federal information systems security education association
play

Federal Information Systems Security Education Association Spear - PowerPoint PPT Presentation

Federal Information Systems Security Education Association Spear Phishing Agenda Definition of spear phishing Why is spear phishing so valuable to attackers Spear phishing defenses / countermeasures Training concepts and delivery


  1. Federal Information Systems Security Education Association Spear Phishing

  2. Agenda  Definition of spear phishing  Why is spear phishing so valuable to attackers  Spear phishing defenses / countermeasures  Training concepts and delivery Secure Solutions from Security Professionals 2 For Official Use Only

  3. Spear Phishing, What is it?  A type of phishing attack  Uses email messages to trick users to clicking a link, downloading a file, entering data, etc.  Malware may be downloaded / executed to hijack the user’s computer  May appear to come from a trusted source (e.g., colleague, supervisor, employer, vendor, etc.)  More targeted than phishing, not random  Attacker is targeting you and your organization’s data Secure Solutions from Security Professionals 3 For Official Use Only

  4. Spear Phishing, Why?  Bypasses many network perimeter security controls – targets the human  Provides access to the user’s computer and thereby the organization’s internal network and data  Often made easier with information about users often available online facilitating attack  E.g., Social Media Secure Solutions from Security Professionals 4 For Official Use Only

  5. Spear Phishing, Defenses  System / network IT security controls  Spam filters  Antivirus  Content filtering  Digital signatures  User / personnel training Secure Solutions from Security Professionals 5 For Official Use Only

  6. Spear Phishing, Training  Training concepts  Social media  Knowing which emails to trust / validate source  Don’t click URL’s, download files from emails  Pay attention to grammar, greeting, look and feel of the email – identify suspicious emails  Confirm via telephone call, reporting  Training delivery methods  Part of user awareness/onboarding and annual security awareness training (e.g., web based)  Exercises online  Commercial services to perform testing. Provides user training (e.g., this was a test), and provide metrics Secure Solutions from Security Professionals 6 For Official Use Only

  7. Conclusion  Spear Phishing is real and has led to numerous compromises  Commonly used vector, bypasses perimeter defenses, access to internal networks and data  Training the user is essential ! Secure Solutions from Security Professionals 7 For Official Use Only

  8. Questions Secure Solutions from Security Professionals 8 For Official Use Only

Recommend


More recommend