federal information systems security education association
play

Federal Information Systems Security Education Association Spear - PowerPoint PPT Presentation

Federal Information Systems Security Education Association Spear Phishing Agenda Definition of spear phishing Why is spear phishing so valuable to attackers Spear phishing defenses / countermeasures Training concepts and delivery


  1. Federal Information Systems Security Education Association Spear Phishing

  2. Agenda  Definition of spear phishing  Why is spear phishing so valuable to attackers  Spear phishing defenses / countermeasures  Training concepts and delivery Secure Solutions from Security Professionals 2 For Official Use Only

  3. Spear Phishing, What is it?  A type of phishing attack  Uses email messages to trick users to clicking a link, downloading a file, entering data, etc.  Malware may be downloaded / executed to hijack the user’s computer  May appear to come from a trusted source (e.g., colleague, supervisor, employer, vendor, etc.)  More targeted than phishing, not random  Attacker is targeting you and your organization’s data Secure Solutions from Security Professionals 3 For Official Use Only

  4. Spear Phishing, Why?  Bypasses many network perimeter security controls – targets the human  Provides access to the user’s computer and thereby the organization’s internal network and data  Often made easier with information about users often available online facilitating attack  E.g., Social Media Secure Solutions from Security Professionals 4 For Official Use Only

  5. Spear Phishing, Defenses  System / network IT security controls  Spam filters  Antivirus  Content filtering  Digital signatures  User / personnel training Secure Solutions from Security Professionals 5 For Official Use Only

  6. Spear Phishing, Training  Training concepts  Social media  Knowing which emails to trust / validate source  Don’t click URL’s, download files from emails  Pay attention to grammar, greeting, look and feel of the email – identify suspicious emails  Confirm via telephone call, reporting  Training delivery methods  Part of user awareness/onboarding and annual security awareness training (e.g., web based)  Exercises online  Commercial services to perform testing. Provides user training (e.g., this was a test), and provide metrics Secure Solutions from Security Professionals 6 For Official Use Only

  7. Conclusion  Spear Phishing is real and has led to numerous compromises  Commonly used vector, bypasses perimeter defenses, access to internal networks and data  Training the user is essential ! Secure Solutions from Security Professionals 7 For Official Use Only

  8. Questions Secure Solutions from Security Professionals 8 For Official Use Only

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend