2. Social Engineering Did you know that humans get Hacked as much as computers? It’s called social engineering and it has been happening long before computers ever existed!
Module Objectives This module will familiarize you with the following: Investigating Computer Crime Policy and Procedure Development Warning Banners Shutdown the Computer Investigating a Company Policy Violation Accessing Policy Violation Case: Example Collecting the Evidence Implementing an investigation Methodology of investigation Evaluating the case Imaging the Evidence Disk Examining the Digital Evidence Investigation plan Obtaining Search Warrant Closing the case Evaluating the case
INTRODUCTION TO SOCIAL ENGINEERING. Trainer: Perhaps include a picture of people in your department with a person who is familiar to everyone in the audience . You cannot spot a social engineer just by looking at them, and it could be anyone. A social engineer is a person who will deceive or con others into divulging information that they wouldn’t normally share. This picture includes: Will Padilla, Norma Springsteen, Linda Caruso, Sabrina Ledesma, Pam Miramontes, David Nelson, Dave Edwards When taken all were Yolo County employees.
Help desks are particularly vulnerable because they are in place specifically to help , a fact that may be exploited by people who are trying to gain illicit information. Help desk employees are trained to be friendly and give out information, so this is a gold mine for social engineering. Use a shredder
Fake Id’s, human nature is to be helpful. Fake Id’s, human nature is to be helpful.