SlideShare a Scribd company logo
1 of 37
Why Do Some People Fall for
Phishing Scams and What Do
I Do About it?
Contact me via Slideshare.
This is from a really good ad campaign on security awareness from Southern Methodist
University.
Phishing
Scamming method used to elicit information
from uninformed computer users through
impersonation of trusted sources; respelling
of fishing used to evade scans and filters by
mainstream servers policing the internet.
Malware
Any code, program, script, software or any
instructions interpreted as attacking a
computer operating system. Malware
includes spyware, trojans, viruses denial of
service/DoS attacks.
Malware and Phishing
have a similar delivery method:
1.Threats
2.Company Logo or Name
3.Links
4.+/- misspelled words and typos
Why do some people seem to fall for
phishing?
Are users:
• On autopilot?
• Not engaged or passive in their online
activities?
• Cowed by perceived authority?
• Lacking critical thinking abilities?
• Other?
Subject: Faculty / Staff / Student Mail Warning
Notification !
Mail account compromised, Confirm and verify
your account by clicking Mailbox Verification .
IMPORTANT NOTICE: Current Mailbox Quota-
size:95.6% You will not be able to send and
receive email messages at 98.8% quota size.
Admin Help-desk
© Copyright 2013
This is an example we get sent to the Campus Help Desk
about once a month:
And according to Educause we are the #2 most phished industry:
Early in 2013 the
Syrian Electronic
Army successfully
phished several
news media
Twitter accounts.
One of them was
the Onion (which
took some time to
discover because
their tweets are
already strange).
The Onion was the only hacked account that later released
information on exactly how it happened. Their staff were sent
this email multiple times over the course of a week. Eventually a
staff member clicked the link and entered the requested
information (if a user clicks the link they are most likely going to
continue on entering what is asked if given no warning from their
browser or mail client).
Emotional Triggers Exploited by
Phishing
There are certain personality types that are the most
susceptible:
• Greed
• Fear
• Heroism
• Desire to be Liked
• Authority
Greed
Date: Mon, 5 Jan 2004 09:30:13
From: chika_williams@tiscali.co.uk
To: gullible@yahoo.com
Subject: URGENT
RE: URGENT REQUEST FOR YOUR UNALLOYED
CO-OPERATION TO TRANSFER (US$20.4 MILLION
U.S. DOLLARS ONLY) INTO YOUR PRIVATE OR
COMPANY’S ACCOUNT
Fear/Authority
Heroism/Desire to be Liked
There are certain victim personality traits when
combined with a cognitive bias that can result in a
user who will fall for phishing attacks. Remember
that each of these traits are completely normal in
small amounts.
• Neuroticism: causes people to be more upset when
being lied to and prefer to believe people are more
truthful.
• Impulsivity: read, decide and click as fast as possible.
• Introversion: prefer online communication.
Cognitive Bias
We are bad at detecting deception in others but
good at detecting honesty.
We tend to overestimate our abilities and
underestimate risk.
We believe what we want to believe (cognitive
dissonance).
Research Study #1: Unnamed University
An 8 week study was done on 446 undergrads in an
Intro to Information Systems course. They were given
aSuper Secret Code (SSC) and told to never give it out
to anyone. The SSC was printed on official university
letterhead with the title disclaimer “Do Not Disclose
This Code.” It was used to access grades, quizzes,
professor/ta email info communicating that the SSC is
important and private. Giving it out would affect grades
and violate the student conduct code. A nondisclosure
agreement was signed.
For 8 Weeks of the class they were instructed on
internet security, phishing, hacking, etc., all lectures
began with reminder displayed on PowerPoint:
‘DO NOT GIVE OUT YOUR SSC’.
Week 6: The unexpected, but not really. A real,
unplanned phishing attack occurred with IT warning
students. It was written up in the student paper.
Week 8 they were emailed the following
message. Notice that there is no link or logo
present.
From: Jason Roth Database Administrator
This e-mail is to inform you of a problem we are having
with the information technology database. Due to a data
collision we have lost some information and are unable to
recover it. In order to get the database back up and
working we need you to forward us your “super-secure
