SlideShare a Scribd company logo
1 of 12
Navy IO Center of Excellence



                                       Phishing Awareness




                                      Naval OPSEC Support Team (NOST)
                             Navy Information Operations Command (NIOC) Norfolk
                                             (757) 417-7100 DSN 537
                                                OPSEC@navy.mil
                                            www.nioc-norfolk.navy.mil
                                     http://www.facebook.com/NavalOPSEC

                                                      UNCLASSIFIED//FOUO
Updated: 27 Mar 2013
Phishing
           Navy IO Center of Excellence


Phishing is an illegal activity using social engineering techniques to
fraudulently solicit sensitive information or install malicious software.
Phishing attempts solicit sensitive information such as usernames,
passwords, personal information, military operations details, financial
information and so on.
Phishing emails can also include malicious links or attachments.
Common phishing techniques:
        - Phishing
        - Spear phishing
        - Whaling
        - Vishing
        - Smishing
                                          UNCLASSIFIED//FOUO
What is phishing?
         Navy IO Center of Excellence

Phishing: An email scam intended to lure a user into providing sensitive
information.



                                                         • Yahoo link URL spoofing
                                                             • A fake or forged URL which
                                                               impersonates a legitimate
                                                               website.
                                                         • Requests credit card information
                                                         • Threatens service interruption




                                        UNCLASSIFIED//FOUO
What is spear phishing?
         Navy IO Center of Excellence

Spear phishing: A targeted scam directed at a specific person or
department.
                                                   • Addresses the target/recipient by
                                                     name or other personal detail
                                                        • Attacker generally references
                                                          specific personal information
                                                          about the target.
                                                   • Emails appear legitimate
                                                        • References factually correct
                                                          details, operational terms, etc.
                   Malicious URL
                                                   • Links or attachments malicious in
                                                     nature.
                                                        • Viruses, malware, URL spoofing


                                        UNCLASSIFIED//FOUO
What is whaling?
          Navy IO Center of Excellence

Whaling: A phishing scam directed specifically at high ranking officers
or other high profile targets within the government, military or business.

                                                   •   Addresses the high profile target by
                                                       name or other personal detail
                                                        • Attacker knows specific personal
                                                          information about the target.
                                                   • Emails appear legitimate
                                                        • Include specific, accurate details,
                                                          such as names and operational
                                                          details, to stress legitimacy.
            Download includes a keystroke
            logger virus                           • Links or attachments malicious in
                                                     nature.
                                                        • Viruses, malware, URL spoofing

                                         UNCLASSIFIED//FOUO
What is vishing?
         Navy IO Center of Excellence

Vishing: A phone scam intended to lure a user into providing sensitive
personal information.
                                                 •    Typically solicit personal
                                                     information through scare tactics
                                                      • Warns of credit card fraud,
                                                        instruct target to provide account
                                                        details to prove identity
                                                 • Callers often imitate legitimate call
                                                   centers
                                                 • Target specific, critical details
                                                      • Financial information,
                                                        operational dates, locations, etc.



                                        UNCLASSIFIED//FOUO
What is smishing?
         Navy IO Center of Excellence

Smishing: A phishing scam that sends bogus text messages to mobile
phones.
                                                  •    Direct a target to call a number or
                                                      link to a website.
                                                       • Personal, sensitive information is
                                                         requested
                                                       • Malicious websites install
                                                         malware on mobile devices,
                                                         collect sensitive information
                                                  • Callers often imitate legitimate call
                                                    centers
                                                  • Target specific, critical details
                                                       • Financial information,
                                                         operational dates, locations, etc

                                        UNCLASSIFIED//FOUO
What is sextortion?
         Navy IO Center of Excellence

Sextortion: Sexual exploitation as a means of blackmail or extortion.

                                                 • Sexually explicit content obtained
                                                   through enticement or theft is
                                                   leveraged against a person.
                                                      • Money
                                                      • Sex
                                                      • Information
                                                 • Extortionists commonly find targets
                                                   on:
                                                      • Social networking sites
                                                      • Mobile applications (i.e. instagram)
                                                      • Private chat messages & chat rooms
                                                      • Web cams


                                        UNCLASSIFIED//FOUO
Identifying a phishing scam
              Navy IO Center of Excellence


Phishing scams tend to have common characteristics which make them easy to identify.
• Spelling and punctuation errors.
• Include a redirect to malicious URL’s which require you input usernames and passwords
   to access.
• Scare tactics to entice a target to provide personal information or follow links.
• Sensational subject lines to entice targets to click on attached links or provide personal
   information.
• Try to appear genuine by using legitimate operational terms, key words and accurate
   personal information.
• Fake or unknown sender.




