<?xml version="1.0"?>
<Module projectID="1378" moduleID="1758" filePath="disa/ia/cw/disa_ia_srldr_fy13/dev/M01_L03/data.xml" showTextDisplayMode="captionsAndHTML">
	<ModuleName>M01_L03</ModuleName>
	<AU>M01_L03</AU>
	<Title>Whaling</Title>
	<Subtitle>M01_L03</Subtitle>
	<LinkSet>links</LinkSet>
	<DefaultControlText name="Done" value="Submit"></DefaultControlText>
	<DefaultControlText name="NextFeedback" value="Next Feedback"></DefaultControlText>
	<DefaultControlText name="PreviousFeedback" value="Previous Feedback"></DefaultControlText>
	<DefaultControlText name="CloseFeedback" value="Close Feedback"></DefaultControlText>
	<DefaultControlText name="TryAgain" value="Try Again"></DefaultControlText>
	<DefaultControlText name="button_print" value="Print Certificate"></DefaultControlText>
	<NavBtns order="helpBtn,exitBtn,[PAGE],mainMenuBtn,resourcesBtn,glossaryBtn,transcriptBtn,turnAudioDescriptionsOffBtn,turnAudioDescriptionsOnBtn,hideCCBtn,showCCBtn,rewindBtn,replayBtn,skipReverseBtn,skipForwardBtn,pauseBtn,resumeBtn,previousPgBtn,pageLocation,nextPgBtn," order_intro="">
		<NavBtn>
			<ControlType>ReadOnlyText</ControlType>
			<ID>pageLocation</ID>
			<RMAText>Page x of y</RMAText>
		</NavBtn>
		<NavBtn>
			<ID>helpBtn</ID>
			<Label>Help</Label>
			<RMAText>Help. Select this button to open the help panel.</RMAText>
			<ClickEventName>HelpButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>exitBtn</ID>
			<Label>Exit</Label>
			<RMAText>Exit. Select this button to exit the course.</RMAText>
			<ClickEventName>ExitButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>mainMenuBtn</ID>
			<Label>Main Menu</Label>
			<RMAText>Main Menu. Select this button to access the main menu.</RMAText>
			<ClickEventName>MainMenuButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>glossaryBtn</ID>
			<Label>Glossary</Label>
			<RMAText>Glossary. Select this button open the glossary.</RMAText>
			<ClickEventName>GlossaryButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>resourcesBtn</ID>
			<Label>Resources</Label>
			<RMAText>Resources. Select this button to access the resources for the course.</RMAText>
			<ClickEventName>ResourcesButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>hideCCBtn</ID>
			<Label>Hide Captions</Label>
			<RMAText>Hide Captions. Select this button to hide the caption text.</RMAText>
			<ClickEventName>HideCCButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>showCCBtn</ID>
			<Label>Show Captions</Label>
			<RMAText>Show Captions. Select this button to show the caption text.</RMAText>
			<ClickEventName>ShowCCButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>turnAudioDescriptionsOffBtn</ID>
			<Label>Turn Audio Descriptions Off</Label>
			<RMAText>Turn Audio Descriptions Off. Select this button to turn off audio descriptions.</RMAText>
			<ClickEventName>AudioDescriptionsOffButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>turnAudioDescriptionsOnBtn</ID>
			<Label>Turn Audio Descriptions On</Label>
			<RMAText>Turn Audio Descriptions On. Select this button to turn on audio descriptions.</RMAText>
			<ClickEventName>AudioDescriptionsOnButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>skipReverseBtn</ID>
			<Label>Skip Backward</Label>
			<RMAText>Skip Backward. Select this button to skip a few frames back.</RMAText>
			<ClickEventName>SkipReverseButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>skipForwardBtn</ID>
			<Label>Skip Forward</Label>
			<RMAText>Skip Forward. Select this button to skip a few frames ahead.</RMAText>
			<ClickEventName>SkipForwardButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>replayBtn</ID>
			<Label>Replay</Label>
			<RMAText>Replay. Select this button to replay the current screen.</RMAText>
			<ClickEventName>ReplayButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>transcriptBtn</ID>
			<Label>Transcript</Label>
			<RMAText>Transcript. Select this button for a transcript of the current page.</RMAText>
			<ClickEventName>ShowTextButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>pauseBtn</ID>
			<Label>Pause</Label>
			<RMAText>Pause.  Select this button to pause the course.</RMAText>
			<ClickEventName>PauseButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>resumeBtn</ID>
			<Label>Resume</Label>
			<RMAText>Resume. Select this button to resume the course.</RMAText>
			<ClickEventName>ResumeButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn prevBtn="true" toggleOffSilent="false">
			<ID>previousPgBtn</ID>
			<Label>Back</Label>
			<RMAText>Back. Select this button to go to the previous screen.</RMAText>
			<ClickEventName>PreviousButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn h="19.1" nextBtn="true" toggleOffSilent="false" w="67.6">
			<ID>nextPgBtn</ID>
			<Label>Next</Label>
			<RMAText>Next. Select this button to go to the next screen.</RMAText>
