SlideShare ist ein Scribd-Unternehmen logo
1 von 46
Downloaden Sie, um offline zu lesen
Phishing Detection Strategies
For: NASA
27 July 2017
@pauboxhq
Hoala Greevy
Founder CEO, Paubox, Inc. -
HIPAA Compliant Email Made
Easy.
18 years’ experience in email
security & encryption.
Phishing & Fishing expert. =)
@PAUBOXHQ
I. What is Phishing Today?
II. Threat Landscape
III. Best Practices
IV. Looking Ahead
Agenda
I. What is Phishing Today?
Overconfidence Dilemma
Display Name Spoofs
Ransomware stealing thunder
I. What is Phishing Today?
It’s always been about the $$$.
I. What is Phishing Today?
In some cases it’s about data theft.
I. What is Phishing Today?
And now it’s about Politics too.
I. What is Phishing Today?
Source: Fortune
Overconfidence Dilemma
2017 phishing study
University of Texas at San Antonio
Source: Science Daily
Overconfidence Dilemma
Fatal Flaw:
Most people believe they are smarter
than the criminals perpetrating them.
Source: Science Daily
Display Name Spoofs
91% of phishing attacks
Highly targeted
Impersonates someone familiar to the
recipient (usually C-Level)
II. Threat Landscape
Top Phishing Subject Lines 2017
Source: Fortune
Free online phishing test
April – June 2017
6.6M phishing emails
2M inboxes
Source: Fortune
Breakdown
The Subject Line is Important.
Urgent / Alert / Immediately
NASA Phishing Attack (2015)
Source: IT Security Threat: Phishing Email – NASA HQ
NASA Phishing Attack (2015)
Source: IT Security Threat: Phishing Email – NASA HQ
Display name spoof (System Admin)
No spelling errors
Most likely trying to gain access to mailboxes
NASA Cyber Security Webinar: Phishing Detection Strategies
Google Docs Phish
Shut down quickly.
Yet millions affected.
Named the app Google
Docs
Source: Wired
Ransomware
2015: 1K daily
attacks
2016: 4K daily
attacks
2017: ?
WannaCry at a Glance
Stolen NSA tools
North Korea GDP
150 countries
At least 230K infected
Big Tech Companies Get Hit Too
Facebook & Google Phished
Each paid nearly $100M in fake invoices
Impersonated Quanta Computer
Most funds recovered
Source: The Guardian
Insider Threat
Office 365 Accounts Hacked
Wire transfer request
sent from actual HR
employee mailboxes
18,000 accounts
affected (why so
many?)
Source: SC Magazine
Politics
NASA Cyber Security Webinar: Phishing Detection Strategies
The Perfect Weapon*
Cheap
Hard to see coming
Hard to trace
* NY Times
Let’s Dive In
Domain Name Shell Game
http://shop.radioactivegamingeu.com
Resolves to:
104.31.65.24
104.31.64.24
Who owns these IPs?
104.31.65.24
104.31.64.24
Cloudflare
Legitimate CDN provider
III. Best Practices
Google Safe Browsing
Macro Policy
Level Up User Training (hold contests)
Nuclear Option: Macs only?
Google Safe Browsing
It’s Free & Constantly Updated
Lots of data sources (over 1B users)
Used in Chrome, Firefox & Safari
Can be used in Email too
Source: Google Safe Browsing
Macro Policy
Re: allowing macros via attachments
Does the business downside now
outweigh the upside?
Blog post: We’re Clamping Down on Deadly Macros and Ransomware
Arthur Ream
CISO,
Cambridge
Health Alliance
Steak Dinner
phishing bounty
Source: HIMSS Privacy and Security Forum in Boston
Nuclear Option: Macs only?
Something to think about
IV. Looking Ahead
2FA by default
Clamp down on Domain Registrars
Google Safe Browsing API
2FA by Default
Two Factor Authentication
Something you know
-and-
Something you have
Domain Registrars
It’s too easy to register a domain name
No checks on identity
Why is it automated?
Google Safe Browsing API
Huge Dataset
Constantly updated
Very accurate
IV. Looking Ahead
Machine Learning FTW
Death of the Appliance (Cloud will win)
Port-based Geographic Segmentation
Machine Learning FTW
wellsfarg0.com
well5fargo.com
w3llsfargo.com
Death of the Appliance
Cloud will win
Nearly zero access to Machine
Learning
Port-based Geographic
Segmentation
Do NASA users check email from
Russia?
Mahalo!
@hoalagreevy
www.paubox.com

Weitere ähnliche Inhalte

Was ist angesagt?