                                             UNCLASSIFIED//FOUO
How to avoid a phishing scam
              Navy IO Center of Excellence


Protect yourself from phishing scams:
• Do not register official government/.mil email accounts with any commercial websites.
• Patch/update web browsers as needed.
• Beware the unknown sender or sensational subject line.
• You will never get a free iPad, don’t fill anything out.
• When in doubt, call your financial institutions to verify if your account has been
   compromised.
• Do not follow links included in emails or text messages, use a known good link instead.
• Digitally sign and encrypt emails where ever possible.
• Only follow links or download attachments from digitally signed emails.
• Do not follow links to unsubscribe from spam, simply mark as spam and delete.
• Do not make security challenge answers for account validation easy to guess/learn
   details.



                                             UNCLASSIFIED//FOUO
Digital signatures &
                                                              encryption
Navy IO Center of Excellence




                               UNCLASSIFIED//FOUO
Questions?
Navy IO Center of Excellence




         Naval OPSEC Support Team (NOST)
Navy Information Operations Command (NIOC) Norfolk
                (757) 417-7100 DSN 537
                   OPSEC@navy.mil
               www.nioc-norfolk.navy.mil
        http://www.facebook.com/NavalOPSEC
                               UNCLASSIFIED//FOUO

More Related Content

Viewers also liked

OPSEC for OMBUDSMEN
OPSEC for OMBUDSMENOPSEC for OMBUDSMEN
OPSEC for OMBUDSMENNaval OPSEC
 
Ventajas de la biodiversidad
Ventajas de la biodiversidadVentajas de la biodiversidad
Ventajas de la biodiversidadCARRANZA41255782
 
Uk computer emergency response team (cert) introduction to social engineering
Uk computer emergency response team (cert) introduction to social engineeringUk computer emergency response team (cert) introduction to social engineering
Uk computer emergency response team (cert) introduction to social engineeringPublicLeaker
 
An Approach to Detect Packets Using Packet Sniffing
An Approach to Detect Packets Using Packet SniffingAn Approach to Detect Packets Using Packet Sniffing
An Approach to Detect Packets Using Packet Sniffingijcses
 
Phishing-Email-Fraud-General
Phishing-Email-Fraud-GeneralPhishing-Email-Fraud-General
Phishing-Email-Fraud-GeneralAndrew Voorhies
 
Wired concept ppt-restaurants-fezz
Wired concept   ppt-restaurants-fezzWired concept   ppt-restaurants-fezz
Wired concept ppt-restaurants-fezzFaisal Khan
 
[Vietnam Mobile Day 2014] The new mobile marketing channel: Social Wifi Marke...
[Vietnam Mobile Day 2014] The new mobile marketing channel: Social Wifi Marke...[Vietnam Mobile Day 2014] The new mobile marketing channel: Social Wifi Marke...
[Vietnam Mobile Day 2014] The new mobile marketing channel: Social Wifi Marke...AiTi Education
 
Programa historia de la medicina Universidad Catolica Nordestana
Programa historia de la medicina Universidad Catolica NordestanaPrograma historia de la medicina Universidad Catolica Nordestana
Programa historia de la medicina Universidad Catolica NordestanaJorge Amarante
 
Curso online - Administracion de infraestructuras de red cisco
Curso online - Administracion de infraestructuras de red ciscoCurso online - Administracion de infraestructuras de red cisco
Curso online - Administracion de infraestructuras de red ciscoSantiago García Arroyo
 
Hypnose lernen Buch
Hypnose lernen BuchHypnose lernen Buch
Hypnose lernen Buchsuperantix
 
Loan Fund Annual Report 2014
Loan Fund Annual Report 2014Loan Fund Annual Report 2014
Loan Fund Annual Report 2014Seth Asimakos
 
Montana Farmers Market EBT Manual
Montana Farmers Market EBT ManualMontana Farmers Market EBT Manual
Montana Farmers Market EBT ManualElisaMendelsohn
 

Viewers also liked (20)

OPSEC for OMBUDSMEN
OPSEC for OMBUDSMENOPSEC for OMBUDSMEN
OPSEC for OMBUDSMEN
 
Day 3
Day 3Day 3
Day 3
 
Ventajas de la biodiversidad
Ventajas de la biodiversidadVentajas de la biodiversidad
Ventajas de la biodiversidad
 
