SlideShare a Scribd company logo
1 of 14
Module 3 Social Engineering Module 3
Social Engineering Did you know that humans get Hacked as much as computers? It’s called social engineering and it has been happening long before computers ever existed!
Module Objectives ,[object Object],[object Object],[object Object],[object Object],[object Object]
Social Engineering Definition ,[object Object],[object Object],Source: The Hacker’s Jargon dictionary
Social Engineering Definition ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Social  Engineering ,[object Object]
Social Engineering Methods
Social Engineering Methods ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Social Engineering Methods ,[object Object],[object Object],[object Object],[object Object],[object Object]
Social Engineering Methods ,[object Object],[object Object],[object Object],[object Object],[object Object]
Social Engineering Methods ,[object Object],[object Object],[object Object]
Social Engineering Countermeasures ,[object Object],[object Object],[object Object],[object Object]
Social Engineering Countermeasures ,[object Object],[object Object],[object Object],[object Object]
Exercise ,[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentation
teriwoja
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
24sneha
 
Information-Security-Lecture-4.pptx
Information-Security-Lecture-4.pptxInformation-Security-Lecture-4.pptx
Information-Security-Lecture-4.pptx
anbersattar
 
Information-Security-Lecture-7.pptx
Information-Security-Lecture-7.pptxInformation-Security-Lecture-7.pptx
Information-Security-Lecture-7.pptx
anbersattar
 

What's hot (20)

UW School of Medicine Social Engineering and Phishing Awareness
UW School of Medicine   Social Engineering and Phishing AwarenessUW School of Medicine   Social Engineering and Phishing Awareness
UW School of Medicine Social Engineering and Phishing Awareness
 
Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentation
 
Social Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageSocial Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionage
 
Social engineering tales
Social engineering tales Social engineering tales
Social engineering tales
 
Social engineering The Good and Bad
Social engineering The Good and BadSocial engineering The Good and Bad
Social engineering The Good and Bad
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Hackers
HackersHackers
Hackers
 
Hackers
HackersHackers
Hackers
 
Cyber Security Update: How to Train Your Employees to Prevent Data Breaches
Cyber Security Update: How to Train Your Employees to Prevent Data BreachesCyber Security Update: How to Train Your Employees to Prevent Data Breaches
Cyber Security Update: How to Train Your Employees to Prevent Data Breaches
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Information-Security-Lecture-4.pptx
Information-Security-Lecture-4.pptxInformation-Security-Lecture-4.pptx
Information-Security-Lecture-4.pptx
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Information-Security-Lecture-7.pptx
Information-Security-Lecture-7.pptxInformation-Security-Lecture-7.pptx
Information-Security-Lecture-7.pptx
 

Viewers also liked

Cehv8 module 01 introduction to ethical hacking
Cehv8 module 01 introduction to ethical hackingCehv8 module 01 introduction to ethical hacking
Cehv8 module 01 introduction to ethical hacking
polichen
 

Viewers also liked (13)

Ceh v5 module 05 system hacking
Ceh v5 module 05 system hackingCeh v5 module 05 system hacking
Ceh v5 module 05 system hacking
 
project cvs (1)
project cvs (1)project cvs (1)
project cvs (1)
 
Ceh v5 module 11 hacking webservers
Ceh v5 module 11 hacking webserversCeh v5 module 11 hacking webservers
Ceh v5 module 11 hacking webservers
 
Ceh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoorsCeh v5 module 06 trojans and backdoors
Ceh v5 module 06 trojans and backdoors
 
Ceh v5 module 14 sql injection
Ceh v5 module 14 sql injectionCeh v5 module 14 sql injection
Ceh v5 module 14 sql injection
 
Ceh v5 module 20 buffer overflow
Ceh v5 module 20 buffer overflowCeh v5 module 20 buffer overflow
Ceh v5 module 20 buffer overflow
 
Cehv8 - Module 06: Trojans and Backdoors
Cehv8 - Module 06: Trojans and BackdoorsCehv8 - Module 06: Trojans and Backdoors
Cehv8 - Module 06: Trojans and Backdoors
 
Ceh v5 module 16 virus and worms
Ceh v5 module 16 virus and wormsCeh v5 module 16 virus and worms
Ceh v5 module 16 virus and worms
 
Types of attacks and threads
Types of attacks and threadsTypes of attacks and threads
Types of attacks and threads
 
Presentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human HackingPresentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human Hacking
 
Ceh v8 Labs - Module18: Buffer Overflow.
Ceh v8 Labs - Module18: Buffer Overflow.Ceh v8 Labs - Module18: Buffer Overflow.
Ceh v8 Labs - Module18: Buffer Overflow.
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Cehv8 module 01 introduction to ethical hacking
Cehv8 module 01 introduction to ethical hackingCehv8 module 01 introduction to ethical hacking
Cehv8 module 01 introduction to ethical hacking
 

Similar to Module 3 social engineering-b

Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
pooja_doshi
 
Article1DISCUSSION_1Information security within an organi
Article1DISCUSSION_1Information security within an organiArticle1DISCUSSION_1Information security within an organi
Article1DISCUSSION_1Information security within an organi
mallisonshavon
 
Social Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus NetworkSocial Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus Network
thowell
 
Information security threats
Information security threatsInformation security threats
Information security threats
complianceonline123
 

Similar to Module 3 social engineering-b (20)

Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
Learn About Social Engineering Services - Aardwolf Security
Learn About Social Engineering Services - Aardwolf SecurityLearn About Social Engineering Services - Aardwolf Security
Learn About Social Engineering Services - Aardwolf Security
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?
 
