Social Engineering Provide brief background about ourselves i.e. what were are going to school for Ask students what they think social engineering is before.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

How to protect yourself, your computer, and others on the internet
Social Engineering Training. Training Goals Increase Laboratory Awareness. Provide the tools required to identify, avoid and report advanced Social Engineering.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
1 Identity Theft and Phishing: What You Need to Know.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Phishing and Pharming New Identity Theft Threats Presentation by Jason Guthrie.
Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
Security for Internet Every Day Use Standard Security Practices and New Threats.
Social Engineering J Nivethan. Social Engineering The process of deceiving people into giving away access or confidential information Onlinne Phone Offline.
Internet Phishing Not the kind of Fishing you are used to.
Hey check out this cool PHISHING presentation! Benjamin Ross Lyerly.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Social Engineering PA Turnpike Commission. “Social Engineering is the practice of obtaining confidential information by manipulation of legitimate users”
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Quiz Review.
Threats to I.T Internet security By Cameron Mundy.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Social Engineering Training. Why Social Engineering Training? The Department of Energy (DOE) authorized the Red Team to perform vulnerability assessments.
1 Hacking techniques by John Schmidt, BYU-I Linux/Unix Society June 19, 2008.
Security Chapter What Should I Ask Santa Claus For? spoofing: fraudulent activity in which the sender address and other parts of the.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Online Safety and Awareness. Introductions We are students at UNM We are taking an Information Security course this semester. It is our mission to teach.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
CIS Computer Security Kasturi Pore Ravi Vyas.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.

CCT355H5 F Presentation: Phishing November Jennifer Li.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
How Phishing Works Prof. Vipul Chudasama.
Topic 5: Basic Security.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
INTRODUCTION & QUESTIONS.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
5 different ways to get tricked on the internet. 1. Viruses A virus is a computer malware program that copies it’s files to the computer. This may allow.
PHISHING METHODS BY UMESH KHIVASARA FOR HACKING FACEBOOK
Social Engineering Mark Shtern. Social Engineering SE is manipulating a person into knowingly or unknowingly giving up information – Psychological manipulation.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
Sources of Network Intrusion Security threats from network intruders can come from both internal and external sources.  External Threats - External threats.
FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    1 Overall Classification of this Briefing is UNCLASSIFIED//FOUO Phishing.
Mobile Device Security Threats Christina Blakley Host Computer Security.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
JANELL LAYSER Training Manual. AWARENESS! Social Engineers are out there, and everyone should be prepared to deal with them! They can contact you by phone,
7 Tips To Improve Your Website Security. Introduction Use of Content management systems like WordPress, Joomla & Drupal, utilization of various tools,
Cyber security. Malicious Code Social Engineering Detect and prevent.
Cyber Info Gathering Techniques
Social Engineering: The Human Element of Computer Security
Social Engineering Dr. X.
Edexcel GCSE Cyber security threats Computer Science 1CP1
how to prevent them from being successful
IT Security  .
Personal spaces.
Social Engineering Charniece Craven COSC 316.
Information Security.
Cyber Security Awareness Workshop
Phishing is a form of social engineering that attempts to steal sensitive information.
Cybersecurity Awareness
Information Technology Services Education and Awareness Team
Social Engineering No class today! Dr. X.
Phishing.
Ethical Hacking ‘Ethical hacking’ is the branch of computer science that involves cybersecurity and preventing cyberattacks. Ethical hackers are not malicious.
Information Technology Services Education and Awareness Team
What is Phishing? Pronounced “Fishing”
Presentation transcript:

Social Engineering Provide brief background about ourselves i.e. what were are going to school for Ask students what they think social engineering is before progressing to the next slide. One of us will write their thoughts on the whiteboard.

Survey Results

What is Social Engineering? “Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information.”-Wikipedia

iCloud Hack Leads to Celebrity Phishing Attacks Celebrity Victims Link from fake tweet and Facebook post lures people to a fictional website. Users are prompted to download software to view the video. Malicious software is downloaded instead. Targets Windows 7 and earlier versions

Information Gathering Techniques Telephone calls to a target business or person Dumpster diving Phishing emails Face to face conversations Internet searches Parking lots GPS tracking Getting a job at the target company While we discuss internet searches, we will demonstrate the type of information than can found by searching a person’s name.

