khound
 
Safeguarding PeopleSoft Against Direct Deposit Theft
Safeguarding PeopleSoft Against Direct Deposit TheftSafeguarding PeopleSoft Against Direct Deposit Theft
Safeguarding PeopleSoft Against Direct Deposit TheftAppsian
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasuresJorge Sebastiao
 

What's hot (20)

September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9
 
Strong authentication implementation guide
Strong authentication   implementation guideStrong authentication   implementation guide
Strong authentication implementation guide
 
Cyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access managementCyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access management
 
August 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber AttackerAugust 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber Attacker
 
Anatomy of a spear phishing attack
Anatomy of a spear phishing attackAnatomy of a spear phishing attack
Anatomy of a spear phishing attack
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Application security meetup data privacy_27052021
Application security meetup data privacy_27052021Application security meetup data privacy_27052021
Application security meetup data privacy_27052021
 
Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018
 
Phishing
PhishingPhishing
Phishing
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber security
 
Weak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your AssetsWeak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your Assets
 
Laudon traver ec11-im_ch05
Laudon traver ec11-im_ch05Laudon traver ec11-im_ch05
Laudon traver ec11-im_ch05
 
Cyber security master class 2018
Cyber security master class 2018Cyber security master class 2018
Cyber security master class 2018
 
Safeguarding PeopleSoft Against Direct Deposit Theft
Safeguarding PeopleSoft Against Direct Deposit TheftSafeguarding PeopleSoft Against Direct Deposit Theft
Safeguarding PeopleSoft Against Direct Deposit Theft
 
Hacking3e ppt ch15
Hacking3e ppt ch15Hacking3e ppt ch15
Hacking3e ppt ch15
 
Phishing
PhishingPhishing
Phishing
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Phishing and hacking
Phishing and hackingPhishing and hacking
Phishing and hacking
 
Phishing
PhishingPhishing
Phishing
 

Viewers also liked

Thriller Eval Q5
Thriller Eval Q5Thriller Eval Q5
Thriller Eval Q5sturner31
 
Krl 2 ses 8 (8 27-2012)
Krl 2 ses 8 (8 27-2012)Krl 2 ses 8 (8 27-2012)
Krl 2 ses 8 (8 27-2012)Bong Baylon
 
It is the iPod's world, we just live in it.
It is the iPod's world, we just live in it.It is the iPod's world, we just live in it.
It is the iPod's world, we just live in it.Clinton Forry
 
Matthew Tukaki, Sustainability, Climate Change, Unions, Business, China, Carb...
Matthew Tukaki, Sustainability, Climate Change, Unions, Business, China, Carb...Matthew Tukaki, Sustainability, Climate Change, Unions, Business, China, Carb...
Matthew Tukaki, Sustainability, Climate Change, Unions, Business, China, Carb...mtukaki
 
Citations genantes-pour-qui
Citations genantes-pour-quiCitations genantes-pour-qui
Citations genantes-pour-quiangrequen
 
Gva 13052015 smart media fokustransport&logistiek
Gva 13052015 smart media fokustransport&logistiekGva 13052015 smart media fokustransport&logistiek
Gva 13052015 smart media fokustransport&logistiekCombinant nv
 
History week 4
History week 4History week 4
History week 4whermina
 

Viewers also liked (13)

Angelica chasiluisasenti20
Angelica chasiluisasenti20Angelica chasiluisasenti20
Angelica chasiluisasenti20
 
Thriller Eval Q5
Thriller Eval Q5Thriller Eval Q5
Thriller Eval Q5
 
Krl 2 ses 8 (8 27-2012)
Krl 2 ses 8 (8 27-2012)Krl 2 ses 8 (8 27-2012)
Krl 2 ses 8 (8 27-2012)
 
It is the iPod's world, we just live in it.
It is the iPod's world, we just live in it.It is the iPod's world, we just live in it.
It is the iPod's world, we just live in it.
 
Live Your Dream JCI konferencija 2012
Live Your Dream JCI konferencija 2012Live Your Dream JCI konferencija 2012
Live Your Dream JCI konferencija 2012
 
Matthew Tukaki, Sustainability, Climate Change, Unions, Business, China, Carb...
Matthew Tukaki, Sustainability, Climate Change, Unions, Business, China, Carb...Matthew Tukaki, Sustainability, Climate Change, Unions, Business, China, Carb...
Matthew Tukaki, Sustainability, Climate Change, Unions, Business, China, Carb...
 