Facts About Social Engineering Services - Aardwolf Security
Facts About Social Engineering Services - Aardwolf SecurityFacts About Social Engineering Services - Aardwolf Security
Facts About Social Engineering Services - Aardwolf Security
 
Article1DISCUSSION_1Information security within an organi
Article1DISCUSSION_1Information security within an organiArticle1DISCUSSION_1Information security within an organi
Article1DISCUSSION_1Information security within an organi
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Social Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus NetworkSocial Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus Network
 
Amir bouker
Amir bouker Amir bouker
Amir bouker
 
Stay safe online- understanding authentication methods
Stay safe online- understanding authentication methodsStay safe online- understanding authentication methods
Stay safe online- understanding authentication methods
 
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
 
Information security threats
Information security threatsInformation security threats
Information security threats
 
Social engineering hacking attack
Social engineering hacking attackSocial engineering hacking attack
Social engineering hacking attack
 
Social engineering: A Human Hacking Framework
Social engineering: A Human Hacking FrameworkSocial engineering: A Human Hacking Framework
Social engineering: A Human Hacking Framework
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
Cyber Crime Identity Theft
Cyber Crime Identity Theft Cyber Crime Identity Theft
Cyber Crime Identity Theft
 

More from BbAOC

Module7 wireless security-b
Module7 wireless security-bModule7 wireless security-b
Module7 wireless security-b
BbAOC
 
Module6 secure internet-b
Module6 secure internet-bModule6 secure internet-b
Module6 secure internet-b
BbAOC
 
Module0&1 intro-foundations-b
Module0&1 intro-foundations-bModule0&1 intro-foundations-b
Module0&1 intro-foundations-b
BbAOC
 
Module4 policies&procedures-b
Module4   policies&procedures-bModule4   policies&procedures-b
Module4 policies&procedures-b
BbAOC
 
Module 2 threats-b
Module 2   threats-bModule 2   threats-b
Module 2 threats-b
BbAOC
 
Module5 desktop-laptop-security-b
Module5 desktop-laptop-security-bModule5 desktop-laptop-security-b
Module5 desktop-laptop-security-b
BbAOC
 

More from BbAOC (6)

Module7 wireless security-b
Module7 wireless security-bModule7 wireless security-b
Module7 wireless security-b
 
Module6 secure internet-b
Module6 secure internet-bModule6 secure internet-b
Module6 secure internet-b
 
Module0&1 intro-foundations-b
Module0&1 intro-foundations-bModule0&1 intro-foundations-b
Module0&1 intro-foundations-b
 
Module4 policies&procedures-b
Module4   policies&procedures-bModule4   policies&procedures-b
Module4 policies&procedures-b
 
Module 2 threats-b
Module 2   threats-bModule 2   threats-b
Module 2 threats-b
 
Module5 desktop-laptop-security-b
Module5 desktop-laptop-security-bModule5 desktop-laptop-security-b
Module5 desktop-laptop-security-b
 

Module 3 social engineering-b

Editor's Notes

  1. Module Objectives This module will familiarize you with the following: Investigating Computer Crime Policy and Procedure Development Warning Banners Shutdown the Computer Investigating a Company Policy Violation Accessing Policy Violation Case: Example Collecting the Evidence Implementing an investigation Methodology of investigation Evaluating the case Imaging the Evidence Disk Examining the Digital Evidence Investigation plan Obtaining Search Warrant Closing the case Evaluating the case
  2. INTRODUCTION TO SOCIAL ENGINEERING. Trainer: Perhaps include a picture of people in your department with a person who is familiar to everyone in the audience . You cannot spot a social engineer just by looking at them, and it could be anyone. A social engineer is a person who will deceive or con others into divulging information that they wouldn’t normally share. This picture includes: Will Padilla, Norma Springsteen, Linda Caruso, Sabrina Ledesma, Pam Miramontes, David Nelson, Dave Edwards When taken all were Yolo County employees.
  3. Help desks are particularly vulnerable because they are in place specifically to help , a fact that may be exploited by people who are trying to gain illicit information. Help desk employees are trained to be friendly and give out information, so this is a gold mine for social engineering. Use a shredder
  4. Fake Id’s, human nature is to be helpful. Fake Id’s, human nature is to be helpful.