code.” Please respond to this e-mail with your code. Sorry
for the inconvenience.
Out of 299 [final] participants*:
•57% ignored (170)
•32% replied with SSC (97)
•9% alerted IT (26)
•1% responded with a question/comment (4)
•<1% responded with incorrect info (2)
*147 students were excluded because they
dropped class, didn’t receive the email/couldn’t
find it, didn’t take the post instruction test, didn’t
complete all items on final survey.
• here is my SSC xxxxxx. I hope that the database will get
fixed very soon. Best of luck to you on fixing the database.
• My Network ID is xxxxx, My Student Number is xxxxx, my
super secure Code is xxxxx, my home number is xxxxx.
• I think this is my code: xxxx, but I’m not sure. you can call
my mom at xxx- xxxx if this isn’t it as she will have it for
you.
• I was told to never give out my super secrete (sic) code. . . .
So how do I know this isn’t a scam?
• I’m sorry to hear about your problems, but I will not be able
to assist you.
What happened?!
Research Study #2: West Point 2004
A random sampling of 512 cadets were phished.
West Point is unique in that the students have
an average SAT score in the top 25%. The school
was the first to be certified by the Center of
Academic Excellence in Information Assurance
Education (NSA), have a Security Emergency
Response Team and security awareness training
at the beginning of each semester.
(note: the article mainly focused on the intelligence of
the cadets and the issues that would arise from
betraying their trust with this study)
There was no discussion on ongoing IT security training.
The following email was sent to the cadets with a link,
replying email address and physical location of the
sender. When the link was clicked on it returned a 404
error so there is no data on how many entered in their
personal information.
The name is not found in the global address
book, Washington Hall does not have a 7th floor
and the building is used by all cadets on a
regular basis. This is all information that is easily
independently verified.
Out of 512 cadets, 80% clicked the link (~400).
Reasons
‘The email looked suspicious but it was from an
Army colonel so I figured it must be legitimate.’
‘Any e-mail that contains the word ‘grade’ in it
gets my immediate attention and action!’
What happened?!
Data Analysis
Experience Factors:
• Lack of Computer self confidence
• Lack of Web experience
• Lack of Security policy knowledge
Personality Factors
• Victim personality traits (neurotic, impulsive,
introverted)
Phishing and Social Engineering works
better on naive and vulnerable users.
What Made the Difference?
• Reinforced and Ongoing Trainings
• Security Awareness
• Communication from IT on Actual Phishing
Attacks
Back to the original questions.
Are users:
On autopilot? no
Not engaged or passive in their online
activities? no
Cowed by perceived authority? A bit
Lacking critical thinking abilities? No
Other? yes :Of the personality type that
phishing exploits? yes!
They are engaging in these emails critically but
do not have the experience, security knowledge
and confidence to correctly asses the threat.
Be aware of potential victim users:
• Oversharing on Facebook (content and quality)
• New to the web
• Victim Personality Traits
Talk about it:
(think of a personal story that relates): my mom
once told me she replies to spam asking them
to take her off their mailing list. Yes I told her to
stop doing that and why.
Educate Users:
Training on the Difference Between Phishing,
Malware and Spam.
Questions??
Recommended Articles
The Influence of Experiential and Dispositional Factors in Phishing: An Empirical Investigation of the
Deceived
Journal of management information systems [0742-1222] Wright, Ryan yr:2010 vol:27 iss:1 pg:273 -303
An Investigation of Heuristics of Human Judgment in Detecting Deception and Potential Implications in
Countering Social Engineering
2007 IEEE Intelligence and Security Informatics Tiantian Qi, Tiantian yr:2007 pg:152 -159
Fostering E-Mail Security Awareness: The West Point Carronade
EDUCAUSE quarterly [1528-5324] Ferguson, Aaron yr:2005 vol:28 iss:1 pg:54 -57
The State of Phishing Attacks
Communications of the ACM [0001-0782] Hong, Jason yr:2012 vol:55 iss:1 pg:74 -81
Phishing, Personality Traits and Facebook
Halevi, Tzipora yr:2013
Telling Lies: Clues to Deceit in the Marketplace, Politics, and Marriage
Paul Ekman; c1985 New York : Norton

