Download presentation
Presentation is loading. Please wait.
Published byยุวรัตน์ เคนเนะดิ Modified over 5 years ago
1
Social Engineering Humans are often the weakest point in security
Social engineering is the art of manipulating or ‘conning’ individuals into giving away private information or login ID’s and passwords. Two common techniques are: Phishing Shoulder surfing
2
Phishing A phishing is one that tricks you into handing over sensitive or personal information (login details, bank details, etc). You receive what looks like a legitimate , for example from a bank or an organisation such as PayPal or eBay. The website urges you to visit a bogus website and enter your personal details, which are then captured by the phishers.
3
How does it work? Phishers send out hundreds of thousands of s that look as though they are from legitimate companies. For phishing to be successful, the criminals must get you to click on a link in the to go to a website. A successful phishing campaign has around a 5% response rate – meaning 5% of recipients are conned!
4
What to look out for Greeting – phishers will not know your name, only your address, so the greeting is not personalised. The sender’s address – often a variation on a genuine address Forged link – the link looks genuine, but it may not link to the website given. Requests personal information – genuine organisations never do this. Sense of urgency – usually say something bad will happen if you don’t act fast. Poor spelling and grammar
5
Protecting against phishing
SPAM filter – this feature will prevent common scams reaching your inbox. Be suspicious – if you aren’t certain its genuine, don’t click links.
6
Shoulder Surfing
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.