			<ClickEventName>NextButtonClicked</ClickEventName>
		</NavBtn>
	</NavBtns>
	<Topics>
		<Topic>
			<Title></Title>
			<Subtitle></Subtitle>
			<Pages>
				<Page>
					<Title></Title>
					<Subtitle></Subtitle>
					<Filename>disaldr03_01</Filename>
					<PageNbr>1</PageNbr>
					<Sec508Data Page="disaldr03_01"></Sec508Data>
					<ShowText Page="disaldr03_01">
						<Txt frameNbr="5"></Txt>
						<Txt frameNbr="3460">How do you avoid being a victim when you, as a senior leader, are a special target? How do you protect yourself?</Txt>
						<Txt frameNbr="3635">How do you protect your mission?</Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>Identifying the Threat</Title>
					<Subtitle></Subtitle>
					<Filename>disaldr03_02</Filename>
					<PageNbr>2</PageNbr>
					<Sec508Data Page="disaldr03_02"></Sec508Data>
					<ShowText Page="disaldr03_02">
						<Txt frameNbr="5"><![CDATA[Let's take a look at the e-mail the Deputy Assistant Secretary received. What did he miss? What did his staffer miss? How]]></Txt>
						<Txt frameNbr="211"><![CDATA[can you avoid being a victim? We're all familiar with phishing, a type of scam that uses e-mail or websites to deceive you into]]></Txt>
						<Txt frameNbr="415">disclosing personal information useful in identity theft. And as Mr. Smith and his staffer discovered, phishing can also</Txt>
						<Txt frameNbr="606">be an attempt to gain access to your computer or network by requesting that you click a link to download a document or visit</Txt>
						<Txt frameNbr="794"><![CDATA[a website. This can jeopardize the security of your organization's information and information systems  And, as a]]></Txt>
						<Txt frameNbr="990"><![CDATA[result, damage your organization's mission. If this were a run-of-the-mill phishing attempt, they wouldn't have]]></Txt>
						<Txt frameNbr="1150">been deceived. We all know what to look for now: the requests for personal information, the threats of dire</Txt>
						<Txt frameNbr="1297"><![CDATA[consequences, or the promise of great reward. But Mr. Smith's e-mail had none of those elements, except for the subtle]]></Txt>
						<Txt frameNbr="1489">threat implied by being involved in any IG investigation. The reason he and his staffer fell victim was that he received a</Txt>
						<Txt frameNbr="1681">message that appeared to come from inside his organization, from someone who seemed to actually know of</Txt>
						<Txt frameNbr="1824">the details of a seemingly official and urgent matter. Another method hackers sometimes use is to target the</Txt>
						<Txt frameNbr="1995">senior leader or his or her family, by falsely claiming some acquaintanceship with them. Both approaches are part of a</Txt>
						<Txt frameNbr="2177">technique known as whaling, or whale phishing, a form of phishing sent to senior executives or other high-level</Txt>
						<Txt frameNbr="2340">officials due to their high profile and their potential access to sensitive and classified information.</Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>How Whaling Works</Title>
					<Subtitle></Subtitle>
					<Filename>disaldr03_03</Filename>
					<PageNbr>3</PageNbr>
					<Sec508Data Page="disaldr03_03"></Sec508Data>
					<ShowText Page="disaldr03_03">
						<Txt frameNbr="5"><![CDATA[So why was this e-mail so convincing? The e-mail appears to be from Jim Smith's agency Inspector General, or IG, office,]]></Txt>
						<Txt frameNbr="211">and the sender seems to have a legitimate organizational e-mail address. How did the email seemingly come from inside Mr.</Txt>
						<Txt frameNbr="409"><![CDATA[Smith's own organization? Successful hackers are practiced at  spoofing  e-mail addresses, so they appear to]]></Txt>
						<Txt frameNbr="585"><![CDATA[be real. In addition, with such a high-profile target, this hacker also took the time to research Mr. Smith's organization,]]></Txt>
						<Txt frameNbr="792"><![CDATA[including its IG personnel, in order to convincingly reference Mr. Smith's role as a leader inside his organization. How did]]></Txt>
						<Txt frameNbr="1018"><![CDATA[the sender know so much about the Deputy Assistant Secretary's job? Mr. Smith often appears in the news. His]]></Txt>
						<Txt frameNbr="1206"><![CDATA[organization is well-known and has a public website that describes the organization's structure and Mr. Smith's role.]]></Txt>
						<Txt frameNbr="1388"><![CDATA[Let's look at this e-mail even more closely. The e-mail asks the Secretary to review a subpoena to testify]]></Txt>
						<Txt frameNbr="1581">regarding an ongoing leak investigation. This is a matter he should not ignore, right? Think about this. The e-mail</Txt>
						<Txt frameNbr="1775"><![CDATA[isn't asking for personal information or even sensitive or classified information. But is this how the IG handles]]></Txt>