More Related Content

What's hot

UW School of Medicine Social Engineering and Phishing Awareness
UW School of Medicine   Social Engineering and Phishing AwarenessUW School of Medicine   Social Engineering and Phishing Awareness
UW School of Medicine Social Engineering and Phishing AwarenessNicholas Davis
 
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering RiskBSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering RiskRob Ragan
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering OWASP Foundation
 
Social engineering: A Human Hacking Framework
Social engineering: A Human Hacking FrameworkSocial engineering: A Human Hacking Framework
Social engineering: A Human Hacking FrameworkJahangirnagar University
 
Cyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalCyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalResham Acharya
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]sheenau
 
Social engineering for security attacks
Social engineering for security attacksSocial engineering for security attacks
Social engineering for security attacksmasoud khademi
 
Fire eye spearphishing
Fire eye spearphishingFire eye spearphishing
Fire eye spearphishingZeno Idzerda
 
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreWilliam Mann
 
Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile securityErnest Staats
 
Cyber Summit 2016: Understanding Users' (In)Secure Behaviour
Cyber Summit 2016: Understanding Users' (In)Secure BehaviourCyber Summit 2016: Understanding Users' (In)Secure Behaviour
Cyber Summit 2016: Understanding Users' (In)Secure BehaviourCybera Inc.
 
Attacking the Privacy of Social Network users (HITB 2011)
Attacking the Privacy of Social Network users (HITB 2011)Attacking the Privacy of Social Network users (HITB 2011)
Attacking the Privacy of Social Network users (HITB 2011)Marco Balduzzi
 
Cyber Bullying 101 for Parents
Cyber Bullying 101 for ParentsCyber Bullying 101 for Parents
Cyber Bullying 101 for Parentsdamarissepulveda
 
Digital literacy 2
Digital literacy 2Digital literacy 2
Digital literacy 2mj_jamal
 
Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethicsJohnlery Guzman
 
Customer Involvement in Phishing Defence
Customer Involvement in Phishing DefenceCustomer Involvement in Phishing Defence
Customer Involvement in Phishing DefenceJordan Schroeder
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingwirsi
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpointjosiebrookeday
 

What's hot (20)

UW School of Medicine Social Engineering and Phishing Awareness
UW School of Medicine   Social Engineering and Phishing AwarenessUW School of Medicine   Social Engineering and Phishing Awareness
UW School of Medicine Social Engineering and Phishing Awareness
 
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering RiskBSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering
 
Social engineering: A Human Hacking Framework
Social engineering: A Human Hacking FrameworkSocial engineering: A Human Hacking Framework
Social engineering: A Human Hacking Framework
 
Cyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalCyber security tips in Banking in Nepal
Cyber security tips in Banking in Nepal
 
Digital safety[1]
Digital safety[1]Digital safety[1]
Digital safety[1]
 
Social engineering for security attacks
Social engineering for security attacksSocial engineering for security attacks
Social engineering for security attacks
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Fire eye spearphishing
Fire eye spearphishingFire eye spearphishing
Fire eye spearphishing
 
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & More
 
Cyber stalking
Cyber stalking Cyber stalking
Cyber stalking
 
Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile security
 
Cyber Summit 2016: Understanding Users' (In)Secure Behaviour
Cyber Summit 2016: Understanding Users' (In)Secure BehaviourCyber Summit 2016: Understanding Users' (In)Secure Behaviour
Cyber Summit 2016: Understanding Users' (In)Secure Behaviour
 
Attacking the Privacy of Social Network users (HITB 2011)
Attacking the Privacy of Social Network users (HITB 2011)Attacking the Privacy of Social Network users (HITB 2011)
Attacking the Privacy of Social Network users (HITB 2011)
 
Cyber Bullying 101 for Parents
Cyber Bullying 101 for ParentsCyber Bullying 101 for Parents
Cyber Bullying 101 for Parents
 
Digital literacy 2
Digital literacy 2Digital literacy 2
Digital literacy 2
 
Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethics
 
Customer Involvement in Phishing Defence
Customer Involvement in Phishing DefenceCustomer Involvement in Phishing Defence
Customer Involvement in Phishing Defence
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpoint
 

Similar to Why Do Some People Fall for Phishing Scams and What Do I Do About it?

Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011
Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011
Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011Jason Hong
 
Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010
Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010
Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010Jason Hong
 
Cyberattacks the-next-healthcare-epidemic
Cyberattacks the-next-healthcare-epidemicCyberattacks the-next-healthcare-epidemic
Cyberattacks the-next-healthcare-epidemicKate Barney
 
media safety .pptx
media safety .pptxmedia safety .pptx
media safety .pptxGAmarioarei
 
Spam as social engineering presentation.
Spam as social engineering presentation.Spam as social engineering presentation.
Spam as social engineering presentation.fificoco
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitssuser64f8f8
 
Data Security for Nonprofits
Data Security for NonprofitsData Security for Nonprofits
Data Security for NonprofitsNPowerCR
 
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011Jason Hong
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureLourdes Paloma Gimenez
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxKevinRiley83
 
[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop SlidesNathanielCarlson2
 
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul StyrvokyNTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul StyrvokyNorth Texas Chapter of the ISSA
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awarenessKaran Veer Singh
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWPICPE
 
Cybersecurity-Awareness-Presentation-17-May-22.pptx
Cybersecurity-Awareness-Presentation-17-May-22.pptxCybersecurity-Awareness-Presentation-17-May-22.pptx
Cybersecurity-Awareness-Presentation-17-May-22.pptxRahulDasari12
 
Cybersecurity-Awareness-Presentation-17-May-22 (1).pptx
Cybersecurity-Awareness-Presentation-17-May-22 (1).pptxCybersecurity-Awareness-Presentation-17-May-22 (1).pptx
Cybersecurity-Awareness-Presentation-17-May-22 (1).pptxSanjaiJinSanjaiJin
 
Presentation on Email phishing.pptx
Presentation on Email phishing.pptxPresentation on Email phishing.pptx
Presentation on Email phishing.pptxAbdulHaseebKhan34
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTTeacherNicaPrintable
 

Similar to Why Do Some People Fall for Phishing Scams and What Do I Do About it? (20)

Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011
Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011
Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011
 
Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010
Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010
Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010
 
Cyberattacks the-next-healthcare-epidemic
Cyberattacks the-next-healthcare-epidemicCyberattacks the-next-healthcare-epidemic
Cyberattacks the-next-healthcare-epidemic
 
media safety .pptx
media safety .pptxmedia safety .pptx
media safety .pptx
 
Spam as social engineering presentation.
Spam as social engineering presentation.Spam as social engineering presentation.
Spam as social engineering presentation.
 
phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the bait
 
Data Security for Nonprofits
Data Security for NonprofitsData Security for Nonprofits
Data Security for Nonprofits
 
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides
 
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul StyrvokyNTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
 
Cybersecurity-Awareness-Presentation-17-May-22.pptx
Cybersecurity-Awareness-Presentation-17-May-22.pptxCybersecurity-Awareness-Presentation-17-May-22.pptx
Cybersecurity-Awareness-Presentation-17-May-22.pptx
 
Cybersecurity-Awareness-Presentation-17-May-22 (1).pptx
Cybersecurity-Awareness-Presentation-17-May-22 (1).pptxCybersecurity-Awareness-Presentation-17-May-22 (1).pptx
Cybersecurity-Awareness-Presentation-17-May-22 (1).pptx
 
Presentation on Email phishing.pptx
Presentation on Email phishing.pptxPresentation on Email phishing.pptx
Presentation on Email phishing.pptx
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
 

Recently uploaded

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 

Recently uploaded (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 

Why Do Some People Fall for Phishing Scams and What Do I Do About it?

