Social Engineering: The Art of Manipulation

Slides:



Advertisements
Similar presentations
Social Engineering Training. Training Goals Increase Laboratory Awareness. Provide the tools required to identify, avoid and report advanced Social Engineering.
Advertisements

Kelly Corning Julie Sharp.  Human-based techniques: impersonation  Computer-based techniques: malware and scams.
Social Network Security Issues: Social Engineering and Phishing Attacks Jeffrey Allen, Leon Gomez, Marlon Green, Phillip Ricciardi, Christian Sanabria.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
The Dangers of Identity Theft By: Hannah Wolin 7 th Grade Marshall Middle School Anderson.
The Art of Social Hacking
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Identity Theft.
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
Aleksandra Kurbatova IVCM.  What is social engineering?  Types  Pretexting  …  Summary  Conclusion.
Social Engineering – Threats & Concerns Avisek Ghosh, CISA CISSP Sr. Manager – Corporate Security Cognizant Technology Solutions.
Social Engineering J Nivethan. Social Engineering The process of deceiving people into giving away access or confidential information Onlinne Phone Offline.
Social Engineering Networks Reid Chapman Ciaran Hannigan.
Presented by: Casey Mullins Social Engineering - Persuasion -
The Art of Deception - Controlling Human Element of Security - Shohei Hagiwara November 17th, 2009.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
1 Social Engineering Dr.Talal Alkharobi. 2 Social Engineering - Definition Webster — management of human beings in accordance with their place and function.
Social Engineering PA Turnpike Commission. “Social Engineering is the practice of obtaining confidential information by manipulation of legitimate users”
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
It could be you! Or is it?  Identity theft is when someone uses your personally identifying information, like your name, Social Security number, or.
Cory Bowers Harold Gray Brian Schneider Data Security.
Social Engineering Training. Why Social Engineering Training? The Department of Energy (DOE) authorized the Red Team to perform vulnerability assessments.
Preventing Identity Theft in Aspen Falls Helping citizens protect themselves IdentityTheft.
What is Social Engineering. Pretexting Pretexting is the act of creating and using an invented scenario called the Pretext to persuade a target to release.
Slides by Kent Seamons and Tim van der Horst Last Updated: Nov 30, 2011.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
CIS Computer Security Kasturi Pore Ravi Vyas.
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
Slides by Kent Seamons and Tim van der Horst Last Updated: Nov 30, 2011.
SOCIAL ENGINEERING PART IA: HOW SCAMMERS MANIPULATE EMPLOYEES TO GAIN INFORMATION.
Topic 5: Basic Security.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
JMU GenCyber Boot Camp Summer, Introduction to Reconnaissance Information gathering – Social engineering – Physical break-in – Dumpster diving Scanning.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Sources of Network Intrusion Security threats from network intruders can come from both internal and external sources.  External Threats - External threats.
Designed By: Jennifer Gohn.  “Getting people to do things they wouldn’t ordinarily do for a stranger” –Kevin Mitnick  There are several different.
Social Engineering The Greatest Security Risk to a Company.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
JANELL LAYSER Training Manual. AWARENESS! Social Engineers are out there, and everyone should be prepared to deal with them! They can contact you by phone,
Social Engineering: The Human Element of Computer Security
Social Engineering Dr. X.
Done by… Hanoof Al-Khaldi Information Assurance
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
What Is Social Engineering?
Social Engineering Brock’s Cyber Security Awareness Committee
IT Security  .
Social Engineering Charniece Craven COSC 316.
Protecting What’s Yours: Your Identity
Information Security.
I S P S loss Prevention.
Phishing, what you should know
Phishing is a form of social engineering that attempts to steal sensitive information.
Social Engineering Brock’s Cyber Security Awareness Committee
Cybersecurity Awareness
Robert Leonard Information Security Manager Hamilton
Social Engineering No class today! Dr. X.
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Phishing.
Objectives Telecommunications and Network Physical and Personnel
Protecting Your Identity
9 ways to avoid viruses and spyware
Qiyu chen, Xiaomin Dong, Chenhui Lai, Xinteng Chen, Vittorio DiPentino
Protecting Your Credit Identity
CS 465 Social Engineering Last Updated: Dec 14, 2017.
Business Compromise and Cyber Threat
Presented by Elizabeth Kunkel Member Service Trainer
Introduction and Techniques
What is Phishing? Pronounced “Fishing”
Spear Phishing Awareness
Identity Theft and Credit Safety
Presentation transcript:

Social Engineering: The Art of Manipulation Organized by Jeremy Smith, Freshman at Indiana University of Pennsylvania

Roadmap What is social engineering? The physical techniques/methods Psychological methods Methods to avoid it

What is Social Engineering? The act of manipulation by one person to another to accomplish goals that may or may not be in the “target’s” best interest. “The art and science of getting people to comply to your wishes”

“Phishing” for the goods Fraudulently obtaining private information Usually by sending a false e-mail containing attachments.

Pretexting The person often uses impersonations. Using an invented scenario to engage a victim in a way that increases the chance of him/her giving information. The person often uses impersonations. Assume the character of another person

Methods and Techniques Dumpster Diving “trashing” Company phone books, memos, calendars of events & vacations, disks & tapes etc.

Social engineering by phone The most prevalent type of social engineering Once again, the hacker will imitate a person of authority and gradually get information from the target. E.g. AT&T, Verizon, Banks Help desk employees are vulnerable “They are trained to be friendly”

The “REAL” hackers are online How many passwords do you use? “catch one catch all” Usually by sending an e-mail that appears to come from a legitimate business, bank or other company requesting “verification”.

Psychological Techniques Impersonations A repairman, IT support, trusted third party, or a fellow employee Conformity If the hacker acts as a manager or authority figure Alleviates stress on the employee When in doubt, they will simply be nice. “The Science of Behavior and Mental Processes”

Conclusion: What to look out for Social engineering is generally a hacker’s clever manipulation of the natural human tendency to trust. DO NOT reveal personal or financial information out via e-mail. Pay attention to the URL Small differences like their domain name Shred papers before putting them into the dumpster Do ID checks whether it’s done over the phone or in person Make employees aware of impersonation technique

Sources http://www.social-engineer.org/ http://www.symantec.com/connect/articles/social-engineering-fundamentals-part-i-hacker-tactics Ask.com for images