SlideShare a Scribd company logo
Phishing
1
Definition of Social
Engineering
Social engineering is the art of manipulating people to
disclose confidential information, perform actions, or
compromise security.
It involves psychological manipulation and technical
exploits.
Goals of Social Engineering
Obtain sensitive information (passwords, credit card
details, etc.)
Gain unauthorized access to systems or physical
spaces
Influence people's behavior to perform specific actions
Circumvent security measures and controls
Types of Social Engineering
Attacks
Phishing: Sending deceptive emails or messages to
trick recipients into revealing sensitive information.
Pretexting: Creating a false narrative or scenario to gain
someone's trust and extract information or access.
Baiting: Offering something enticing (e.g., USB drive, free
merchandise) to prompt a person to take an action that
compromises security.
Tailgating: Unauthorized entry to a restricted area by
following someone who has authorized access.
Impersonation: Pretending to be someone else, such as
a trusted authority figure, to gain trust and manipulate
individuals.
Phishing
91% of UK companies experienced at least one successful phishing attack in 2021
Phishing
When criminals use scam emails,
text messages (smishing) or
phone calls (vishing) to trick their
victim with the aim to make you
visit a website or open a file,
which may download a virus onto
your device or direct you to a
malicious website to steal your
personal details.
Don’t take the
bait
URGE
NT
DOES IT LOOK
LEGITIMATE?
REPORT
IT
Use your 'report
suspicious email'
button located at
the top of your
outlook window.
SPELLI
NG
MISTAK
ES
VAGU
E
FISHING THE
PHISH
Phishing CASES
A real-life demo of a phishing scam – this could be you!
FISHING THE
PHISH
2020: TWITTER In 2020, Twitter became the site of social engineering attacks where the
accounts of Barack Obama, Bill Gates, Elon Musk, and others were compromised to
solicit Bitcoins from their followers. The creators of the social engineering attack earned
nearly $120,000 in Bitcoin, but the greatest danger was the clear access the hackers
had to the celebrities' accounts, although supposedly no personal data was
compromised.
2016: Democratic Party The email hack of the US Democratic
Party during the presidential election campaign in 2016 is
one of the most emblematic social engineering attacks in recent memory.
Russian hackers launched a spear-phishing attack against Democratic Party leaders,
which allowed them to access sensitive campaign information and data from nearly
500,000 voters.
2019: Tinder Swindler The infamous "Tinder Swindler" has been around since 2011
and has deceived victims into financing a luxurious lifestyle through a series of
romantic scams. He used a combination of manipulation, love influence, and a lie as
an excuse, eventually stealing around $10 million in his last two years of social
engineering tricks. In 2019, he was convicted, and in 2022, the swindler himself fell
victim to a scam, losing nearly $7,000 of the money he had worked hard to earn
(through the scam).
2018: The Federal Police (PF) investigate the theft of computers from Petrobras
contained strategic information about oil exploration activities. According to PF
delegate Carla Dolinski in Macaé, the information was stored on four notebooks and
two hard drives belonging to the service provider company Halliburton, which were
stolen from a container transported from Santos to Macaé by the carrier Transmagno.
The shipment left Santos on January 18th and arrived in Macaé 12 days later. "On
January 31st, Halliburton employees noticed that the seal of the container had been
broken," the delegate said.).
Phishing
Best Practices for Personal
Security
• Protect personal information (e.g., avoid sharing sensitive details on social
media).
• Regularly update passwords and use strong, unique passwords for different
accounts.
• Enable two-factor authentication wherever possible.
• Be cautious when clicking on links or downloading attachments from unknown
or suspicious sources.
Conclusion
Social engineering attacks exploit human psychology and trust. By
understanding the techniques used in social engineering attacks, we can better
protect ourselves and our organizations.
Stay informed, stay
vigilant, and stay secure!
Phishing
A real-life demo of a phishing scam – this could be you!
FISHING THE
PHISH

More Related Content

Similar to Social Engineering - Enterprise Phishing.pptx

Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2Conf
 
Copyright patent& intellectual property
Copyright patent& intellectual propertyCopyright patent& intellectual property
Copyright patent& intellectual propertyCarlos Gonsalves
 