  • 1. Why Do Some People Fall for Phishing Scams and What Do I Do About it? Contact me via Slideshare.
  • 2. This is from a really good ad campaign on security awareness from Southern Methodist University.
  • 3. Phishing Scamming method used to elicit information from uninformed computer users through impersonation of trusted sources; respelling of fishing used to evade scans and filters by mainstream servers policing the internet.
  • 4. Malware Any code, program, script, software or any instructions interpreted as attacking a computer operating system. Malware includes spyware, trojans, viruses denial of service/DoS attacks.
  • 5. Malware and Phishing have a similar delivery method: 1.Threats 2.Company Logo or Name 3.Links 4.+/- misspelled words and typos
  • 6. Why do some people seem to fall for phishing? Are users: • On autopilot? • Not engaged or passive in their online activities? • Cowed by perceived authority? • Lacking critical thinking abilities? • Other?
  • 7. Subject: Faculty / Staff / Student Mail Warning Notification ! Mail account compromised, Confirm and verify your account by clicking Mailbox Verification . IMPORTANT NOTICE: Current Mailbox Quota- size:95.6% You will not be able to send and receive email messages at 98.8% quota size. Admin Help-desk © Copyright 2013 This is an example we get sent to the Campus Help Desk about once a month:
  • 8. And according to Educause we are the #2 most phished industry:
  • 9. Early in 2013 the Syrian Electronic Army successfully phished several news media Twitter accounts. One of them was the Onion (which took some time to discover because their tweets are already strange).
  • 10. The Onion was the only hacked account that later released information on exactly how it happened. Their staff were sent this email multiple times over the course of a week. Eventually a staff member clicked the link and entered the requested information (if a user clicks the link they are most likely going to continue on entering what is asked if given no warning from their browser or mail client).
  • 11. Emotional Triggers Exploited by Phishing There are certain personality types that are the most susceptible: • Greed • Fear • Heroism • Desire to be Liked • Authority
  • 12. Greed Date: Mon, 5 Jan 2004 09:30:13 From: chika_williams@tiscali.co.uk To: gullible@yahoo.com Subject: URGENT RE: URGENT REQUEST FOR YOUR UNALLOYED CO-OPERATION TO TRANSFER (US$20.4 MILLION U.S. DOLLARS ONLY) INTO YOUR PRIVATE OR COMPANY’S ACCOUNT
  • 15. There are certain victim personality traits when combined with a cognitive bias that can result in a user who will fall for phishing attacks. Remember that each of these traits are completely normal in small amounts. • Neuroticism: causes people to be more upset when being lied to and prefer to believe people are more truthful. • Impulsivity: read, decide and click as fast as possible. • Introversion: prefer online communication.
  • 16. Cognitive Bias We are bad at detecting deception in others but good at detecting honesty. We tend to overestimate our abilities and underestimate risk. We believe what we want to believe (cognitive dissonance).
  • 17. Research Study #1: Unnamed University An 8 week study was done on 446 undergrads in an Intro to Information Systems course. They were given aSuper Secret Code (SSC) and told to never give it out to anyone. The SSC was printed on official university letterhead with the title disclaimer “Do Not Disclose This Code.” It was used to access grades, quizzes, professor/ta email info communicating that the SSC is important and private. Giving it out would affect grades and violate the student conduct code. A nondisclosure agreement was signed.
  • 18. For 8 Weeks of the class they were instructed on internet security, phishing, hacking, etc., all lectures began with reminder displayed on PowerPoint: ‘DO NOT GIVE OUT YOUR SSC’. Week 6: The unexpected, but not really. A real, unplanned phishing attack occurred with IT warning students. It was written up in the student paper.
  • 19. Week 8 they were emailed the following message. Notice that there is no link or logo present. From: Jason Roth Database Administrator This e-mail is to inform you of a problem we are having with the information technology database. Due to a data collision we have lost some information and are unable to recover it. In order to get the database back up and working we need you to forward us your “super-secure code.” Please respond to this e-mail with your code. Sorry for the inconvenience.
  • 20. Out of 299 [final] participants*: •57% ignored (170) •32% replied with SSC (97) •9% alerted IT (26) •1% responded with a question/comment (4) •<1% responded with incorrect info (2) *147 students were excluded because they dropped class, didn’t receive the email/couldn’t find it, didn’t take the post instruction test, didn’t complete all items on final survey.
  • 21. • here is my SSC xxxxxx. I hope that the database will get fixed very soon. Best of luck to you on fixing the database. • My Network ID is xxxxx, My Student Number is xxxxx, my super secure Code is xxxxx, my home number is xxxxx. • I think this is my code: xxxx, but I’m not sure. you can call my mom at xxx- xxxx if this isn’t it as she will have it for you. • I was told to never give out my super secrete (sic) code. . . . So how do I know this isn’t a scam? • I’m sorry to hear about your problems, but I will not be able to assist you.
  • 23. Research Study #2: West Point 2004 A random sampling of 512 cadets were phished. West Point is unique in that the students have an average SAT score in the top 25%. The school was the first to be certified by the Center of Academic Excellence in Information Assurance Education (NSA), have a Security Emergency Response Team and security awareness training at the beginning of each semester.
  • 24. (note: the article mainly focused on the intelligence of the cadets and the issues that would arise from betraying their trust with this study) There was no discussion on ongoing IT security training. The following email was sent to the cadets with a link, replying email address and physical location of the sender. When the link was clicked on it returned a 404 error so there is no data on how many entered in their personal information.
  • 25.
  • 26. The name is not found in the global address book, Washington Hall does not have a 7th floor and the building is used by all cadets on a regular basis. This is all information that is easily independently verified. Out of 512 cadets, 80% clicked the link (~400).
  • 27. Reasons ‘The email looked suspicious but it was from an Army colonel so I figured it must be legitimate.’ ‘Any e-mail that contains the word ‘grade’ in it gets my immediate attention and action!’
  • 29. Data Analysis Experience Factors: • Lack of Computer self confidence • Lack of Web experience • Lack of Security policy knowledge Personality Factors • Victim personality traits (neurotic, impulsive, introverted) Phishing and Social Engineering works better on naive and vulnerable users.
  • 30. What Made the Difference? • Reinforced and Ongoing Trainings • Security Awareness • Communication from IT on Actual Phishing Attacks
  • 31. Back to the original questions. Are users: On autopilot? no Not engaged or passive in their online activities? no Cowed by perceived authority? A bit Lacking critical thinking abilities? No Other? yes :Of the personality type that phishing exploits? yes!
  • 32. They are engaging in these emails critically but do not have the experience, security knowledge and confidence to correctly asses the threat.
  • 33. Be aware of potential victim users: • Oversharing on Facebook (content and quality) • New to the web • Victim Personality Traits
  • 34. Talk about it: (think of a personal story that relates): my mom once told me she replies to spam asking them to take her off their mailing list. Yes I told her to stop doing that and why.
  • 35. Educate Users: Training on the Difference Between Phishing, Malware and Spam.
  • 37. Recommended Articles The Influence of Experiential and Dispositional Factors in Phishing: An Empirical Investigation of the Deceived Journal of management information systems [0742-1222] Wright, Ryan yr:2010 vol:27 iss:1 pg:273 -303 An Investigation of Heuristics of Human Judgment in Detecting Deception and Potential Implications in Countering Social Engineering 2007 IEEE Intelligence and Security Informatics Tiantian Qi, Tiantian yr:2007 pg:152 -159 Fostering E-Mail Security Awareness: The West Point Carronade EDUCAUSE quarterly [1528-5324] Ferguson, Aaron yr:2005 vol:28 iss:1 pg:54 -57 The State of Phishing Attacks Communications of the ACM [0001-0782] Hong, Jason yr:2012 vol:55 iss:1 pg:74 -81 Phishing, Personality Traits and Facebook Halevi, Tzipora yr:2013 Telling Lies: Clues to Deceit in the Marketplace, Politics, and Marriage Paul Ekman; c1985 New York : Norton

