Social Engineering

408 views

Published on

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
408
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
5
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Social Engineering

  1. 1. Social Engineering<br />What is it?<br />
  2. 2. http://vizconsult.wordpress.com/tag/malware/<br />
  3. 3. You are the weakest link:<br />http://www.youtube.com/watch?v=xn9hH1BckPE<br />
  4. 4. People naturally want to be helpful<br /> <br />
  5. 5.  <br /> <br />
  6. 6. Golden Rules for Internet<br />1. <br />Never provide your personal information or information about yourself, your company/ organization unless you are certain of the person’s identity and authority to have that information<br />
  7. 7. Golden Rules for Internet<br />2.  <br />Never send sensitive and worthy information over the Internet before checking the security of a website (a quick check is looking in the address bar for https instead of http)   <br />
  8. 8. Golden Rules for Internet<br />2. Continued  <br />You can also look for the closed padlock on the lower right corner of the browser window.If you click on it, it will open a window that gives you more details regarding the certificate. Every company that asks you for sensitive information must have a digital certificate, preferably one from an established certificate authority.<br />
  9. 9. Golden Rules for Internet<br />3. <br />Always be aware of unsolicited phone calls, visits and emails from individuals asking about your employees or other such information. Better try to verify his or her identity directly with the company<br />
  10. 10. Golden Rules for Internet<br />4.<br /> <br />TRUST YOUR INSTINCTS! <br />

×