THE CHANGING FACE OF IDENTITY THEFT
THE CHANGING FACE OF IDENTITY THEFTTHE CHANGING FACE OF IDENTITY THEFT
THE CHANGING FACE OF IDENTITY THEFT- Mark - Fullbright
 
Identity Theft and Society: What's in it for me?
Identity Theft and Society: What's in it for me?Identity Theft and Society: What's in it for me?
Identity Theft and Society: What's in it for me?Robert Bromwich
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityMuhammad Hamza
 
Social Engineering by Riziq Ramadani
Social Engineering by Riziq RamadaniSocial Engineering by Riziq Ramadani
Social Engineering by Riziq RamadaniRiziqRamadani
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasuresJorge Sebastiao
 
Introduction-to-Cybercrime Investigation.pptx
Introduction-to-Cybercrime Investigation.pptxIntroduction-to-Cybercrime Investigation.pptx
Introduction-to-Cybercrime Investigation.pptxOlusegun Mosugu
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 

Similar to Social Engineering - Enterprise Phishing.pptx (20)

What is cyber fraud?
What is cyber fraud?What is cyber fraud?
What is cyber fraud?
 
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
 
Copyright patent& intellectual property
Copyright patent& intellectual propertyCopyright patent& intellectual property
Copyright patent& intellectual property
 
THE CHANGING FACE OF IDENTITY THEFT
THE CHANGING FACE OF IDENTITY THEFTTHE CHANGING FACE OF IDENTITY THEFT
THE CHANGING FACE OF IDENTITY THEFT
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Unit 1
Unit 1Unit 1
Unit 1
 
Identity Theft and Society: What's in it for me?
Identity Theft and Society: What's in it for me?Identity Theft and Society: What's in it for me?
Identity Theft and Society: What's in it for me?
 
Cybercriminals Are Lurking
Cybercriminals Are LurkingCybercriminals Are Lurking
Cybercriminals Are Lurking
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Social Engineering : To Err is Human...
Social Engineering : To Err is Human...Social Engineering : To Err is Human...
Social Engineering : To Err is Human...
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Social Engineering by Riziq Ramadani
Social Engineering by Riziq RamadaniSocial Engineering by Riziq Ramadani
Social Engineering by Riziq Ramadani
 
Cybercrime blog
Cybercrime blogCybercrime blog
Cybercrime blog
 
IT Sample Paper
IT Sample PaperIT Sample Paper
IT Sample Paper
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Introduction-to-Cybercrime Investigation.pptx
Introduction-to-Cybercrime Investigation.pptxIntroduction-to-Cybercrime Investigation.pptx
Introduction-to-Cybercrime Investigation.pptx
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Module vi mis
Module vi misModule vi mis
Module vi mis
 
Databreach forecast
Databreach forecastDatabreach forecast
Databreach forecast
 

Recently uploaded

Business update Q1 2024 Lar España Real Estate SOCIMI
Business update Q1 2024 Lar España Real Estate SOCIMIBusiness update Q1 2024 Lar España Real Estate SOCIMI
Business update Q1 2024 Lar España Real Estate SOCIMIAlejandraGmez176757
 
AI Imagen for data-storytelling Infographics.pdf
AI Imagen for data-storytelling Infographics.pdfAI Imagen for data-storytelling Infographics.pdf
AI Imagen for data-storytelling Infographics.pdfMichaelSenkow
 
Machine Learning For Career Growth..pptx
Machine Learning For Career Growth..pptxMachine Learning For Career Growth..pptx
Machine Learning For Career Growth..pptxbenishzehra469
 
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...correoyaya
 
Jpolillo Amazon PPC - Bid Optimization Sample
Jpolillo Amazon PPC - Bid Optimization SampleJpolillo Amazon PPC - Bid Optimization Sample
Jpolillo Amazon PPC - Bid Optimization SampleJames Polillo
 