How is Personal Information Stolen? Source: Iconix

Types of Social Engineering Phishing Voice Phishing Spear Phishing Clone Phishing

More Types of Social Engineering Pretexting Shoulder surfing Role playing Piggybacking

Social Engineering Tools Social Engineering Toolkit Maltego Super Phisher - 000webhost.com Web-console Spoof Cards

How to Create a Fake Link

Influence Tactics Social engineers often exploit the three fixed action patterns in order to manipulate a victim. Fixed action patterns include the following: Liking, Reciprocity, and Authority. Learning the organization’s lingo, phone number spoofing, or mimicking an organization's hold music. Using the word “because” Show a portion of a social presentation (How to get out of a speeding using the liking fixed action pattern) Start at 4:30 and end at 6:12 http://www.youtube.com/watch?v=yY-lMkeZVuY

The Human Condition Appeal to charm Fear of loss Willingness to trust Appeal to authority Eagerness to receive free stuff Wanting to be helpful Perceived low impact of information

Prevention Techniques Just say no to giving out personal information. Be scrupulous with security questions. Do you get e-mails about password resets? Be careful. Contact the service provider to see if the e-mail is legitimate. You’ve probably heard this before, but here it is again: Never use the same password for multiple accounts! We will copy the prevention techniques into a word document to hand out to students.

More Prevention Techniques Keep an eye on your account activity i.e. social media accounts, bank accounts, etc. Beware of emails coming from anyone, for any reason that requires you to click links for any reason. Stop and think and before you click on the link. You should research the legitimacy of the email. Continue to educate yourself on the different social engineering techniques.

English-German Glossary Password s Passwort, s Kennwort Password protection r Passwortschutz Permission e Berechtigung (-en) Root directory s Wurzelverzeichnis Save (v.) Speichern Security leak s Sicherheitsleck (-s) Application(s) software e Anwendung (-en) Hacker r Hacker (-), e Hackerin (-nen) Information technology (IT) e Informatik Update n. e Aktualisierung (-en), e Änderung (-en) Virus snetwork n. s Netzwerk/r Virus (Viren) Trojan horse (virus) r Trojaner Database e Datei Error message e Fehlermeldung *We are presenting to a German class.

Questions?? Fragen??

Sources http://german.about.com/library/blcomputE_T-Z.htm http://www.bloggernews.net/135080 http://www.csoonline.com/article/2123378/identity-theft-prevention/social-engineering--eight-common-tactics.html http:// www.youtube.com/watch?v=yY-lMkeZVuY www.infosecwriters.com/text_resources/pdf/Social_Engineering http://lifehacker.com/5824481/how-to-convince-people-to-let-you-cut-in-line http://www.youtube.com/watch?v=V5NRKVgZNFg http://www.social-engineer.org/framework/se-tools/physical/gps-trackers/ http://www.csoonline.com/article/2131550/social-engineering/the-social-engineering-toolkit-s-evolution--goals.html http://www.pcworld.com/article/182180/top_5_social_engineering_exploit_techniques.html

Sources (continued) http://iconixtruemark.wordpress.com/2011/09/23/the-security-threat-of-social-engineering/ http://en.wikipedia.org/wiki/Phishing http://en.wikipedia.org/wiki/Voice_phishing http://en.wikipedia.org/wiki/Social_engineering_%28security%29 http://arstechnica.com/security/2014/09/celeb-nude-photos-now-being-used-as-bait-by-internet-criminals/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+arstechnica%2Findex+%28Ars+Technica+-+All+content%29http://iconixtruemark.wordpress.com/2011/09/23/the-security-threat-of-social-engineering/ http://www.darkreading.com/perimeter/poll-employees-clueless-about-social-engineering-/a/d-id/1316280