Phishing Awareness
Phishing Awareness Phishing Awareness
Phishing Awareness mphadden
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanControlScan, Inc.
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N Gbensonoo
 
10 Steps to Creating a Corporate Phishing Awareness Program
10 Steps to Creating a Corporate Phishing Awareness Program10 Steps to Creating a Corporate Phishing Awareness Program
10 Steps to Creating a Corporate Phishing Awareness ProgramWiley
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing AttacksJagan Mohan
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing AttacksSysCloud
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation AniketPandit18
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threatsourav newatia
 
Fire eye spearphishing
Fire eye spearphishingFire eye spearphishing
Fire eye spearphishingZeno Idzerda
 
Phishing - A modern web attack
Phishing -  A modern web attackPhishing -  A modern web attack
Phishing - A modern web attackKarthik
 
Phishing scams in banking ppt
Phishing scams in banking pptPhishing scams in banking ppt
Phishing scams in banking pptKrishma Sandesra
 
Spear Phishing 101
Spear Phishing 101Spear Phishing 101
Spear Phishing 101Sendio
 
What is a phishing attack
What is a phishing attackWhat is a phishing attack
What is a phishing attackAariyaRathi
 

Was ist angesagt? (20)

Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Phishing Awareness
Phishing Awareness Phishing Awareness
Phishing Awareness
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
10 Steps to Creating a Corporate Phishing Awareness Program
10 Steps to Creating a Corporate Phishing Awareness Program10 Steps to Creating a Corporate Phishing Awareness Program
10 Steps to Creating a Corporate Phishing Awareness Program
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing Attacks
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation
 
Phishing
PhishingPhishing
Phishing
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threat
 
Fire eye spearphishing
Fire eye spearphishingFire eye spearphishing
Fire eye spearphishing
 
Phishing & Pharming
Phishing & PharmingPhishing & Pharming
Phishing & Pharming
 
Phishing - A modern web attack
Phishing -  A modern web attackPhishing -  A modern web attack
Phishing - A modern web attack
 
Phishing and hacking
Phishing and hackingPhishing and hacking
Phishing and hacking
 
Phishing scams in banking ppt
Phishing scams in banking pptPhishing scams in banking ppt
Phishing scams in banking ppt
 
Spear Phishing 101
Spear Phishing 101Spear Phishing 101
Spear Phishing 101
 
What is a phishing attack
What is a phishing attackWhat is a phishing attack
What is a phishing attack
 
Phishing
PhishingPhishing
Phishing
 
PPT on Phishing
PPT on PhishingPPT on Phishing
PPT on Phishing
 

Ähnlich wie NASA Cyber Security Webinar: Phishing Detection Strategies

Adjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalAdjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalPriyanka Aash
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityMuhammad Hamza
 
Symantec: The rise of hacktivism and insider threats
Symantec: The rise of hacktivism and insider threatsSymantec: The rise of hacktivism and insider threats
Symantec: The rise of hacktivism and insider threatsSymantec Website Security
 
Seminar Paper Heller
Seminar Paper HellerSeminar Paper Heller
Seminar Paper HellerKyle Heller
 
FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International Scott Mills
 
Write An Essay Discussing The Pros And Cons Of Hiring...
Write An Essay Discussing The Pros And Cons Of Hiring...Write An Essay Discussing The Pros And Cons Of Hiring...
Write An Essay Discussing The Pros And Cons Of Hiring...Diane Allen
 
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017SurfWatch Labs
 
Who Can Help Me Write An Essay - HelpcoachS Diary
Who Can Help Me Write An Essay - HelpcoachS DiaryWho Can Help Me Write An Essay - HelpcoachS Diary
Who Can Help Me Write An Essay - HelpcoachS DiaryDaniel Wachtel
 
Detecting ARP Spoofing Essay
Detecting ARP Spoofing EssayDetecting ARP Spoofing Essay
Detecting ARP Spoofing EssayKimberly Bundy
 
Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"abercius24
 
The Censorship Of The Digital Age
The Censorship Of The Digital AgeThe Censorship Of The Digital Age
The Censorship Of The Digital AgeAngie Love
 
Cyber security master class 2018
Cyber security master class 2018Cyber security master class 2018
Cyber security master class 2018Sanjana Khound
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counselbugcrowd
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselCasey Ellis
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...Casey Ellis
 

Ähnlich wie NASA Cyber Security Webinar: Phishing Detection Strategies (20)

Adjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalAdjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New Normal
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Employee Genocide
Employee GenocideEmployee Genocide
Employee Genocide
 
Symantec: The rise of hacktivism and insider threats
Symantec: The rise of hacktivism and insider threatsSymantec: The rise of hacktivism and insider threats
Symantec: The rise of hacktivism and insider threats
 
Seminar Paper Heller
Seminar Paper HellerSeminar Paper Heller
Seminar Paper Heller
 
FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International
 
Write An Essay Discussing The Pros And Cons Of Hiring...
Write An Essay Discussing The Pros And Cons Of Hiring...Write An Essay Discussing The Pros And Cons Of Hiring...
Write An Essay Discussing The Pros And Cons Of Hiring...
 
