1 / 12

Did You Know

Did You Know. Kevin Mitnick defines it as “the act of gaining sensitive information or unauthorized access privileges by building inappropriate trust relationships with insiders.” In most cases the hacker never comes face-to-face with the victim. Social Engineering. 3. 2. 1.

ezhno
Download Presentation

Did You Know

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Did You Know

  2. Kevin Mitnick defines it as “the act of gaining sensitive information or unauthorized access privileges by building inappropriate trust relationships with insiders.” In most cases the hacker never comes face-to-face with the victim. Social Engineering

  3. 3 2 1 Social Engineering Techniques SMiShing Vishing Phishing

  4. Identity information Phishing

  5. Usually done by creating fake e-mail, instant messaging and websites to lure unsuspecting people to enter in their personel information such as usernames, password, and credit card information Phishing • They represent themselves as trustworthy entities that you know of such as popular social websites, auction sites, online payment processors or even IT administrators • Anytime someone asks you for any personel information without you initiating the contact, you should question the validity of that request

  6. I’m senior manager. I need your password authorize a transaction for a client. It’s urgent. The client is waiting, I will hold. My password is p@ssw0rd Hacker pretending to be Senior Manager Victim Vishing

  7. A combination of voice and phishing • Software engineers use a telephone system that uses a Voice over IP (VoIP) • Vishing is used for financial gain to steal credit card number or other personal information used in identity thief schemes from around the world. Vishing

  8. SMiShing

  9. A combination of SMs and phiSHING • Scammers are targeting mobile devices to get you to reveal your personal information. • Send text messages to you and ask to validate or respond to the request. • Once responded, scammer just got you and launched a worm or a malware on your mobile device. • Once downloaded on your mobile devices, spyware can eavesdrop on all your conversations gathering information about you. SMiShing

  10. Beware of Social Engineering

  11. You had better take control By understanding the techniques Social Engineering And Protect yourself and your assets before it’s to late!

More Related