<?xml version="1.0"?>
<Module projectID="1378" moduleID="1758" filePath="disa/ia/cw/disa_ia_srldr_fy13/dev/M01_L03/data.xml" showTextDisplayMode="captionsAndHTML">
	<ModuleName>M01_L03</ModuleName>
	<AU>M01_L03</AU>
	<Title>Whaling</Title>
	<Subtitle>M01_L03</Subtitle>
	<LinkSet>links</LinkSet>
	<DefaultControlText name="Done" value="Submit"></DefaultControlText>
	<DefaultControlText name="NextFeedback" value="Next Feedback"></DefaultControlText>
	<DefaultControlText name="PreviousFeedback" value="Previous Feedback"></DefaultControlText>
	<DefaultControlText name="CloseFeedback" value="Close Feedback"></DefaultControlText>
	<DefaultControlText name="TryAgain" value="Try Again"></DefaultControlText>
	<DefaultControlText name="button_print" value="Print Certificate"></DefaultControlText>
	<NavBtns order="helpBtn,exitBtn,[PAGE],mainMenuBtn,resourcesBtn,glossaryBtn,transcriptBtn,turnAudioDescriptionsOffBtn,turnAudioDescriptionsOnBtn,hideCCBtn,showCCBtn,rewindBtn,replayBtn,skipReverseBtn,skipForwardBtn,pauseBtn,resumeBtn,previousPgBtn,pageLocation,nextPgBtn," order_intro="">
		<NavBtn>
			<ControlType>ReadOnlyText</ControlType>
			<ID>pageLocation</ID>
			<RMAText>Page x of y</RMAText>
		</NavBtn>
		<NavBtn>
			<ID>helpBtn</ID>
			<Label>Help</Label>
			<RMAText>Help. Select this button to open the help panel.</RMAText>
			<ClickEventName>HelpButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>exitBtn</ID>
			<Label>Exit</Label>
			<RMAText>Exit. Select this button to exit the course.</RMAText>
			<ClickEventName>ExitButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>mainMenuBtn</ID>
			<Label>Main Menu</Label>
			<RMAText>Main Menu. Select this button to access the main menu.</RMAText>
			<ClickEventName>MainMenuButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>glossaryBtn</ID>
			<Label>Glossary</Label>
			<RMAText>Glossary. Select this button open the glossary.</RMAText>
			<ClickEventName>GlossaryButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>resourcesBtn</ID>
			<Label>Resources</Label>
			<RMAText>Resources. Select this button to access the resources for the course.</RMAText>
			<ClickEventName>ResourcesButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>hideCCBtn</ID>
			<Label>Hide Captions</Label>
			<RMAText>Hide Captions. Select this button to hide the caption text.</RMAText>
			<ClickEventName>HideCCButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>showCCBtn</ID>
			<Label>Show Captions</Label>
			<RMAText>Show Captions. Select this button to show the caption text.</RMAText>
			<ClickEventName>ShowCCButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>turnAudioDescriptionsOffBtn</ID>
			<Label>Turn Audio Descriptions Off</Label>
			<RMAText>Turn Audio Descriptions Off. Select this button to turn off audio descriptions.</RMAText>
			<ClickEventName>AudioDescriptionsOffButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>turnAudioDescriptionsOnBtn</ID>
			<Label>Turn Audio Descriptions On</Label>
			<RMAText>Turn Audio Descriptions On. Select this button to turn on audio descriptions.</RMAText>
			<ClickEventName>AudioDescriptionsOnButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>skipReverseBtn</ID>
			<Label>Skip Backward</Label>
			<RMAText>Skip Backward. Select this button to skip a few frames back.</RMAText>
			<ClickEventName>SkipReverseButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>skipForwardBtn</ID>
			<Label>Skip Forward</Label>
			<RMAText>Skip Forward. Select this button to skip a few frames ahead.</RMAText>
			<ClickEventName>SkipForwardButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>replayBtn</ID>
			<Label>Replay</Label>
			<RMAText>Replay. Select this button to replay the current screen.</RMAText>
			<ClickEventName>ReplayButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>transcriptBtn</ID>
			<Label>Transcript</Label>
			<RMAText>Transcript. Select this button for a transcript of the current page.</RMAText>
			<ClickEventName>ShowTextButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>pauseBtn</ID>
			<Label>Pause</Label>
			<RMAText>Pause.  Select this button to pause the course.</RMAText>
			<ClickEventName>PauseButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>resumeBtn</ID>
			<Label>Resume</Label>
			<RMAText>Resume. Select this button to resume the course.</RMAText>
			<ClickEventName>ResumeButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn prevBtn="true" toggleOffSilent="false">
			<ID>previousPgBtn</ID>
			<Label>Back</Label>
			<RMAText>Back. Select this button to go to the previous screen.</RMAText>
			<ClickEventName>PreviousButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn h="19.1" nextBtn="true" toggleOffSilent="false" w="67.6">
