SlideShare a Scribd company logo
1 of 12
 Social engineering is the process of acquiring
information from legitimate users for
illegitimate means
 Social engineering poses a significant threat to
any organization.
 Loss of company assets
 Loss of client assets and information
 Loss of revenue because companies cease to
conduct business with entities that do not
adequately protect their information
 Can result in financial losses for individuals
 Numerous customers of WFC discovered
unauthorized purchases on their credit cards
 Amounts exceeded $100,000
 EW was required to pay $100,000 due to contract
obligations
 EW lost contracts with other companies
 Mr. Farmer, Director of Web Promotion lost his job
 Hacker used publicly available information to gain
knowledge of company and employees
 Hacker dropped the names of WFC and EW
employees in an effort to build a relationship with
Mr. Farmer
 Hacker was able to exploit the misconduct of an
employee in order to gain needed information
 Mr. Farmer knew he was in trouble and the
hacker played on this
 Hacker acted as if he would protect Mr. Farmer
from losing his job
 Hacker was helping Mr. Farmer view more website
that he liked
 Mr. Farmer readily provided his password in hopes of
not getting in trouble for the unapproved website
viewing
 Training was not conducted to educate employees
of the implications of the release of information
 Mr. Farmer was using IM to divulge personal
information about himself
 WFC and EW websites were thoroughly
researched to find information that could be
exploited
 Mr. Farmer’s chat room discussion that revealed
his employer and job title quite possible let to the
hacker’s decision to target him
 The same password was used for multiple
accounts by Mr. Farmer
 He used a strong password and felt it was adequate
to use for all accounts
 Employees should be educated on how to use
strong passwords and not to use the same one
for all accounts
 Educate employees not to become a victim to
coercion or enticement techniques employed by
SEs
 The company must not be narrowly focused
concerning security. It must look at all areas
that is can secure data
 Utilization of secure password techniques
 Sound policy on use of computers
 Educate employees on ensuring the identity of people
they are speaking with
 Educate employees not to reveal information outside of
official communication
 Ensuring employees are not doing things that could be
exploited by a potential hacker
 Properly dispose of any information that could be used
against the company, employees and clients
Mr. Farmer put himself in the position of
vulnerability to hackers by visiting these illicit
websites.
 What can an organization do to discourage this
type of behavior?
 How is a company to know that an individual
is engaging in a certain type of behavior that
would make the company vulnerable for an
attack?
 Honan, M. (2007). How Apple and Amazon
Security Flaws Led to My Epic Hacking. Retrieved
from:
http://www.wired.com/gadgetlab/2012/08/
apple-amazon-mat-honan-hacking/all/
Social engineering power point

More Related Content

What's hot

Cyber Security (Hacking)
Cyber Security (Hacking)Cyber Security (Hacking)
Cyber Security (Hacking)Dhrumit Patel
 
negative implications of IT
negative implications of ITnegative implications of IT
negative implications of ITMahdiRahmani15
 
20 Tips on Data Protection for Personal, Financial, Mobile And Network Security
20 Tips on Data Protection for Personal, Financial, Mobile And Network Security20 Tips on Data Protection for Personal, Financial, Mobile And Network Security
20 Tips on Data Protection for Personal, Financial, Mobile And Network SecurityPatten John
 
10 tips to prevent phishing attacks
10 tips to prevent phishing attacks10 tips to prevent phishing attacks
10 tips to prevent phishing attacksNamik Heydarov
 
Mobile Strategy Partners Mobile Security
Mobile Strategy Partners Mobile SecurityMobile Strategy Partners Mobile Security
Mobile Strategy Partners Mobile SecurityDavid Eads
 
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1Ayush Chopra
 
Safety, Security and Ethics
Safety, Security and EthicsSafety, Security and Ethics
Safety, Security and Ethicsjnallnmnl
 
Anti phishing presentation
Anti phishing presentationAnti phishing presentation
Anti phishing presentationBokangMalunga
 
Security awareness
Security awarenessSecurity awareness
Security awarenessSanoop Nair
 
The COVID-19 Phishing Threats to Watch Out For
The COVID-19 Phishing Threats to Watch Out ForThe COVID-19 Phishing Threats to Watch Out For
The COVID-19 Phishing Threats to Watch Out ForBeth Rigby
 