Using PDB Relocation to Move a Single PDB to Another Existing CDB
Using PDB Relocation to Move a Single PDB to Another Existing CDBUsing PDB Relocation to Move a Single PDB to Another Existing CDB
Using PDB Relocation to Move a Single PDB to Another Existing CDBAlireza Kamrani
 
Artificial_General_Intelligence__storm_gen_article.pdf
Artificial_General_Intelligence__storm_gen_article.pdfArtificial_General_Intelligence__storm_gen_article.pdf
Artificial_General_Intelligence__storm_gen_article.pdfscitechtalktv
 
How can I successfully sell my pi coins in Philippines?
How can I successfully sell my pi coins in Philippines?How can I successfully sell my pi coins in Philippines?
How can I successfully sell my pi coins in Philippines?DOT TECH
 
Pre-ProductionImproveddsfjgndflghtgg.pptx
Pre-ProductionImproveddsfjgndflghtgg.pptxPre-ProductionImproveddsfjgndflghtgg.pptx
Pre-ProductionImproveddsfjgndflghtgg.pptxStephen266013
 
Supply chain analytics to combat the effects of Ukraine-Russia-conflict
Supply chain analytics to combat the effects of Ukraine-Russia-conflictSupply chain analytics to combat the effects of Ukraine-Russia-conflict
Supply chain analytics to combat the effects of Ukraine-Russia-conflictJack Cole
 
2024-05-14 - Tableau User Group - TC24 Hot Topics - Tableau Pulse and Einstei...
2024-05-14 - Tableau User Group - TC24 Hot Topics - Tableau Pulse and Einstei...2024-05-14 - Tableau User Group - TC24 Hot Topics - Tableau Pulse and Einstei...
2024-05-14 - Tableau User Group - TC24 Hot Topics - Tableau Pulse and Einstei...elinavihriala
 
Exploratory Data Analysis - Dilip S.pptx
Exploratory Data Analysis - Dilip S.pptxExploratory Data Analysis - Dilip S.pptx
Exploratory Data Analysis - Dilip S.pptxDilipVasan
 
社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .NABLAS株式会社
 
Webinar One View, Multiple Systems No-Code Integration of Salesforce and ERPs
Webinar One View, Multiple Systems No-Code Integration of Salesforce and ERPsWebinar One View, Multiple Systems No-Code Integration of Salesforce and ERPs
Webinar One View, Multiple Systems No-Code Integration of Salesforce and ERPsCEPTES Software Inc
 
how can i exchange pi coins for others currency like Bitcoin
how can i exchange pi coins for others currency like Bitcoinhow can i exchange pi coins for others currency like Bitcoin
how can i exchange pi coins for others currency like BitcoinDOT TECH
 
Tabula.io Cheatsheet: automate your data workflows
Tabula.io Cheatsheet: automate your data workflowsTabula.io Cheatsheet: automate your data workflows
Tabula.io Cheatsheet: automate your data workflowsalex933524
 
2024 Q2 Orange County (CA) Tableau User Group Meeting
2024 Q2 Orange County (CA) Tableau User Group Meeting2024 Q2 Orange County (CA) Tableau User Group Meeting
2024 Q2 Orange County (CA) Tableau User Group MeetingAlison Pitt
 
basics of data science with application areas.pdf
basics of data science with application areas.pdfbasics of data science with application areas.pdf
basics of data science with application areas.pdfvyankatesh1
 
2024 Q1 Tableau User Group Leader Quarterly Call
2024 Q1 Tableau User Group Leader Quarterly Call2024 Q1 Tableau User Group Leader Quarterly Call
2024 Q1 Tableau User Group Leader Quarterly Calllward7
 

Recently uploaded (20)

Business update Q1 2024 Lar España Real Estate SOCIMI
Business update Q1 2024 Lar España Real Estate SOCIMIBusiness update Q1 2024 Lar España Real Estate SOCIMI
Business update Q1 2024 Lar España Real Estate SOCIMI
 
AI Imagen for data-storytelling Infographics.pdf
AI Imagen for data-storytelling Infographics.pdfAI Imagen for data-storytelling Infographics.pdf
AI Imagen for data-storytelling Infographics.pdf
 
