What is Social Engineering. Pretexting Pretexting is the act of creating and using an invented scenario called the Pretext to persuade a target to release.

Slides:



Advertisements
Similar presentations
Social Engineering Training. Training Goals Increase Laboratory Awareness. Provide the tools required to identify, avoid and report advanced Social Engineering.
Advertisements

SOCIAL ENGINEERING ATTACKS GOWTHAM RAM RAJARAM VIGNESH SELVAKUMAR SELLAMUTHU.
Phishing Scams use spoofed s and websites as lures to prompt people to voluntarily hand over sensitive information Phishing s may contain.
Digital Forensics and Cyber Psychology How computers are used to catch criminals but also how criminals trick humans!
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
1 Identity Theft and Phishing: What You Need to Know.
The Art of Social Hacking
Identity Theft: How Safe Are You? Steven Stone. What is Identity Theft Identity consists of: – Social Security Number – Credit Card Number and Credit.
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
Aleksandra Kurbatova IVCM.  What is social engineering?  Types  Pretexting  …  Summary  Conclusion.
Hacker’s tricks for online users to reveal their sensitive information such as credit card, bank account, and social security. Phishing s are designed.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Network Security aka CyberSecurity Monitor and manage security risks at the network level for the entire Johns Hopkins Network.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Internet Phishing Not the kind of Fishing you are used to.
Protecting Your Identity. What is IA? Committee on National Security Systems definition: –Measures that protect and defend information and information.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Social Engineering PA Turnpike Commission. “Social Engineering is the practice of obtaining confidential information by manipulation of legitimate users”
Social Engineering UTHSC Information Security Team.
Social Engineering Training. Why Social Engineering Training? The Department of Energy (DOE) authorized the Red Team to perform vulnerability assessments.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
CIS Computer Security Kasturi Pore Ravi Vyas.
Ch9QQ T F 1.Hacking is an example of unauthorized access. T F 2.A Trojan horse is a type of malware that masquerades as another type of program. T F 3.A.
CCT355H5 F Presentation: Phishing November Jennifer Li.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
BY : MUHAMMAD KHUZAIMI B. ISHAK 4 ADIL PUAN MAZITA INFORMATION AND COMMUNICATION OF TECHNOLOGY.
How Phishing Works Prof. Vipul Chudasama.
Topic 5: Basic Security.
Saphe surfing! 1 SAPHE Secure Anti-Phishing Environment Presented by Uri Sternfeld.
U.S. Businesses Targeted Randy Wolverton Brian J. Koechner.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Cybersecurity Test Review Introduction to Digital Technology.
IT Ess I v.4x Chapter 1 Cisco Discovery Semester 1 Chapter 8 JEOPADY Q&A by SMBender, Template by K. Martin.
Sources of Network Intrusion Security threats from network intruders can come from both internal and external sources.  External Threats - External threats.
Information Systems Design and Development Security Risks Computing Science.
Do you know who you’re dealing with? Social Engineering: Minimise the risk of becoming a victim.
FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    1 Overall Classification of this Briefing is UNCLASSIFIED//FOUO Phishing.
Safe Computing Practices. What is behind a cyber attack? 1.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
JANELL LAYSER Training Manual. AWARENESS! Social Engineers are out there, and everyone should be prepared to deal with them! They can contact you by phone,
Cyber security. Malicious Code Social Engineering Detect and prevent.
An Introduction to Phishing and Viruses
Done by… Hanoof Al-Khaldi Information Assurance
how to prevent them from being successful
Social Engineering Brock’s Cyber Security Awareness Committee
IT Security  .
Social Engineering Charniece Craven COSC 316.
ISYM 540 Current Topics in Information System Management
Social Engineering: The Art of Manipulation
Phishing is a form of social engineering that attempts to steal sensitive information.
Protect Your Computer Against Harmful Attacks!
How to Protect your Identity Online PIYUSH HARSH
Social Engineering Brock’s Cyber Security Awareness Committee
Robert Leonard Information Security Manager Hamilton
Information Security Session October 24, 2005
Personal IT Security Cyber Security – Basic Steps
Phishing.
Business Compromise and Cyber Threat
Introduction and Techniques
What is Phishing? Pronounced “Fishing”
Spear Phishing Awareness
Wolves of the Internet: Where do fraudsters hunt for data online?
Presentation transcript:

What is Social Engineering

Pretexting Pretexting is the act of creating and using an invented scenario called the Pretext to persuade a target to release information or perform an action and is usually done over the telephone. It's more than a simple lie as it most often involves some prior research or set up and the use of pieces of known information (e.g., For impersonation: Birthday, Social Security Number, last bill amount) to establish legitimacy in the mind of the target.

Phishing Phishing applies to appearing to come from a legitimate business — a bank, or credit card company — requesting "verification" of information and warning of some dire consequence if it is not done. The letter usually contains a link to a fraudulent web page that looks legitimate with company logos and content which has a form requesting everything from a home address to an ATM card's PIN.

Quid Pro Quo An attacker calls random numbers at a company claiming to be calling back from technical support. Eventually they will hit someone with a legitimate problem, grateful that someone is calling back to help them. The attacker will "help" solve the problem and in the process have the user type commands that give the attacker access and/or launch malware.

D IVERSION T HEFT : It is also called “Round the Corner Game”, where an individual objective is to persuade the concerned agent from the organization to change the location of the delivery of the information to another source.

B AITING : Using Trojans Horse that uses physical media and relies on the greed of the victim.