Editor's Notes

  1. Why am I interested in this topic? Critical thinking and technology, more school, speaking about this at the U last week
  2. Southern Methodist University; security awareness campaign, image works for drugs, alcohol, daterape, cheating
  3. Technical side and a user side.Phishing and malware have a similar delivery system.
  4. Delivery is similar to phishing
  5. We are the #2 most phished industry
  6. The onion was hacked on twitter by the syrian electronic army
  7. How the onion was hacked
  8. Cognitive bias, pretty commonPeople are not good at estimating their vulnerability to internet attack.Neuroticism causes people to be more upset at when being lied to and prefer to believe people are more truthfulIntroversion – prefer online communication
  9. The SSC was printed on official university letterhead with the title disclaimer “Do Not Disclose This Code.”SSC was used to access grades, quizzes, professor/ta email info: SSC is important and private.Giving it out would affect grades and violate the student conduct code. A nondisclosure agreement was signed.
  10. Week 6: a real, unplanned phishing attack with IT warning students, written up in student paper.
  11. No links, no company logo.The goal: don’t respond to this, report it to Campus IT
  12. Started with 446147 subjects were excluded: Dropped classDidn’t receive the email/couldn’t find itDidn’t take the post instruction testDidn’t complete all items on final survey
  13. The responses
  14. 4 page educause article on a study done at West Point: average sat score in the top 25%Center of Academic Excellence in Information Assurance Education (IT Security)No discussion on ongoing IT security training
  15. Sent to 512 cadetsLink returned a 404 error but might have had more results if presented w a login screen.
  16. There was no mention of an actual phishing attempt near this test.
  17. From both studies
  18. Disposition to trustPerceived risk Did not matter
  19. Users were engaging in their online activities and thinking critically about them.
  20. My mom used to respond to spam asking them to stop emailing her. I have a instructor led power point training on phishing, malware and spam and plan to do a captivate video. Will be on the wiki