1 / 8

What is social engineering?

What is social engineering?. Ranson , Violet Computer Science August 24, 2012. Social engineering?. “social disguise, cultural ploys, and psychological tricks”. Pretexting. Making up a story. Baiting. Quid pro quo. Something for something else. Malware= . Malicious + Software

darena
Download Presentation

What is social engineering?

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. What is social engineering? Ranson, Violet Computer Science August 24, 2012

  2. Social engineering? “social disguise, cultural ploys, and psychological tricks”

  3. Pretexting • Making up a story

  4. Baiting

  5. Quid pro quo Something for something else

  6. Malware= Malicious + Software • Tell a deceiving story • Break through guards • Infect • Multiply

  7. Violation of Security Using Social Engineering

  8. Works cited D. Oliveira, personal communication, August 24, 2012 Goodrich, M. T., & Tamassia, R. (2011). Introduction to Computer Security. Boston, Massachusetts:Pearson. Jack Wiles, Terry Gudaitis, Jennifer Jabbusch, Russ Rogers, Sean Lowther, Chapter 1 - Social engineering: The ultimate low tech hacking threat, Low Tech Hacking, Syngress, Boston, 2012, Pages 1-29, ISBN 9781597496650, 10.1016/ B978-1-59749-665-0.00001-0. (http://www.sciencedirect.com/science/article/pii/B9781597496650000010) Sherly Abraham, InduShobhaChengalur-Smith, An overview of social engineering malware: Trends, tactics, and implications, Technology in Society, Volume 32, Issue 3, August 2010, Pages 183-196, ISSN 0160-791X, 10.1016/j.techsoc.2010.07.001. (http://www.sciencedirect.com/science/article/pii/S0160791X10000497)

More Related