						<Txt frameNbr="1967">investigations?  Was this e-mail actually digitally signed?   Would your staff know what to do? Would you know what to</Txt>
						<Txt frameNbr="2168">look for? Now imagine if the e-mail Mr. Smith received used a different approach. This is a personalized message from</Txt>
						<Txt frameNbr="2376">someone who actually seems to have met the Secretary. How did the sender know so much information about his activities</Txt>
						<Txt frameNbr="2552">and interests? Mr. Smith has a couple of social networking accounts a professional page containing his resume and a</Txt>
						<Txt frameNbr="2744">Twitter account which he uses to promote his speaking engagements. Would Mr. Smith have been suspicious if he had</Txt>
						<Txt frameNbr="2911">received this e-mail? Would it have fooled you?</Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>Consequences of Whaling</Title>
					<Subtitle></Subtitle>
					<Filename>disaldr03_04</Filename>
					<PageNbr>4</PageNbr>
					<Sec508Data Page="disaldr03_04"></Sec508Data>
					<ShowText Page="disaldr03_04">
						<Txt frameNbr="5">As Mr. Smith and his staffer so painfully learned, once you fall victim to a whaling attack, you provide hackers with an easy</Txt>
						<Txt frameNbr="195">path to organizational systems or other people with inside information. Clicking a link or downloading an attachment</Txt>
						<Txt frameNbr="393">may install malicious code that can record keystrokes to capture system access credentials and information on</Txt>
						<Txt frameNbr="565"><![CDATA[the user's computer. This allows hackers to take over the computer and impersonate the victim to access other]]></Txt>
						<Txt frameNbr="828"><![CDATA[applications and systems on the network, stealing an organization's most sensitive information or disabling networks.]]></Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>How to Protect Against Whaling</Title>
					<Subtitle></Subtitle>
					<Filename>disaldr03_05</Filename>
					<PageNbr>5</PageNbr>
					<Sec508Data Page="disaldr03_05"></Sec508Data>
					<ShowText Page="disaldr03_05">
						<Txt frameNbr="5">Just how do you avoid being a victim? Always be wary of e-mails that ask for sensitive information, contain unexpected</Txt>
						<Txt frameNbr="195">attachments, or provide unconfirmed URLs. Remember that hackers can find your personal information in a variety</Txt>
						<Txt frameNbr="393"><![CDATA[of ways, so don't assume that just because someone knows a lot about you, they are a legitimate sender. Whalers tend]]></Txt>
						<Txt frameNbr="572">to exploit relevant issues or topics to create a sense of urgency. And they often claim previous acquaintanceships at</Txt>
						<Txt frameNbr="754">conferences or official events. Ask yourself: do you actually remember meeting this particular individual? Can you</Txt>
						<Txt frameNbr="943">verify they are who they say they are? In addition to knowing how to recognize whaling attempts yourself, be sure that</Txt>
						<Txt frameNbr="1126">any of your immediate staff who handles correspondence for you is also well-versed in whaling, what it looks like, and</Txt>
						<Txt frameNbr="1301">how to avoid making you a victim. When immediate staff acts on your behalf, they represent you. Be sure that</Txt>
						<Txt frameNbr="1481">they know and follow the rules and that they inform you if they suspect whaling. Any time you receive a suspicious e-mail, you</Txt>
						<Txt frameNbr="1664">or your staff should report it to your security POC and follow their instructions.</Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>[Conclusion]</Title>
					<Subtitle></Subtitle>
					<Filename>disaldr03_06</Filename>
					<PageNbr>6</PageNbr>
					<Sec508Data Page="disaldr03_06"></Sec508Data>
					<ShowText Page="disaldr03_06">
						<Txt frameNbr="5">Before Mr. Smith forwarded the e-mail to his staff member, Mr. Smith should have verified that the e-mail was actually from</Txt>
						<Txt frameNbr="186"><![CDATA[someone in the IG's office. Before Mr. Smith's staff member opened the attachment, he should have called the IG's]]></Txt>
						<Txt frameNbr="360">office using a verified phone number.  . The investment of just one or two minutes of time would have revealed that this</Txt>
						<Txt frameNbr="543">was not a legitimate request. Either Mr. Smith or his staff member could have prevented the hacker from gaining access</Txt>
						<Txt frameNbr="715"><![CDATA[to their organization's computer network. They could have protected their organization's mission. Instead, Mr. Smith is]]></Txt>
						<Txt frameNbr="900"><![CDATA[now in the news but not for a good reason. You are a target. Don't be a victim. Protect your mission.]]></Txt>
					</ShowText>
				</Page>
			</Pages>
		</Topic>
	</Topics>
</Module>