Machine Learning For Career Growth..pptx
Machine Learning For Career Growth..pptxMachine Learning For Career Growth..pptx
Machine Learning For Career Growth..pptx
 
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
 
Jpolillo Amazon PPC - Bid Optimization Sample
Jpolillo Amazon PPC - Bid Optimization SampleJpolillo Amazon PPC - Bid Optimization Sample
Jpolillo Amazon PPC - Bid Optimization Sample
 
Using PDB Relocation to Move a Single PDB to Another Existing CDB
Using PDB Relocation to Move a Single PDB to Another Existing CDBUsing PDB Relocation to Move a Single PDB to Another Existing CDB
Using PDB Relocation to Move a Single PDB to Another Existing CDB
 
Artificial_General_Intelligence__storm_gen_article.pdf
Artificial_General_Intelligence__storm_gen_article.pdfArtificial_General_Intelligence__storm_gen_article.pdf
Artificial_General_Intelligence__storm_gen_article.pdf
 
How can I successfully sell my pi coins in Philippines?
How can I successfully sell my pi coins in Philippines?How can I successfully sell my pi coins in Philippines?
How can I successfully sell my pi coins in Philippines?
 
Pre-ProductionImproveddsfjgndflghtgg.pptx
Pre-ProductionImproveddsfjgndflghtgg.pptxPre-ProductionImproveddsfjgndflghtgg.pptx
Pre-ProductionImproveddsfjgndflghtgg.pptx
 
Supply chain analytics to combat the effects of Ukraine-Russia-conflict
Supply chain analytics to combat the effects of Ukraine-Russia-conflictSupply chain analytics to combat the effects of Ukraine-Russia-conflict
Supply chain analytics to combat the effects of Ukraine-Russia-conflict
 
2024-05-14 - Tableau User Group - TC24 Hot Topics - Tableau Pulse and Einstei...
2024-05-14 - Tableau User Group - TC24 Hot Topics - Tableau Pulse and Einstei...2024-05-14 - Tableau User Group - TC24 Hot Topics - Tableau Pulse and Einstei...
2024-05-14 - Tableau User Group - TC24 Hot Topics - Tableau Pulse and Einstei...
 
Exploratory Data Analysis - Dilip S.pptx
Exploratory Data Analysis - Dilip S.pptxExploratory Data Analysis - Dilip S.pptx
Exploratory Data Analysis - Dilip S.pptx
 
Slip-and-fall Injuries: Top Workers' Comp Claims
Slip-and-fall Injuries: Top Workers' Comp ClaimsSlip-and-fall Injuries: Top Workers' Comp Claims
Slip-and-fall Injuries: Top Workers' Comp Claims
 
社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .
 
Webinar One View, Multiple Systems No-Code Integration of Salesforce and ERPs
Webinar One View, Multiple Systems No-Code Integration of Salesforce and ERPsWebinar One View, Multiple Systems No-Code Integration of Salesforce and ERPs
Webinar One View, Multiple Systems No-Code Integration of Salesforce and ERPs
 
how can i exchange pi coins for others currency like Bitcoin
how can i exchange pi coins for others currency like Bitcoinhow can i exchange pi coins for others currency like Bitcoin
how can i exchange pi coins for others currency like Bitcoin
 
Tabula.io Cheatsheet: automate your data workflows
Tabula.io Cheatsheet: automate your data workflowsTabula.io Cheatsheet: automate your data workflows
Tabula.io Cheatsheet: automate your data workflows
 
2024 Q2 Orange County (CA) Tableau User Group Meeting
2024 Q2 Orange County (CA) Tableau User Group Meeting2024 Q2 Orange County (CA) Tableau User Group Meeting
2024 Q2 Orange County (CA) Tableau User Group Meeting
 
basics of data science with application areas.pdf
basics of data science with application areas.pdfbasics of data science with application areas.pdf
basics of data science with application areas.pdf
 