Gerencia industrial
Gerencia industrialGerencia industrial
Gerencia industrial
 
European
EuropeanEuropean
European
 
Citations genantes-pour-qui
Citations genantes-pour-quiCitations genantes-pour-qui
Citations genantes-pour-qui
 
Examen del primer quimestre
Examen del primer quimestreExamen del primer quimestre
Examen del primer quimestre
 
Gva 13052015 smart media fokustransport&logistiek
Gva 13052015 smart media fokustransport&logistiekGva 13052015 smart media fokustransport&logistiek
Gva 13052015 smart media fokustransport&logistiek
 
Social studies
Social studiesSocial studies
Social studies
 
History week 4
History week 4History week 4
History week 4
 

Similar to War against Identity Theft and Phising attack

Business Email Compromise: A Symptom Not A Cause.pdf
Business Email Compromise: A Symptom Not A Cause.pdfBusiness Email Compromise: A Symptom Not A Cause.pdf
Business Email Compromise: A Symptom Not A Cause.pdfNiloufer Tamboly
 
7 top tips to protect your business from BEC [infographic] By Stellarise
7 top tips to protect your business from BEC [infographic] By Stellarise7 top tips to protect your business from BEC [infographic] By Stellarise
7 top tips to protect your business from BEC [infographic] By StellariseElena Tatarenkova
 
Security human
Security humanSecurity human
Security humanJisc
 
INTERNET BANKING & SECURITY ANALYSIS
INTERNET BANKING & SECURITY ANALYSISINTERNET BANKING & SECURITY ANALYSIS
INTERNET BANKING & SECURITY ANALYSISRAHUL KUMAR
 
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awarenessOWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awarenessMaherHamza9
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresIRJET Journal
 
A Guide to Cyber Etiquette.pdf
A Guide to Cyber Etiquette.pdfA Guide to Cyber Etiquette.pdf
A Guide to Cyber Etiquette.pdfInfosec Train
 
Learn Why to Hire Certified Ethical Hackers USA.pptx
Learn Why to Hire Certified Ethical Hackers USA.pptxLearn Why to Hire Certified Ethical Hackers USA.pptx
Learn Why to Hire Certified Ethical Hackers USA.pptxTekkis
 
Cyber Defense For SMB's
Cyber Defense For SMB'sCyber Defense For SMB's
Cyber Defense For SMB'sGuise Bule
 
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...IRJET Journal
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Knowledge Group
 
Iron Bastion: Preventing business email compromise fraud at your firm
Iron Bastion: Preventing business email compromise fraud at your firmIron Bastion: Preventing business email compromise fraud at your firm
Iron Bastion: Preventing business email compromise fraud at your firmGabor Szathmari
 
The good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breachThe good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breachUlf Mattsson
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber securityCarol Meng-Shih Wang
 

Similar to War against Identity Theft and Phising attack (20)

Business Email Compromise: A Symptom Not A Cause.pdf
Business Email Compromise: A Symptom Not A Cause.pdfBusiness Email Compromise: A Symptom Not A Cause.pdf
Business Email Compromise: A Symptom Not A Cause.pdf
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
7 top tips to protect your business from BEC [infographic] By Stellarise
7 top tips to protect your business from BEC [infographic] By Stellarise7 top tips to protect your business from BEC [infographic] By Stellarise
7 top tips to protect your business from BEC [infographic] By Stellarise
 
Cyber Fraud and Risk Management By Bolaji Bankole
Cyber Fraud and Risk Management  By Bolaji BankoleCyber Fraud and Risk Management  By Bolaji Bankole
Cyber Fraud and Risk Management By Bolaji Bankole
 
Security human
Security humanSecurity human
Security human
 
INTERNET BANKING & SECURITY ANALYSIS
INTERNET BANKING & SECURITY ANALYSISINTERNET BANKING & SECURITY ANALYSIS
INTERNET BANKING & SECURITY ANALYSIS
 
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awarenessOWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
 
A Guide to Cyber Etiquette.pdf
A Guide to Cyber Etiquette.pdfA Guide to Cyber Etiquette.pdf
A Guide to Cyber Etiquette.pdf
 
Learn Why to Hire Certified Ethical Hackers USA.pptx
Learn Why to Hire Certified Ethical Hackers USA.pptxLearn Why to Hire Certified Ethical Hackers USA.pptx
Learn Why to Hire Certified Ethical Hackers USA.pptx
 
Click or Not to Click (Cyber Security Awareness )
Click or Not to Click (Cyber Security Awareness )Click or Not to Click (Cyber Security Awareness )
Click or Not to Click (Cyber Security Awareness )
 
Cyber Defense For SMB's
Cyber Defense For SMB'sCyber Defense For SMB's
Cyber Defense For SMB's
 
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
 
Iron Bastion: Preventing business email compromise fraud at your firm
Iron Bastion: Preventing business email compromise fraud at your firmIron Bastion: Preventing business email compromise fraud at your firm
Iron Bastion: Preventing business email compromise fraud at your firm
 
