The Ultimate HeistTime Magazine: Monday November           20th, 1978      Stanley Mark Rifkin
Security: Fact or Fiction?
THE DIRECT ATTACK:   Just Ask!
PHONY SITES AND DANGEROUS       ATTACHMENTS     www.paypai.com     www.paypal.com    www.paypa1.coma
SIX TENDENCIES SOCIAL ENGINEERS RELY                 ON•Authority•Liking•Reciprocation•Consistency•Social validation•Scarc...
SECURITY IS NOT A PRODUCT; IT IS A PROCESS
THE THREAT IS CONSTANTThe reminders must be as well
COMMON SOCIAL ENGINEERING METHODS•   Posting as employee of vendor•   Posing as someone in authority•   Sending a virus in...
FACTORS THAT MAKE COMPANIES MOREVULNERABLE TO ATTACKS•   Large number of employees•   Multiple facilities•   Information o...
WARNING SIGNS OF AN ATTACK
The Art of Social Engineering*
Upcoming SlideShare
Loading in...5
×

The Art of Social Engineering*

483
-1

Published on

Most organizations today consider themselves “security-conscious” and may spend significant budget dollars on technology to protect themselves and their networks from intrusion. However, technology alone cannot protect your systems from your biggest vulnerability – the people who work for you. “Social Engineering” is the practice of gaining information or access to protected systems by tricking insiders into providing it. Most people who fall victim to a social engineering attack are people who would never consciously reveal confidential data, but can provide a skilled hacker with the knowledge they need to destroy files or entire systems. In this presentation we will show you how to think like a hacker trying to infiltrate your organization so you can better protect yourself from social engineering attacks.
*This presentation is influenced by the book “The Art of Deception: Controlling the Human Element of Security” by Kevin Mitnick, William Simon, and Steve Wozniak

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
483
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
12
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

The Art of Social Engineering*

  1. 1. The Ultimate HeistTime Magazine: Monday November 20th, 1978 Stanley Mark Rifkin
  2. 2. Security: Fact or Fiction?
  3. 3. THE DIRECT ATTACK: Just Ask!
  4. 4. PHONY SITES AND DANGEROUS ATTACHMENTS www.paypai.com www.paypal.com www.paypa1.coma
  5. 5. SIX TENDENCIES SOCIAL ENGINEERS RELY ON•Authority•Liking•Reciprocation•Consistency•Social validation•Scarcity
  6. 6. SECURITY IS NOT A PRODUCT; IT IS A PROCESS
  7. 7. THE THREAT IS CONSTANTThe reminders must be as well
  8. 8. COMMON SOCIAL ENGINEERING METHODS• Posting as employee of vendor• Posing as someone in authority• Sending a virus in an email• False pop-up Windows
  9. 9. FACTORS THAT MAKE COMPANIES MOREVULNERABLE TO ATTACKS• Large number of employees• Multiple facilities• Information on employee whereabouts left in voice mail messages• Phone extension information made available• Lack of security training• Lack of data classification system• No incident reporting/response plan in place
  10. 10. WARNING SIGNS OF AN ATTACK
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×