Does Twitter have a positive impact in the United States?
Does Twitter have a positive impact in the United States?Does Twitter have a positive impact in the United States?
Does Twitter have a positive impact in the United States?TheRealEdwin
 
How to find a violation on the mobile device?
How to find a violation on the mobile device?How to find a violation on the mobile device?
How to find a violation on the mobile device?Sphere Soc
 
Tha security awareness training
Tha security awareness trainingTha security awareness training
Tha security awareness trainingRob Valdez
 

What's hot (18)

Cyber Security (Hacking)
Cyber Security (Hacking)Cyber Security (Hacking)
Cyber Security (Hacking)
 
negative implications of IT
negative implications of ITnegative implications of IT
negative implications of IT
 
20 Tips on Data Protection for Personal, Financial, Mobile And Network Security
20 Tips on Data Protection for Personal, Financial, Mobile And Network Security20 Tips on Data Protection for Personal, Financial, Mobile And Network Security
20 Tips on Data Protection for Personal, Financial, Mobile And Network Security
 
10 tips to prevent phishing attacks
10 tips to prevent phishing attacks10 tips to prevent phishing attacks
10 tips to prevent phishing attacks
 
Mobile Strategy Partners Mobile Security
Mobile Strategy Partners Mobile SecurityMobile Strategy Partners Mobile Security
Mobile Strategy Partners Mobile Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
RP Phishing Awareness
RP Phishing Awareness RP Phishing Awareness
RP Phishing Awareness
 
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
Safety, Security and Ethics
Safety, Security and EthicsSafety, Security and Ethics
Safety, Security and Ethics
 
Anti phishing presentation
Anti phishing presentationAnti phishing presentation
Anti phishing presentation
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Facebook
FacebookFacebook
Facebook
 
Phishing
PhishingPhishing
Phishing
 
The COVID-19 Phishing Threats to Watch Out For
The COVID-19 Phishing Threats to Watch Out ForThe COVID-19 Phishing Threats to Watch Out For
The COVID-19 Phishing Threats to Watch Out For
 
Does Twitter have a positive impact in the United States?
Does Twitter have a positive impact in the United States?Does Twitter have a positive impact in the United States?
Does Twitter have a positive impact in the United States?
 
How to find a violation on the mobile device?
How to find a violation on the mobile device?How to find a violation on the mobile device?
How to find a violation on the mobile device?
 
Tha security awareness training
Tha security awareness trainingTha security awareness training
Tha security awareness training
 

Similar to Social engineering power point

Phishing Awareness Training.pptx
Phishing Awareness Training.pptxPhishing Awareness Training.pptx
Phishing Awareness Training.pptxHajar Bouchriha
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationJamie Proctor-Brassard
 
Module 3 social engineering-b
Module 3   social engineering-bModule 3   social engineering-b
Module 3 social engineering-bBbAOC
 
Train Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesTrain Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesHuman Resources & Payroll
 
How to Protect Your Company from Broken Authentication Attacks?
How to Protect Your Company from Broken Authentication Attacks?How to Protect Your Company from Broken Authentication Attacks?
How to Protect Your Company from Broken Authentication Attacks?Caroline Johnson
 
Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Preventionsonalikharade3
 
Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?Taylor Van Sickle
 
Fraud Awareness Guide for Businesses
Fraud Awareness Guide for BusinessesFraud Awareness Guide for Businesses
Fraud Awareness Guide for BusinessesShred Station
 
CXO 2.0 Reviews Common Scams Targeting Growing Businesses & Legit Prevention ...
CXO 2.0 Reviews Common Scams Targeting Growing Businesses & Legit Prevention ...CXO 2.0 Reviews Common Scams Targeting Growing Businesses & Legit Prevention ...
CXO 2.0 Reviews Common Scams Targeting Growing Businesses & Legit Prevention ...CXO 2.0 Conference
 
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usenProtecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usenCMR WORLD TECH
 
Job portal security-protecting candidates from cyber threats
Job portal security-protecting candidates from cyber threatsJob portal security-protecting candidates from cyber threats
Job portal security-protecting candidates from cyber threatsJob Stas
 

Similar to Social engineering power point (20)

Phishing Awareness Training.pptx
Phishing Awareness Training.pptxPhishing Awareness Training.pptx
Phishing Awareness Training.pptx
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
Data breach
Data breachData breach
Data breach
 
Module 3 social engineering-b
Module 3   social engineering-bModule 3   social engineering-b
Module 3 social engineering-b
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
Train Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesTrain Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security Breaches
 
How to Protect Your Company from Broken Authentication Attacks?
How to Protect Your Company from Broken Authentication Attacks?How to Protect Your Company from Broken Authentication Attacks?
How to Protect Your Company from Broken Authentication Attacks?
 