The good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breachThe good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breach
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber security
 

War against Identity Theft and Phising attack

  • 1. BANKOLE BOLAJI JAMES | CYBER FORENSIC AND SECURITY EXPERT |CISCO CYBER SECURITY EXPERT: CCSE |CERTIFIED ETHICAL HACKER: CEH |MCSA, MCSE, MCP, MCITP, MCTS | CISCO CERTIFIED NETWORK ASSOCIATE: CCNA| EMAIL: BOLAJICISCO@YAHOO.COM|+2347035654727|+2348027042202
  • 2. BANKOLE BOLAJI JAMES | CYBER FORENSIC AND SECURITY EXPERT |CISCO CYBER SECURITY EXPERT: CCSE |CERTIFIED ETHICAL HACKER: CEH |MCSA, MCSE, MCP, MCITP, MCTS | CISCO CERTIFIED NETWORK ASSOCIATE: CCNA| EMAIL: BOLAJICISCO@YAHOO.COM|+2347035654727|+2348027042202 A CALL FOR WAR AGAINST IDENTITY THEFT AND PHISHING ATTACK The rate at which employee’s fall victim of Identity Theft and Phishing attack. Promote the education of employees and conduct training sessions with mock phishing scenarios. The fact that organizations have Information Technology/Information Security Team who could help establish and continuously create awareness Cyber security has risen to become a national concern as threats Concerning it now need to be taken more seriously. • To help people reduce the vulnerability of their Information and Communication Technology (ICT) systems and networks. • To help individuals and institutions develop and nurture a Culture of cyber security. • To work collaboratively with public, private and international Experts to secure cyberspace. • To help understand the current trends in IT/cybercrime, and Develop effective solutions. • Availability. • Integrity, which may include authenticity and non-repudiation.• Confidentiality.
  • 3. BANKOLE BOLAJI JAMES | CYBER FORENSIC AND SECURITY EXPERT |CISCO CYBER SECURITY EXPERT: CCSE |CERTIFIED ETHICAL HACKER: CEH |MCSA, MCSE, MCP, MCITP, MCTS | CISCO CERTIFIED NETWORK ASSOCIATE: CCNA| EMAIL: BOLAJICISCO@YAHOO.COM|+2347035654727|+2348027042202 Is the fraudulent practice of using another person's name and personal information in order to obtain credit, loans. Every 2 seconds, someone becomes a victim of identity theft, that means by the time you finish reading this sentence, the next victim could be you. Identity theft is categorized in two ways: true name and account takeover. True name identity theft means that the thief uses personal information to open new accounts. The thief might open a new credit card account, establish cellular phone service, or open a new checking account in order to obtain blank checks. Account takeover identity theft means the imposter uses personal information to gain access to the person's existing accounts. Typically, the thief will change the mailing address on an account and run up a huge bill before the person whose identity has been stolen realizes there is a problem. The Internet has made it easier for an identity thief to use the information they've stolen because transactions can be made without any personal interaction.
  • 4. BANKOLE BOLAJI JAMES | CYBER FORENSIC AND SECURITY EXPERT |CISCO CYBER SECURITY EXPERT: CCSE |CERTIFIED ETHICAL HACKER: CEH |MCSA, MCSE, MCP, MCITP, MCTS | CISCO CERTIFIED NETWORK ASSOCIATE: CCNA| EMAIL: BOLAJICISCO@YAHOO.COM|+2347035654727|+2348027042202 Your best defense starts with educating yourself about the threat, the risk you are facing as an Internet player or a Technology owner or user. Understanding the threat and the types of attack Internet connectivity and email system is an Important integral part of every business that need attention professionals in which such Infrastructure is to be managed by concerns experts in each field of practice. there is no guaranteed way to stop a determined intruder from accessing a business network, Reliance on email and the internet brings vulnerabilities which must be recognized and addressed appropriately. The IT security community has assessed that Spear Phishing is a remarkably effective cyber-attack technique and its use to gain access to business systems is unlikely to decline in the near future.  Spear Phishing attack is a lunched to successfully deceive the users so as to gain access to confidential information..  There is a great increase in the rate at which phishing attack is been lunched against an organizations.  Spear Phishing has a high success rate and its use as a means of attack looks set to continue.  Successful attacks can result in exploitation or compromise of individual devices and organizational networks. This can have significant implications for an organization.
