Presentation is loading. Please wait.

Presentation is loading. Please wait.

Social Engineering: The Art of Manipulation

Similar presentations


Presentation on theme: "Social Engineering: The Art of Manipulation"— Presentation transcript:

1 Social Engineering: The Art of Manipulation
Organized by Jeremy Smith, Freshman at Indiana University of Pennsylvania

2 Roadmap What is social engineering? The physical techniques/methods
Psychological methods Methods to avoid it

3 What is Social Engineering?
The act of manipulation by one person to another to accomplish goals that may or may not be in the “target’s” best interest. “The art and science of getting people to comply to your wishes”

4 “Phishing” for the goods
Fraudulently obtaining private information Usually by sending a false containing attachments.

5 Pretexting The person often uses impersonations.
Using an invented scenario to engage a victim in a way that increases the chance of him/her giving information. The person often uses impersonations. Assume the character of another person

6 Methods and Techniques
Dumpster Diving “trashing” Company phone books, memos, calendars of events & vacations, disks & tapes etc.

7 Social engineering by phone
The most prevalent type of social engineering Once again, the hacker will imitate a person of authority and gradually get information from the target. E.g. AT&T, Verizon, Banks Help desk employees are vulnerable “They are trained to be friendly”

8 The “REAL” hackers are online
How many passwords do you use? “catch one catch all” Usually by sending an that appears to come from a legitimate business, bank or other company requesting “verification”.

9 Psychological Techniques
Impersonations A repairman, IT support, trusted third party, or a fellow employee Conformity If the hacker acts as a manager or authority figure Alleviates stress on the employee When in doubt, they will simply be nice. “The Science of Behavior and Mental Processes”

10 Conclusion: What to look out for
Social engineering is generally a hacker’s clever manipulation of the natural human tendency to trust. DO NOT reveal personal or financial information out via . Pay attention to the URL Small differences like their domain name Shred papers before putting them into the dumpster Do ID checks whether it’s done over the phone or in person Make employees aware of impersonation technique

11 Sources http://www.social-engineer.org/
Ask.com for images


Download ppt "Social Engineering: The Art of Manipulation"

Similar presentations


Ads by Google