			<ID>nextPgBtn</ID>
			<Label>Next</Label>
			<RMAText>Next. Select this button to go to the next screen.</RMAText>
			<ClickEventName>NextButtonClicked</ClickEventName>
		</NavBtn>
	</NavBtns>
	<Topics>
		<Topic>
			<Title></Title>
			<Subtitle></Subtitle>
			<Pages>
				<Page>
					<Title></Title>
					<Subtitle></Subtitle>
					<Filename>disaldr03_01</Filename>
					<PageNbr>1</PageNbr>
					<Sec508Data Page="disaldr03_01"></Sec508Data>
					<ShowText Page="disaldr03_01">
						<Txt frameNbr="3460">How do you avoid being a victim when you, as a senior leader, are a special target? How do you protect yourself?</Txt>
						<Txt frameNbr="3637">How do you protect your mission?</Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>Identifying the Threat</Title>
					<Subtitle></Subtitle>
					<Filename>disaldr03_02</Filename>
					<PageNbr>2</PageNbr>
					<Sec508Data Page="disaldr03_02"></Sec508Data>
					<ShowText Page="disaldr03_02">
						<Txt frameNbr="5"><![CDATA[Let's take a look at the e-mail the Deputy Assistant Secretary received. What did he miss? What did his staffer miss? How]]></Txt>
						<Txt frameNbr="211"><![CDATA[can you avoid being a victim? We're all familiar with phishing, a type of scam that uses e-mail or websites to deceive you into]]></Txt>
						<Txt frameNbr="415">disclosing personal information useful in identity theft. And as Mr. Smith and his staffer discovered, phishing can also</Txt>
						<Txt frameNbr="606">be an attempt to gain access to your computer or network by requesting that you click a link to download a document or visit</Txt>
						<Txt frameNbr="794"><![CDATA[a website. This can jeopardize the security of your organization's information and information systems  And, as a]]></Txt>
						<Txt frameNbr="990"><![CDATA[result, damage your organization's mission. If this were a run-of-the-mill phishing attempt, they wouldn't have]]></Txt>
						<Txt frameNbr="1150">been deceived. We all know what to look for now: the requests for personal information, the threats of dire</Txt>
						<Txt frameNbr="1297"><![CDATA[consequences, or the promise of great reward. But Mr. Smith's e-mail had none of those elements, except for the subtle]]></Txt>
						<Txt frameNbr="1489">threat implied by being involved in any IG investigation. The reason he and his staffer fell victim was that he received a</Txt>
						<Txt frameNbr="1681">message that appeared to come from inside his organization, from someone who seemed to actually know of</Txt>
						<Txt frameNbr="1824">the details of a seemingly official and urgent matter. Another method hackers sometimes use is to target the</Txt>
						<Txt frameNbr="1995">senior leader or his or her family, by falsely claiming some acquaintanceship with them. Both approaches are part of a</Txt>
						<Txt frameNbr="2177">technique known as whaling, or whale phishing, a form of phishing sent to senior executives or other high-level</Txt>
						<Txt frameNbr="2340">officials due to their high profile and their potential access to sensitive and classified information.</Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>How Whaling Works</Title>
					<Subtitle></Subtitle>
					<Filename>disaldr03_03</Filename>
					<PageNbr>3</PageNbr>
					<Sec508Data Page="disaldr03_03"></Sec508Data>
					<ShowText Page="disaldr03_03">
						<Txt frameNbr="5"><![CDATA[So why was this e-mail so convincing? The e-mail appears to be from Jim Smith's agency Inspector General, or IG, office,]]></Txt>
						<Txt frameNbr="211">and the sender seems to have a legitimate organizational e-mail address. How did the email seemingly come from inside Mr.</Txt>
						<Txt frameNbr="409"><![CDATA[Smith's own organization? Successful hackers are practiced at  spoofing  e-mail addresses, so they appear to]]></Txt>
						<Txt frameNbr="585"><![CDATA[be real. In addition, with such a high-profile target, this hacker also took the time to research Mr. Smith's organization,]]></Txt>
						<Txt frameNbr="792"><![CDATA[including its IG personnel, in order to convincingly reference Mr. Smith's role as a leader inside his organization. How did]]></Txt>
						<Txt frameNbr="1018"><![CDATA[the sender know so much about the Deputy Assistant Secretary's job? Mr. Smith often appears in the news. His]]></Txt>
						<Txt frameNbr="1206"><![CDATA[organization is well-known and has a public website that describes the organization's structure and Mr. Smith's role.]]></Txt>
						<Txt frameNbr="1388"><![CDATA[Let's look at this e-mail even more closely. The e-mail asks the Secretary to review a subpoena to testify]]></Txt>
