“There is a sucker born every minute”

Slides:



Advertisements
Similar presentations
Chapter 1 We’ve Got Problems…. Four Horsemen  … of the electronic apocalypse  Spam --- unsolicited bulk o Over 70% of traffic  Bugs ---
Advertisements

Ethics, Privacy and Information Security
Koen Maris – The Human Factor in Information technology – Copyright 2005 – The Human Factor in Information Technology.
Introduction to Ethical Hacking, Ethics, and Legality.
James Sees Senior Network Administrator Management Analyst Cyber Protection Strategies White Hall Business Association - Cyber Security & Awareness Conference.
Social Engineering – Threats & Concerns Avisek Ghosh, CISA CISSP Sr. Manager – Corporate Security Cognizant Technology Solutions.
Social Engineering J Nivethan. Social Engineering The process of deceiving people into giving away access or confidential information Onlinne Phone Offline.
Computer Fraud Pertemuan XVI Matakuliah: F0184/Audit atas Kecurangan Tahun: 2007.
Social Engineering PA Turnpike Commission. “Social Engineering is the practice of obtaining confidential information by manipulation of legitimate users”
Technology Awareness & Information Security. Survey Results 50% class has smart phones 64% class has shared personal info over the internet 71% class.
© UNT in partnership with TEA1 7 th Grade Career Exploration Module Career Focus: Video Game Programmer Occupation.
1 Hacking techniques by John Schmidt, BYU-I Linux/Unix Society June 19, 2008.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Social Engineering Provide brief background about ourselves i.e. what were are going to school for Ask students what they think social engineering is before.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
Security+ All-In-One Edition Chapter 2 – Organizational Security Brian E. Brzezicki.
Chapter 4.  Can technology alone provide the best security for your organization?
Information Security in an Introductory Course. Introduction Kathy Winters University of Tennessee at Chattanooga Department of Computer Science and Engineering.
1.2 Security. Computer security is a branch of technology known as information security, it is applied to computers and networks. It is used to protect.
DIYTP Assessing a System - Basics  Why?  Vulnerabilities  What to look at:  The six ‘P’s  Patch  Ports  Protect  Policies  Probe  Physical.
Introducing the networks and the Internet By Cody Gibbs.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
What You Need to Know About Your Personal Information.
P RINCIPLES OF N ETWORKING S ECURITY C HAPTERS 3 & 4 Matt Lavoie NST
What is Information Technology?
GET CONNECTED Information Technology Career Cluster.
A Critical Analysis on the Security of IoTs
Personnel Overview  Primary project management & development team located in Hong Kong  Deep talent in computational linguistics  Sponsor, supporting.
Social Engineering By: Pete Guhl and Kurt Murrell.
Review Internet Safety. Definition Phishing is fishing for personal and financial information disguised at legitimate business .
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
Social Engineering Grifting in the 21 st century U of I Experiment Power Grid Security Spring 2003.
Sources of Network Intrusion Security threats from network intruders can come from both internal and external sources.  External Threats - External threats.
Security Operations Chapter 11 Part 3 Pages 1279 to 1309.
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
Social Engineering Dr. X.
Edexcel GCSE Cyber security threats Computer Science 1CP1
Marshal Graham January 16, 2012
Add video notes to lecture
Cyber Warfare and Importance of Cyber Awareness
Chapter 6 – Users, Groups, and Permissions
What Is Social Engineering?
Chapter 1 The Nature of Software
The Controlled Experiment
Phishing, what you should know
Authors and Affiliations
Internet Safety & Acceptable Use Standards
Information Security 101 Richard Davis, Rob Laltrello.
CHAPTER 4 Information Security.
Chapter 1 The Nature of Software
Chapter 1 The Nature of Software
D-Link Router Customer Care Number. A D-link router is a basic necessity these days with so much technology around us in offices or homes. We can connect.
The Art of Deception.
Social Engineering No class today! Dr. X.
Information Science and Technology Graduate By: Jerome Jackson
ACM/IEEE-CS Computer Science Curriculum
Prepared By : Binay Tiwari
Understand mechanisms to control organisational IT security
The essentials of Learning, E-learning and ISD
What is a CMS. CMS is content management system CMS is a software that stores content.
Teaching you NOT to fall for Phish
CS6501 Embedded Operating Systems for the IoT
Software Engineering Lecture # 01
Improving Loss Control: How to Get the Attention of the Boss
Social Engineering Humans are often the weakest point in security
Ethical Hacking ‘Ethical hacking’ is the branch of computer science that involves cybersecurity and preventing cyberattacks. Ethical hackers are not malicious.
The Internet: Encryption & Public Keys
Chapter 14: Protection.
Term 3 Lesson 3 When I grow up….
IP Addresses & Ports IP Addresses – identify a device on a network
Presentation transcript:

“There is a sucker born every minute” Social Engineering “There is a sucker born every minute”

Social Engineering What is Social Engineering? Exploitation of “wetware” Manipulation of a person to get a desired result Not always computer related Con games

Social Engineering How? People are inherently trusting/helpful Appeal to vanity, authority or eavesdropping Dumpster diving Shoulder surfing Phishing Research! Most work lies within preparation

Social Engineering Why? Social engineering concentrates on the weakest link of the computer security chain The security weakness is universal, independent of platform, software, network or age of equipment

Social Engineering Show me ;)

Social Engineering That looked easy, so now what? Secure the “wetware” Knowledge is power Education is the best defense Use common sense Follow policies/procedures