2024 Q1 Tableau User Group Leader Quarterly Call
2024 Q1 Tableau User Group Leader Quarterly Call2024 Q1 Tableau User Group Leader Quarterly Call
2024 Q1 Tableau User Group Leader Quarterly Call
 

Social Engineering - Enterprise Phishing.pptx

  • 2. Definition of Social Engineering Social engineering is the art of manipulating people to disclose confidential information, perform actions, or compromise security. It involves psychological manipulation and technical exploits. Goals of Social Engineering Obtain sensitive information (passwords, credit card details, etc.) Gain unauthorized access to systems or physical spaces Influence people's behavior to perform specific actions Circumvent security measures and controls
  • 3. Types of Social Engineering Attacks Phishing: Sending deceptive emails or messages to trick recipients into revealing sensitive information. Pretexting: Creating a false narrative or scenario to gain someone's trust and extract information or access. Baiting: Offering something enticing (e.g., USB drive, free merchandise) to prompt a person to take an action that compromises security. Tailgating: Unauthorized entry to a restricted area by following someone who has authorized access. Impersonation: Pretending to be someone else, such as a trusted authority figure, to gain trust and manipulate individuals.
  • 4. Phishing 91% of UK companies experienced at least one successful phishing attack in 2021 Phishing When criminals use scam emails, text messages (smishing) or phone calls (vishing) to trick their victim with the aim to make you visit a website or open a file, which may download a virus onto your device or direct you to a malicious website to steal your personal details. Don’t take the bait URGE NT DOES IT LOOK LEGITIMATE? REPORT IT Use your 'report suspicious email' button located at the top of your outlook window. SPELLI NG MISTAK ES VAGU E FISHING THE PHISH
  • 5. Phishing CASES A real-life demo of a phishing scam – this could be you! FISHING THE PHISH 2020: TWITTER In 2020, Twitter became the site of social engineering attacks where the accounts of Barack Obama, Bill Gates, Elon Musk, and others were compromised to solicit Bitcoins from their followers. The creators of the social engineering attack earned nearly $120,000 in Bitcoin, but the greatest danger was the clear access the hackers had to the celebrities' accounts, although supposedly no personal data was compromised. 2016: Democratic Party The email hack of the US Democratic Party during the presidential election campaign in 2016 is one of the most emblematic social engineering attacks in recent memory. Russian hackers launched a spear-phishing attack against Democratic Party leaders, which allowed them to access sensitive campaign information and data from nearly 500,000 voters. 2019: Tinder Swindler The infamous "Tinder Swindler" has been around since 2011 and has deceived victims into financing a luxurious lifestyle through a series of romantic scams. He used a combination of manipulation, love influence, and a lie as an excuse, eventually stealing around $10 million in his last two years of social engineering tricks. In 2019, he was convicted, and in 2022, the swindler himself fell victim to a scam, losing nearly $7,000 of the money he had worked hard to earn (through the scam). 2018: The Federal Police (PF) investigate the theft of computers from Petrobras contained strategic information about oil exploration activities. According to PF delegate Carla Dolinski in Macaé, the information was stored on four notebooks and two hard drives belonging to the service provider company Halliburton, which were stolen from a container transported from Santos to Macaé by the carrier Transmagno. The shipment left Santos on January 18th and arrived in Macaé 12 days later. "On January 31st, Halliburton employees noticed that the seal of the container had been broken," the delegate said.).
  • 6. Phishing Best Practices for Personal Security • Protect personal information (e.g., avoid sharing sensitive details on social media). • Regularly update passwords and use strong, unique passwords for different accounts. • Enable two-factor authentication wherever possible. • Be cautious when clicking on links or downloading attachments from unknown or suspicious sources. Conclusion Social engineering attacks exploit human psychology and trust. By understanding the techniques used in social engineering attacks, we can better protect ourselves and our organizations. Stay informed, stay vigilant, and stay secure!
  • 7. Phishing A real-life demo of a phishing scam – this could be you! FISHING THE PHISH

Editor's Notes

  1. Click to add text
  2. Click to add text
  3. Click to add text
  4. Click to add text
  5. Click to add text
  6. Click to add text
  7. Click to add text