Download presentation
Presentation is loading. Please wait.
Published byHolly Norman Modified over 8 years ago
1
Social Engineering as a Means of Exploitation Carrie Estes
2
What is social engineering? How is it technical in nature? How does an average attack progress? Examples of some attacks. How can one defend against such attacks? Roadmap
3
Social engineering is the art of manipulation to get what you want. It takes confidence, research, time, and people who believe you are who you say you are. What is social engineering?
4
Social engineering itself is only one step in a long list of steps to getting information from a company. To pull off a successful attack, the attacker needs a lot of information. This information comes from research and hacking into places in a company. How is it technical in nature?
5
When an attacker is getting ready to pull off a social engineering attack, he or she needs to do research on the company and employees. From this, they will gain vital information to be used. Phone calls and emails can be sent out to gain even more vital information. How does an average attack progress?
6
Social engineering techniques
7
Examples The colors and words puzzle that everyone saw as a kid. Did you know that it is considered social engineering?
8
Oscar Grace became a PI Woman’s husband moved funds Wants to know where they are due to getting a divorce Made three phone calls Examples
9
Computer center manager fell for attack by a person barely out of their teens. Danny wanted super secret encryption software from a top manufacturer of secure radio systems. He didn’t want to steal it. Examples
10
There is no concrete way to defend against these attacks. There are, however, some things that can be done to diminish the risk. Security awareness training Mock social engineering drills, etc Physical security Background verification How does one defend against such attacks?
11
We discussed What is social engineering? How is it technical in nature? How does an average attack progress? Examples of some attacks. How one can defend against such attacks. Review
12
Questions?
13
"Social Engineering (security)." Wikipedia. Wikimedia Foundation, 25 Mar. 2013. Web. 27 Mar. 2013.. Mitnick, Kevin D., and William L. Simon. The Art of Deception: Controlling the Human Element of Security. Indianapolis, IN: Wiley Pub., 2002. Print. Shetty, Dines. "Social Engineering - The Human Factor | Www.SecurityXploded.com." Social Engineering - The Human Factor | Www.SecurityXploded.com. SecurityXploded, 2007. Web. 27 Mar. 2013.. References
14
Fun picture
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.