phishing storyboard_final
TRANSCRIPT
ObjectivesAt the end of this demo, you will be able to:• Identify phishing attempts after reinforced training•Separate legitimate Information-seeking requests from scamming/phishing attempts•Demonstrate the appropriate response to Social Engineering exercises
What is Social Engineering?
What is Phishing?
Types of Phishing Vishing Smishing Spearing
To: SusanFrom: DavidClick on the link to continue…http://mail.yahoo.com
Whaling
To: SusanFrom: DavidClick on the link to continue…http://mail.yahoo.si.com
Cloning
Signs of Attack
Key signs include: •Requesting personal information •Refusal to give contact information•Rushing-Instilling a sense of urgency•Name-dropping o• Intimidation to induce panic
Protecting Yourself • Be aware of public data and
manage social media practices (i.e. Facebook)
• Be suspicious of requests for personal information
Protecting Yourself • Remember, TSA will never ask for confidential information • Never supply personal
information via email or phone, never download attachments or click hyperlinks from unreliable sources (make sure that the automatic download option is not selected)
Knowledge Check
For More Information TSA Cyber Security Awareness and Outreach Team – [email protected]
TSA Single Point of Contact (SPOC) – (800) 253 8571
SPAM Reporting – [email protected]