Phishing Attack Awareness and Prevention
Phishing Attack Awareness and PreventionPhishing Attack Awareness and Prevention
Phishing Attack Awareness and Prevention
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?
 
Fraud Awareness Guide for Businesses
Fraud Awareness Guide for BusinessesFraud Awareness Guide for Businesses
Fraud Awareness Guide for Businesses
 
Computer 4 ict
Computer 4 ictComputer 4 ict
Computer 4 ict
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
CXO 2.0 Reviews Common Scams Targeting Growing Businesses & Legit Prevention ...
CXO 2.0 Reviews Common Scams Targeting Growing Businesses & Legit Prevention ...CXO 2.0 Reviews Common Scams Targeting Growing Businesses & Legit Prevention ...
CXO 2.0 Reviews Common Scams Targeting Growing Businesses & Legit Prevention ...
 
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usenProtecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Job portal security-protecting candidates from cyber threats
Job portal security-protecting candidates from cyber threatsJob portal security-protecting candidates from cyber threats
Job portal security-protecting candidates from cyber threats
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 

Recently uploaded

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Recently uploaded (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

Social engineering power point

  • 1.  Social engineering is the process of acquiring information from legitimate users for illegitimate means  Social engineering poses a significant threat to any organization.
  • 2.  Loss of company assets  Loss of client assets and information  Loss of revenue because companies cease to conduct business with entities that do not adequately protect their information  Can result in financial losses for individuals
  • 3.  Numerous customers of WFC discovered unauthorized purchases on their credit cards  Amounts exceeded $100,000  EW was required to pay $100,000 due to contract obligations  EW lost contracts with other companies  Mr. Farmer, Director of Web Promotion lost his job
  • 4.  Hacker used publicly available information to gain knowledge of company and employees  Hacker dropped the names of WFC and EW employees in an effort to build a relationship with Mr. Farmer  Hacker was able to exploit the misconduct of an employee in order to gain needed information  Mr. Farmer knew he was in trouble and the hacker played on this  Hacker acted as if he would protect Mr. Farmer from losing his job
  • 5.  Hacker was helping Mr. Farmer view more website that he liked  Mr. Farmer readily provided his password in hopes of not getting in trouble for the unapproved website viewing
  • 6.  Training was not conducted to educate employees of the implications of the release of information  Mr. Farmer was using IM to divulge personal information about himself  WFC and EW websites were thoroughly researched to find information that could be exploited  Mr. Farmer’s chat room discussion that revealed his employer and job title quite possible let to the hacker’s decision to target him
  • 7.  The same password was used for multiple accounts by Mr. Farmer  He used a strong password and felt it was adequate to use for all accounts
  • 8.  Employees should be educated on how to use strong passwords and not to use the same one for all accounts  Educate employees not to become a victim to coercion or enticement techniques employed by SEs  The company must not be narrowly focused concerning security. It must look at all areas that is can secure data  Utilization of secure password techniques  Sound policy on use of computers
  • 9.  Educate employees on ensuring the identity of people they are speaking with  Educate employees not to reveal information outside of official communication  Ensuring employees are not doing things that could be exploited by a potential hacker  Properly dispose of any information that could be used against the company, employees and clients
  • 10. Mr. Farmer put himself in the position of vulnerability to hackers by visiting these illicit websites.  What can an organization do to discourage this type of behavior?  How is a company to know that an individual is engaging in a certain type of behavior that would make the company vulnerable for an attack?
  • 11.  Honan, M. (2007). How Apple and Amazon Security Flaws Led to My Epic Hacking. Retrieved from: http://www.wired.com/gadgetlab/2012/08/ apple-amazon-mat-honan-hacking/all/