Download presentation
Presentation is loading. Please wait.
Published byHoward Johnston Modified over 9 years ago
1
Social Engineering © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering
2
Attackers use social engineering to trick people Used to gather information or install malware Social Engineering
3
Attackers send millions of emails, text messages, or phone calls Not tailored to recipient From random email: –Do not follow a link –Do not open an attachment –Do not respond to a message Start in a browser to go to a site, retrieve a document, or initiate a transaction Phishing
4
Message tailored to you, using your hobbies, your contact names, imposter look-alikes of web sites you visit From unexpected email, beware: –following a link –opening an attachment Start in a browser to go to a site, retrieve a document, or initiate a transaction Confirm with sender Targeted Attacks
5
Do not be tricked by warnings that "Your computer may be infected" Use known software and beware imitations Beware: Rogue Security Software
6
Beware URL spoofs in links –1 and l –O and 0 –international characters like i and í Use bookmarks or type a URL to ensure a true site when using passwords and money Beware: Malicious Websites
7
Can clog Internet traffic and spread malware Urban Legends –http://www.snopes.com/http://www.snopes.com/ –http://www.truthorfiction.com/http://www.truthorfiction.com/ Anti-virus Hoaxes –http://www.symantec.com/avcenter/hoax.htmlhttp://www.symantec.com/avcenter/hoax.html –http://home.mcafee.com/VirusInfo/VirusHoaxes.aspxhttp://home.mcafee.com/VirusInfo/VirusHoaxes.aspx Hoaxes and Chain Letters
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.