Day 2
Day 2Day 2
Day 2
 
Uk computer emergency response team (cert) introduction to social engineering
Uk computer emergency response team (cert) introduction to social engineeringUk computer emergency response team (cert) introduction to social engineering
Uk computer emergency response team (cert) introduction to social engineering
 
Link Baiting
Link BaitingLink Baiting
Link Baiting
 
An Approach to Detect Packets Using Packet Sniffing
An Approach to Detect Packets Using Packet SniffingAn Approach to Detect Packets Using Packet Sniffing
An Approach to Detect Packets Using Packet Sniffing
 
Phishing-Email-Fraud-General
Phishing-Email-Fraud-GeneralPhishing-Email-Fraud-General
Phishing-Email-Fraud-General
 
Dossier de Capacidades de I+D+i del CITIC
Dossier de Capacidades de I+D+i del CITICDossier de Capacidades de I+D+i del CITIC
Dossier de Capacidades de I+D+i del CITIC
 
Wired concept ppt-restaurants-fezz
Wired concept   ppt-restaurants-fezzWired concept   ppt-restaurants-fezz
Wired concept ppt-restaurants-fezz
 
User Manual Tobii X120
User Manual Tobii X120User Manual Tobii X120
User Manual Tobii X120
 
[Vietnam Mobile Day 2014] The new mobile marketing channel: Social Wifi Marke...
[Vietnam Mobile Day 2014] The new mobile marketing channel: Social Wifi Marke...[Vietnam Mobile Day 2014] The new mobile marketing channel: Social Wifi Marke...
[Vietnam Mobile Day 2014] The new mobile marketing channel: Social Wifi Marke...
 
Milipol 2013
Milipol 2013Milipol 2013
Milipol 2013
 
Programa historia de la medicina Universidad Catolica Nordestana
Programa historia de la medicina Universidad Catolica NordestanaPrograma historia de la medicina Universidad Catolica Nordestana
Programa historia de la medicina Universidad Catolica Nordestana
 
wasilewski
wasilewskiwasilewski
wasilewski
 
Fondos publicos (5)
Fondos publicos (5)Fondos publicos (5)
Fondos publicos (5)
 
Curso online - Administracion de infraestructuras de red cisco
Curso online - Administracion de infraestructuras de red ciscoCurso online - Administracion de infraestructuras de red cisco
Curso online - Administracion de infraestructuras de red cisco
 
Hypnose lernen Buch
Hypnose lernen BuchHypnose lernen Buch
Hypnose lernen Buch
 
Loan Fund Annual Report 2014
Loan Fund Annual Report 2014Loan Fund Annual Report 2014
Loan Fund Annual Report 2014
 
Montana Farmers Market EBT Manual
Montana Farmers Market EBT ManualMontana Farmers Market EBT Manual
Montana Farmers Market EBT Manual
 

Similar to Phishing

Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxStephen Jesukanth Martin
 
Beware of Phishing Scams
Beware of Phishing ScamsBeware of Phishing Scams
Beware of Phishing ScamsNoel Waterman
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldAvishek Datta
 

Similar to Phishing (6)

phishing.pptx
phishing.pptxphishing.pptx
phishing.pptx
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptx
 
Phishing and prevention
Phishing and preventionPhishing and prevention
Phishing and prevention
 
Beware of Phishing Scams
Beware of Phishing ScamsBeware of Phishing Scams
Beware of Phishing Scams
 
edu 3 ppt.pptx
edu 3 ppt.pptxedu 3 ppt.pptx
edu 3 ppt.pptx
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark World
 

More from Naval OPSEC

Twitter 11 mar15
Twitter 11 mar15Twitter 11 mar15
Twitter 11 mar15Naval OPSEC
 
Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14Naval OPSEC
 
Smartphone 7 aug14
Smartphone 7 aug14Smartphone 7 aug14
Smartphone 7 aug14Naval OPSEC
 
Smartphone exif removal 30 jul14
Smartphone exif removal 30 jul14Smartphone exif removal 30 jul14
Smartphone exif removal 30 jul14Naval OPSEC
 
Securing home wifi 16 mar15
Securing home wifi 16 mar15Securing home wifi 16 mar15
Securing home wifi 16 mar15Naval OPSEC
 
Photo sharing services 10 mar15
Photo sharing services 10 mar15Photo sharing services 10 mar15
Photo sharing services 10 mar15Naval OPSEC
 
Opt out-3 jul2014
Opt out-3 jul2014Opt out-3 jul2014
Opt out-3 jul2014Naval OPSEC
 
Online registration 25 aug14
Online registration 25 aug14Online registration 25 aug14
Online registration 25 aug14Naval OPSEC
 
Mobile wallets 5 nov14
Mobile wallets 5 nov14Mobile wallets 5 nov14
Mobile wallets 5 nov14Naval OPSEC
 
Linked in 10mar15
Linked in 10mar15Linked in 10mar15
Linked in 10mar15Naval OPSEC
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15Naval OPSEC
 
Google plus 10 mar15
Google plus 10 mar15Google plus 10 mar15
Google plus 10 mar15Naval OPSEC
 
Facebook mobile 11mar15
Facebook mobile 11mar15Facebook mobile 11mar15
Facebook mobile 11mar15Naval OPSEC
 
Facebook 10 mar15
Facebook 10 mar15Facebook 10 mar15
Facebook 10 mar15Naval OPSEC
 
Anonymous email 26 aug14
Anonymous email 26 aug14Anonymous email 26 aug14
Anonymous email 26 aug14Naval OPSEC
 
Child safety 16 jun14
Child safety 16 jun14Child safety 16 jun14
Child safety 16 jun14Naval OPSEC
 
Opsec & sns for distro (no vid)
Opsec & sns for distro (no vid)Opsec & sns for distro (no vid)
Opsec & sns for distro (no vid)Naval OPSEC
 
FB Privacy Settings Jan 2015
FB Privacy Settings Jan 2015FB Privacy Settings Jan 2015
FB Privacy Settings Jan 2015Naval OPSEC
 

More from Naval OPSEC (20)

Twitter 11 mar15
Twitter 11 mar15Twitter 11 mar15
Twitter 11 mar15
 
Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14
 
Smartphone 7 aug14
Smartphone 7 aug14Smartphone 7 aug14
Smartphone 7 aug14
 
Smartphone exif removal 30 jul14
Smartphone exif removal 30 jul14Smartphone exif removal 30 jul14
Smartphone exif removal 30 jul14
 
Securing home wifi 16 mar15
Securing home wifi 16 mar15Securing home wifi 16 mar15
Securing home wifi 16 mar15
 
Photo sharing services 10 mar15
Photo sharing services 10 mar15Photo sharing services 10 mar15
Photo sharing services 10 mar15
 
Opt out-3 jul2014
Opt out-3 jul2014Opt out-3 jul2014
Opt out-3 jul2014
 
Online registration 25 aug14
Online registration 25 aug14Online registration 25 aug14
Online registration 25 aug14
 
Mobile wallets 5 nov14
Mobile wallets 5 nov14Mobile wallets 5 nov14
Mobile wallets 5 nov14
 
Linked in 10mar15
Linked in 10mar15Linked in 10mar15
Linked in 10mar15
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15
 
Google plus 10 mar15
Google plus 10 mar15Google plus 10 mar15
Google plus 10 mar15
 
Facebook mobile 11mar15
Facebook mobile 11mar15Facebook mobile 11mar15
Facebook mobile 11mar15
 
Facebook 10 mar15
Facebook 10 mar15Facebook 10 mar15
Facebook 10 mar15
 
Anonymous email 26 aug14
Anonymous email 26 aug14Anonymous email 26 aug14
Anonymous email 26 aug14
 
Child safety 16 jun14
Child safety 16 jun14Child safety 16 jun14
Child safety 16 jun14
 
Opsec & sns for distro (no vid)
Opsec & sns for distro (no vid)Opsec & sns for distro (no vid)
Opsec & sns for distro (no vid)
 
FB Privacy Settings Jan 2015
FB Privacy Settings Jan 2015FB Privacy Settings Jan 2015
FB Privacy Settings Jan 2015
 
Smartphone
SmartphoneSmartphone
Smartphone
 
Opsec SNS
Opsec SNSOpsec SNS
Opsec SNS
 

Recently uploaded

Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 

Recently uploaded (20)

Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 

Phishing

  • 1. Navy IO Center of Excellence Phishing Awareness Naval OPSEC Support Team (NOST) Navy Information Operations Command (NIOC) Norfolk (757) 417-7100 DSN 537 OPSEC@navy.mil www.nioc-norfolk.navy.mil http://www.facebook.com/NavalOPSEC UNCLASSIFIED//FOUO Updated: 27 Mar 2013
  • 2. Phishing Navy IO Center of Excellence Phishing is an illegal activity using social engineering techniques to fraudulently solicit sensitive information or install malicious software. Phishing attempts solicit sensitive information such as usernames, passwords, personal information, military operations details, financial information and so on. Phishing emails can also include malicious links or attachments. Common phishing techniques: - Phishing - Spear phishing - Whaling - Vishing - Smishing UNCLASSIFIED//FOUO
  • 3. What is phishing? Navy IO Center of Excellence Phishing: An email scam intended to lure a user into providing sensitive information. • Yahoo link URL spoofing • A fake or forged URL which impersonates a legitimate website. • Requests credit card information • Threatens service interruption UNCLASSIFIED//FOUO
  • 4. What is spear phishing? Navy IO Center of Excellence Spear phishing: A targeted scam directed at a specific person or department. • Addresses the target/recipient by name or other personal detail • Attacker generally references specific personal information about the target. • Emails appear legitimate • References factually correct details, operational terms, etc. Malicious URL • Links or attachments malicious in nature. • Viruses, malware, URL spoofing UNCLASSIFIED//FOUO
  • 5. What is whaling? Navy IO Center of Excellence Whaling: A phishing scam directed specifically at high ranking officers or other high profile targets within the government, military or business. • Addresses the high profile target by name or other personal detail • Attacker knows specific personal information about the target. • Emails appear legitimate • Include specific, accurate details, such as names and operational details, to stress legitimacy. Download includes a keystroke logger virus • Links or attachments malicious in nature. • Viruses, malware, URL spoofing UNCLASSIFIED//FOUO
  • 6. What is vishing? Navy IO Center of Excellence Vishing: A phone scam intended to lure a user into providing sensitive personal information. • Typically solicit personal information through scare tactics • Warns of credit card fraud, instruct target to provide account details to prove identity • Callers often imitate legitimate call centers • Target specific, critical details • Financial information, operational dates, locations, etc. UNCLASSIFIED//FOUO
  • 7. What is smishing? Navy IO Center of Excellence Smishing: A phishing scam that sends bogus text messages to mobile phones. • Direct a target to call a number or link to a website. • Personal, sensitive information is requested • Malicious websites install malware on mobile devices, collect sensitive information • Callers often imitate legitimate call centers • Target specific, critical details • Financial information, operational dates, locations, etc UNCLASSIFIED//FOUO
  • 8. What is sextortion? Navy IO Center of Excellence Sextortion: Sexual exploitation as a means of blackmail or extortion. • Sexually explicit content obtained through enticement or theft is leveraged against a person. • Money • Sex • Information • Extortionists commonly find targets on: • Social networking sites • Mobile applications (i.e. instagram) • Private chat messages & chat rooms • Web cams UNCLASSIFIED//FOUO
  • 9. Identifying a phishing scam Navy IO Center of Excellence Phishing scams tend to have common characteristics which make them easy to identify. • Spelling and punctuation errors. • Include a redirect to malicious URL’s which require you input usernames and passwords to access. • Scare tactics to entice a target to provide personal information or follow links. • Sensational subject lines to entice targets to click on attached links or provide personal information. • Try to appear genuine by using legitimate operational terms, key words and accurate personal information. • Fake or unknown sender. UNCLASSIFIED//FOUO
  • 10. How to avoid a phishing scam Navy IO Center of Excellence Protect yourself from phishing scams: • Do not register official government/.mil email accounts with any commercial websites. • Patch/update web browsers as needed. • Beware the unknown sender or sensational subject line. • You will never get a free iPad, don’t fill anything out. • When in doubt, call your financial institutions to verify if your account has been compromised. • Do not follow links included in emails or text messages, use a known good link instead. • Digitally sign and encrypt emails where ever possible. • Only follow links or download attachments from digitally signed emails. • Do not follow links to unsubscribe from spam, simply mark as spam and delete. • Do not make security challenge answers for account validation easy to guess/learn details. UNCLASSIFIED//FOUO
  • 11. Digital signatures & encryption Navy IO Center of Excellence UNCLASSIFIED//FOUO
  • 12. Questions? Navy IO Center of Excellence Naval OPSEC Support Team (NOST) Navy Information Operations Command (NIOC) Norfolk (757) 417-7100 DSN 537 OPSEC@navy.mil www.nioc-norfolk.navy.mil http://www.facebook.com/NavalOPSEC UNCLASSIFIED//FOUO

Editor's Notes

  1. Source: http://www.wired.com/dangerroom/2013/03/air-force-sextortion/