  • 5. BANKOLE BOLAJI JAMES | CYBER FORENSIC AND SECURITY EXPERT |CISCO CYBER SECURITY EXPERT: CCSE |CERTIFIED ETHICAL HACKER: CEH |MCSA, MCSE, MCP, MCITP, MCTS | CISCO CERTIFIED NETWORK ASSOCIATE: CCNA| EMAIL: BOLAJICISCO@YAHOO.COM|+2347035654727|+2348027042202  The risk from Spear Phishing can be reduced through good educational awareness and effective technical controls.
  • 6. BANKOLE BOLAJI JAMES | CYBER FORENSIC AND SECURITY EXPERT |CISCO CYBER SECURITY EXPERT: CCSE |CERTIFIED ETHICAL HACKER: CEH |MCSA, MCSE, MCP, MCITP, MCTS | CISCO CERTIFIED NETWORK ASSOCIATE: CCNA| EMAIL: BOLAJICISCO@YAHOO.COM|+2347035654727|+2348027042202 The purpose of phishing is to collect sensitive information with the intention of using that information to gain access to otherwise protected data, networks, etc. A phisher's success is contingent upon establishing trust with its victims. We live in a digital age, and gathering information has become much easier as we are well beyond the dumpster diving days. There are various phishing techniques used by attackers:  Embedding a link in an email that redirects your employee to an unsecure website that requests sensitive information  Installing a Trojan via a malicious email attachment or ad which will allow the intruder to exploit loopholes and obtain sensitive information  Spoofing the sender address in an email to appear as a reputable source and request sensitive information  Attempting to obtain company information over the phone by impersonating a known company vendor or IT department
  • 7. BANKOLE BOLAJI JAMES | CYBER FORENSIC AND SECURITY EXPERT |CISCO CYBER SECURITY EXPERT: CCSE |CERTIFIED ETHICAL HACKER: CEH |MCSA, MCSE, MCP, MCITP, MCTS | CISCO CERTIFIED NETWORK ASSOCIATE: CCNA| EMAIL: BOLAJICISCO@YAHOO.COM|+2347035654727|+2348027042202 They must keep a pulse on the current phishing strategies and confirm their security policies and solutions can eliminate threats as they evolve. It is equally as important to make sure that their employees understand the types of attacks they may face, the risks, and how to address them. Informed employees and properly secured systems are key when protecting your company from phishing attacks. What to do if you’re a victim How to protect yourself Here are a few steps a company can take to protect itself against phishing:  Educate your employees and conduct training sessions with mock phishing scenarios.  Deploy a SPAM filter that detects viruses, blank senders, etc.  Keep all systems current with the latest security patches and updates.  Install an antivirus solution, schedule signature updates, and monitor the antivirus status on all equipment.  Develop a security policy that includes but isn't limited to password expiration and complexity.  Deploy a web filter to block malicious websites.  Encrypt all sensitive company information.  Convert HTML email into text only email messages or disable HTML email messages.  Require encryption for employees that are telecommuting.
  • 8. BANKOLE BOLAJI JAMES | CYBER FORENSIC AND SECURITY EXPERT |CISCO CYBER SECURITY EXPERT: CCSE |CERTIFIED ETHICAL HACKER: CEH |MCSA, MCSE, MCP, MCITP, MCTS | CISCO CERTIFIED NETWORK ASSOCIATE: CCNA| EMAIL: BOLAJICISCO@YAHOO.COM|+2347035654727|+2348027042202 This plans to steal PayPal Information and credential If this becomes successful they will Impersonate as the owner of account information and credential and the link below will simply allow them have your confidential information on their server without stress.
  • 9. BANKOLE BOLAJI JAMES | CYBER FORENSIC AND SECURITY EXPERT |CISCO CYBER SECURITY EXPERT: CCSE |CERTIFIED ETHICAL HACKER: CEH |MCSA, MCSE, MCP, MCITP, MCTS | CISCO CERTIFIED NETWORK ASSOCIATE: CCNA| EMAIL: BOLAJICISCO@YAHOO.COM|+2347035654727|+2348027042202
  • 10. BANKOLE BOLAJI JAMES | CYBER FORENSIC AND SECURITY EXPERT |CISCO CYBER SECURITY EXPERT: CCSE |CERTIFIED ETHICAL HACKER: CEH |MCSA, MCSE, MCP, MCITP, MCTS | CISCO CERTIFIED NETWORK ASSOCIATE: CCNA| EMAIL: BOLAJICISCO@YAHOO.COM|+2347035654727|+2348027042202 PROPOSED MITIGATION PLAN Develop an effective Information security awareness training for all employee alongside the Implementation of effective technical/system control for the organization This document is developed for educational purposes in other to help bring to mind current threats, proffer ways to mitigate attacks ,Inspire someone to develop proactive approach to combat cyber crime with proven security solutions and services that protect systems, networks, and mobile devices for business and personal use around the world and give everyone the confidence to live and work safely and securely in the digital world