Cybersecurity_Awareness_educational_presentation.pdf

jacobjacob21124 15 views 9 slides Feb 28, 2025
Slide 1
Slide 1 of 9
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9

About This Presentation

Cybersecurity Awareness


Slide Content

Cybersecurity
Awareness
Phishing and Social Engineering

WHAT IS PHISHING?
Phishing is a cyber attack that masquerades as a
trustworthy entity to deceive individuals into revealing
personal information.
Example: An email that looks like it’s from your bank,
asking you to verify your account information.

Types of Phishing
1. Email Phishing: General emails sent to a large number of people.
 - Example: An email claiming you've won a lottery and need to provide bank
details.
2. Spear Phishing: Targeted attacks on specific individuals.
 - Example: An email that appears to be from your colleague requesting
sensitive documents.
3. Whaling: Attacks aimed at high-profile targets, such as executives.
 - Example: A CEO receives an email that looks like it’s from the CFO asking
for financial information.

Vishing and Smishing
Vishing: Voice phishing via phone calls.
Example: A caller claims to be from tech support asking for your login details.
Smishing: SMS phishing using text messages.
Example: A text message claiming you’ve won a prize and asking for personal
details.

What is Social Engineering?
Manipulation of individuals into divulging confidential information.
Example: A scammer impersonating IT support to extract passwords.

Common Techniques
1. Pretexting: Creating a fabricated scenario.
 - Example: Claiming to be from the HR department to gather employee
data.
2. Baiting: Offering a reward for information.
 - Example: Leaving a USB drive labeled 'Salary Information' in a public area.

Recognizing Phishing Attempts
1. Look for poor grammar or spelling.
2. Check the sender's email address closely.
3. Be wary of urgent requests for personal information.
Example: 'Your account will be suspended unless you respond immediately.'

How to Protect Yourself
1. Use multi-factor authentication.
2. Verify unexpected requests by contacting the company directly.
3. Keep software and antivirus updated.
Be Cautious with Links and Attachments
Limit Sharing Personal Information
Report Suspicious Activity

CONCLUSION
•Stay vigilant! Understanding phishing and social engineering
is key to protecting yourself and your organization.
Tags