Your SlideShare is downloading. ×
The Art of Social Engineering*
The Art of Social Engineering*
The Art of Social Engineering*
The Art of Social Engineering*
The Art of Social Engineering*
The Art of Social Engineering*
The Art of Social Engineering*
The Art of Social Engineering*
The Art of Social Engineering*
The Art of Social Engineering*
The Art of Social Engineering*
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

The Art of Social Engineering*

427

Published on

Most organizations today consider themselves “security-conscious” and may spend significant budget dollars on technology to protect themselves and their networks from intrusion. However, technology …

Most organizations today consider themselves “security-conscious” and may spend significant budget dollars on technology to protect themselves and their networks from intrusion. However, technology alone cannot protect your systems from your biggest vulnerability – the people who work for you. “Social Engineering” is the practice of gaining information or access to protected systems by tricking insiders into providing it. Most people who fall victim to a social engineering attack are people who would never consciously reveal confidential data, but can provide a skilled hacker with the knowledge they need to destroy files or entire systems. In this presentation we will show you how to think like a hacker trying to infiltrate your organization so you can better protect yourself from social engineering attacks.
*This presentation is influenced by the book “The Art of Deception: Controlling the Human Element of Security” by Kevin Mitnick, William Simon, and Steve Wozniak

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
427
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
11
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. The Ultimate HeistTime Magazine: Monday November 20th, 1978 Stanley Mark Rifkin
  • 2. Security: Fact or Fiction?
  • 3. THE DIRECT ATTACK: Just Ask!
  • 4. PHONY SITES AND DANGEROUS ATTACHMENTS www.paypai.com www.paypal.com www.paypa1.coma
  • 5. SIX TENDENCIES SOCIAL ENGINEERS RELY ON•Authority•Liking•Reciprocation•Consistency•Social validation•Scarcity
  • 6. SECURITY IS NOT A PRODUCT; IT IS A PROCESS
  • 7. THE THREAT IS CONSTANTThe reminders must be as well
  • 8. COMMON SOCIAL ENGINEERING METHODS• Posting as employee of vendor• Posing as someone in authority• Sending a virus in an email• False pop-up Windows
  • 9. FACTORS THAT MAKE COMPANIES MOREVULNERABLE TO ATTACKS• Large number of employees• Multiple facilities• Information on employee whereabouts left in voice mail messages• Phone extension information made available• Lack of security training• Lack of data classification system• No incident reporting/response plan in place
  • 10. WARNING SIGNS OF AN ATTACK

×