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
 
Who Can Help Me Write An Essay - HelpcoachS Diary
Who Can Help Me Write An Essay - HelpcoachS DiaryWho Can Help Me Write An Essay - HelpcoachS Diary
Who Can Help Me Write An Essay - HelpcoachS Diary
 
Social Engineering 2.0
Social Engineering 2.0Social Engineering 2.0
Social Engineering 2.0
 
Detecting ARP Spoofing Essay
Detecting ARP Spoofing EssayDetecting ARP Spoofing Essay
Detecting ARP Spoofing Essay
 
Puna 2015
Puna 2015Puna 2015
Puna 2015
 
Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
The Censorship Of The Digital Age
The Censorship Of The Digital AgeThe Censorship Of The Digital Age
The Censorship Of The Digital Age
 
Cyber security master class 2018
Cyber security master class 2018Cyber security master class 2018
Cyber security master class 2018
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
 

Mehr von Paubox, Inc.

What You Need to Learn from the HHS Wall of Breaches - 31st Annual FISSEA Con...
What You Need to Learn from the HHS Wall of Breaches - 31st Annual FISSEA Con...What You Need to Learn from the HHS Wall of Breaches - 31st Annual FISSEA Con...
What You Need to Learn from the HHS Wall of Breaches - 31st Annual FISSEA Con...Paubox, Inc.
 
Anatomy of a Ransomware Attack - Paubox SECURE Conference 2017
Anatomy of a Ransomware Attack - Paubox SECURE Conference 2017Anatomy of a Ransomware Attack - Paubox SECURE Conference 2017
Anatomy of a Ransomware Attack - Paubox SECURE Conference 2017Paubox, Inc.
 
My Innovation Journey - A TED Talk Speech: Future Focus Conference 2017
My Innovation Journey - A TED Talk Speech: Future Focus Conference 2017My Innovation Journey - A TED Talk Speech: Future Focus Conference 2017
My Innovation Journey - A TED Talk Speech: Future Focus Conference 2017Paubox, Inc.
 
Paubox August Social Mixer
Paubox August Social MixerPaubox August Social Mixer
Paubox August Social MixerPaubox, Inc.
 
Paubox Social Mixer in Boston
Paubox Social Mixer in BostonPaubox Social Mixer in Boston
Paubox Social Mixer in BostonPaubox, Inc.
 
Email Trends in Healthcare 2016
Email Trends in Healthcare 2016Email Trends in Healthcare 2016
Email Trends in Healthcare 2016Paubox, Inc.
 
Paubox encrypted email
Paubox encrypted emailPaubox encrypted email
Paubox encrypted emailPaubox, Inc.
 

Mehr von Paubox, Inc. (7)

What You Need to Learn from the HHS Wall of Breaches - 31st Annual FISSEA Con...
What You Need to Learn from the HHS Wall of Breaches - 31st Annual FISSEA Con...What You Need to Learn from the HHS Wall of Breaches - 31st Annual FISSEA Con...
What You Need to Learn from the HHS Wall of Breaches - 31st Annual FISSEA Con...
 
Anatomy of a Ransomware Attack - Paubox SECURE Conference 2017
Anatomy of a Ransomware Attack - Paubox SECURE Conference 2017Anatomy of a Ransomware Attack - Paubox SECURE Conference 2017
Anatomy of a Ransomware Attack - Paubox SECURE Conference 2017
 
My Innovation Journey - A TED Talk Speech: Future Focus Conference 2017
My Innovation Journey - A TED Talk Speech: Future Focus Conference 2017My Innovation Journey - A TED Talk Speech: Future Focus Conference 2017
My Innovation Journey - A TED Talk Speech: Future Focus Conference 2017
 
Paubox August Social Mixer
Paubox August Social MixerPaubox August Social Mixer
Paubox August Social Mixer
 
Paubox Social Mixer in Boston
Paubox Social Mixer in BostonPaubox Social Mixer in Boston
Paubox Social Mixer in Boston
 
Email Trends in Healthcare 2016
Email Trends in Healthcare 2016Email Trends in Healthcare 2016
Email Trends in Healthcare 2016
 
Paubox encrypted email
Paubox encrypted emailPaubox encrypted email
Paubox encrypted email
 

Kürzlich hochgeladen

How to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 SalesHow to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 SalesCeline George
 
Patterns of Written Texts Across Disciplines.pptx
Patterns of Written Texts Across Disciplines.pptxPatterns of Written Texts Across Disciplines.pptx
Patterns of Written Texts Across Disciplines.pptxMYDA ANGELICA SUAN
 
General views of Histopathology and step
General views of Histopathology and stepGeneral views of Histopathology and step
General views of Histopathology and stepobaje godwin sunday
 
Diploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdfDiploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdfMohonDas
 
CapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapitolTechU
 
How to Solve Singleton Error in the Odoo 17
How to Solve Singleton Error in the  Odoo 17How to Solve Singleton Error in the  Odoo 17
How to Solve Singleton Error in the Odoo 17Celine George
 
Practical Research 1 Lesson 9 Scope and delimitation.pptx
Practical Research 1 Lesson 9 Scope and delimitation.pptxPractical Research 1 Lesson 9 Scope and delimitation.pptx
Practical Research 1 Lesson 9 Scope and delimitation.pptxKatherine Villaluna
 
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfMaximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfTechSoup
 
5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...CaraSkikne1
 
Ultra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptxUltra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptxDr. Asif Anas
 
The Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsThe Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsEugene Lysak
 
3.21.24 The Origins of Black Power.pptx
3.21.24  The Origins of Black Power.pptx3.21.24  The Origins of Black Power.pptx
3.21.24 The Origins of Black Power.pptxmary850239
 
How to Add a many2many Relational Field in Odoo 17
How to Add a many2many Relational Field in Odoo 17How to Add a many2many Relational Field in Odoo 17
How to Add a many2many Relational Field in Odoo 17Celine George
 
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxAUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxiammrhaywood
 
The basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxThe basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxheathfieldcps1
 
In - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptxIn - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptxAditiChauhan701637
 
Practical Research 1: Lesson 8 Writing the Thesis Statement.pptx
Practical Research 1: Lesson 8 Writing the Thesis Statement.pptxPractical Research 1: Lesson 8 Writing the Thesis Statement.pptx
Practical Research 1: Lesson 8 Writing the Thesis Statement.pptxKatherine Villaluna
 
Presentation on the Basics of Writing. Writing a Paragraph
Presentation on the Basics of Writing. Writing a ParagraphPresentation on the Basics of Writing. Writing a Paragraph
Presentation on the Basics of Writing. Writing a ParagraphNetziValdelomar1
 

Kürzlich hochgeladen (20)

Finals of Kant get Marx 2.0 : a general politics quiz
Finals of Kant get Marx 2.0 : a general politics quizFinals of Kant get Marx 2.0 : a general politics quiz
Finals of Kant get Marx 2.0 : a general politics quiz
 
How to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 SalesHow to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 Sales
 
Patterns of Written Texts Across Disciplines.pptx
Patterns of Written Texts Across Disciplines.pptxPatterns of Written Texts Across Disciplines.pptx
Patterns of Written Texts Across Disciplines.pptx
 
General views of Histopathology and step
General views of Histopathology and stepGeneral views of Histopathology and step
General views of Histopathology and step
 
Diploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdfDiploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdf
 
Prelims of Kant get Marx 2.0: a general politics quiz
Prelims of Kant get Marx 2.0: a general politics quizPrelims of Kant get Marx 2.0: a general politics quiz
Prelims of Kant get Marx 2.0: a general politics quiz
 
CapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptx
 
How to Solve Singleton Error in the Odoo 17
How to Solve Singleton Error in the  Odoo 17How to Solve Singleton Error in the  Odoo 17
How to Solve Singleton Error in the Odoo 17
 
Practical Research 1 Lesson 9 Scope and delimitation.pptx
Practical Research 1 Lesson 9 Scope and delimitation.pptxPractical Research 1 Lesson 9 Scope and delimitation.pptx
Practical Research 1 Lesson 9 Scope and delimitation.pptx
 
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfMaximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
 
5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...
 
Ultra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptxUltra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptx
 
The Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsThe Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George Wells
 
3.21.24 The Origins of Black Power.pptx
3.21.24  The Origins of Black Power.pptx3.21.24  The Origins of Black Power.pptx
3.21.24 The Origins of Black Power.pptx
 
How to Add a many2many Relational Field in Odoo 17
How to Add a many2many Relational Field in Odoo 17How to Add a many2many Relational Field in Odoo 17
How to Add a many2many Relational Field in Odoo 17
 
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxAUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
 
The basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxThe basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptx
 
In - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptxIn - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptx
 
Practical Research 1: Lesson 8 Writing the Thesis Statement.pptx
Practical Research 1: Lesson 8 Writing the Thesis Statement.pptxPractical Research 1: Lesson 8 Writing the Thesis Statement.pptx
Practical Research 1: Lesson 8 Writing the Thesis Statement.pptx
 
Presentation on the Basics of Writing. Writing a Paragraph
Presentation on the Basics of Writing. Writing a ParagraphPresentation on the Basics of Writing. Writing a Paragraph
Presentation on the Basics of Writing. Writing a Paragraph
 

NASA Cyber Security Webinar: Phishing Detection Strategies