						<Txt frameNbr="1581">regarding an ongoing leak investigation. This is a matter he should not ignore, right? Think about this. The e-mail</Txt>
						<Txt frameNbr="1775"><![CDATA[isn't asking for personal information or even sensitive or classified information. But is this how the IG handles]]></Txt>
						<Txt frameNbr="1967">investigations?  Was this e-mail actually digitally signed?   Would your staff know what to do? Would you know what to</Txt>
						<Txt frameNbr="2168">look for? Now imagine if the e-mail Mr. Smith received used a different approach. This is a personalized message from</Txt>
						<Txt frameNbr="2376">someone who actually seems to have met the Secretary. How did the sender know so much information about his activities</Txt>
						<Txt frameNbr="2552">and interests? Mr. Smith has a couple of social networking accounts a professional page containing his resume and a</Txt>
						<Txt frameNbr="2744">Twitter account which he uses to promote his speaking engagements. Would Mr. Smith have been suspicious if he had</Txt>
						<Txt frameNbr="2911">received this e-mail? Would it have fooled you?</Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>Consequences of Whaling</Title>
					<Subtitle></Subtitle>
					<Filename>disaldr03_04</Filename>
					<PageNbr>4</PageNbr>
					<Sec508Data Page="disaldr03_04"></Sec508Data>
					<ShowText Page="disaldr03_04">
						<Txt frameNbr="5">As Mr. Smith and his staffer so painfully learned, once you fall victim to a whaling attack, you provide hackers with an easy</Txt>
						<Txt frameNbr="195">path to organizational systems or other people with inside information. Clicking a link or downloading an attachment</Txt>
						<Txt frameNbr="393">may install malicious code that can record keystrokes to capture system access credentials and information on</Txt>
						<Txt frameNbr="565"><![CDATA[the user's computer. This allows hackers to take over the computer and impersonate the victim to access other]]></Txt>
						<Txt frameNbr="828"><![CDATA[applications and systems on the network, stealing an organization's most sensitive information or disabling networks.]]></Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>How to Protect Against Whaling</Title>
					<Subtitle></Subtitle>
					<Filename>disaldr03_05</Filename>
					<PageNbr>5</PageNbr>
					<Sec508Data Page="disaldr03_05"></Sec508Data>
					<ShowText Page="disaldr03_05">
						<Txt frameNbr="1"><![CDATA[Just how do you avoid being a victim? Always be wary of e-mails that ask for sensitive information, contain unexpected attachments, or provide unconfirmed URLs. Remember that hackers can find your personal information in a variety of ways, so don't assume that just because someone knows a lot about you, they are a legitimate sender. Whalers tend to exploit relevant issues or topics to create a sense of urgency. And they often claim previous acquaintanceships at conferences or official events. Ask yourself: do you actually remember meeting this particular individual? Can you verify they are who they say they are? In addition to knowing how to recognize whaling attempts yourself, be sure that any of your immediate staff who handles correspondence for you is also well-versed in whaling, what it looks like, and how to avoid making you a victim. When immediate staff acts on your behalf, they represent you. Be sure that they know and follow the rules and that they inform you if they suspect whaling. Any time you receive a suspicious e-mail, you or your staff should report it to your security POC and follow their instructions. ]]></Txt>
						<Txt frameNbr="1"></Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>[Conclusion]</Title>
					<Subtitle></Subtitle>
					<Filename>disaldr03_06</Filename>
					<PageNbr>6</PageNbr>
					<Sec508Data Page="disaldr03_06"></Sec508Data>
					<ShowText Page="disaldr03_06">
						<Txt frameNbr="1"><![CDATA[Before Mr. Smith forwarded the e-mail to his staff member, Mr. Smith should have verified that the e-mail was actually from someone in the IG's office. Before Mr. Smith's staff member opened the attachment, he should have called the IG's office using a verified phone number.  . The investment of just one or two minutes of time would have revealed that this was not a legitimate request. Either Mr. Smith or his staff member could have prevented the hacker from gaining access to their organization's computer network. They could have protected their organization's mission. Instead, Mr. Smith is now in the news but not for a good reason. You are a target. Don't be a victim. Protect your mission. ]]></Txt>
						<Txt frameNbr="1"></Txt>
					</ShowText>
				</Page>
			</Pages>
		</Topic>
	</Topics>
</Module>