SlideShare a Scribd company logo
 
C3­ Ethical Issues 
 ​Devlin Ceretti, Jenny Duong, Steven Lam 
Tuesday, May 10, 2016 
 
 
 
  Piggybacking  Phishing   Delivery Person  Tech Support 
What is it/example?   ​A way for a 
person to gain 
access to a 
secured building 
even if it has 
smart­card passes 
or biometrics.  
 
Example:  
 When an 
employee of the 
company allow 
individuals into a 
secured door by 
holding it open for 
them because the 
individual appears 
to still be 
searching for their 
pass. 
The practice of 
sending emails 
appearing to be 
from a reputable 
sources with the 
goal of 
influencing or 
gain personal 
information. 
 
Several different 
forms of attacks 
that are 
commonly used 
via phishing. 
People that 
impersonate a 
delivery person or 
someone delivering 
a package. They do 
this in order to gain 
access into a 
building then just 
use a USB to take 
data straight from a 
computer. 
 
Example: 
In 2007, a person 
posed as a delivery 
person, and robbed 
Ernest Rady, a 
billionaire who lives 
in San Diego. The 
person knocked at 
the door claiming to 
be a delivery 
person, and 
Ernest’s wife 
opened the door for 
him. 
A person who uses 
social engineering 
to impersonate a 
tech support worker. 
 
Example: 
A person that is 
impersonating a 
tech support worker 
goes into 
someone's house 
and compromises 
their computers 
data through a USB 
or just through 
physically looking 
through the 
computer 
Why it works?  It works because it 
is very easy for 
the individual to 
scam the 
employee, the 
individual could 
dress up as an 
employee working 
there since the 
company is a big 
business, not 
everyone know 
who works there 
or not so the 
individual could 
The attack 
appears as 
someone/somet
hing that they 
are not, and lies 
to users as if 
they are selling 
products. 
People that order 
something like a 
pizza will assume 
the person is just 
gonna give you 
what you order and 
will usually not even 
think or notice they 
got anywhere close 
to your computer 
People don't think 
twice when they 
request a tech 
support worker they 
can just let 
themselves into 
someone's 
computer. Most 
people don’t 
properly protect 
their files so they 
can be taken easily 
with access to the 
physical PC 
easily pretend 
they work there.  
How do they get data?  They get data by 
going into the 
company and 
going through the 
files or hacking the 
computer system.  
People check 
their emails 
without caution 
and are usually 
tricked into 
clicking a link to 
an illegitimate 
website which 
fools an 
individual into 
handing over 
personal 
information. 
By gaining access 
into a building and 
planting a USB or 
some other type of 
data storing device 
onto somebodys 
computer and 
stealing the data. 
Through going into 
somebodys 
computer physically 
or they can also get 
information through 
a phone call by 
finding a person 
requiring tech 
support and then 
walking them 
through “fixing their 
problem” 
 

More Related Content

What's hot

Plagiarism, Copyright, and Netiquette
Plagiarism, Copyright, and NetiquettePlagiarism, Copyright, and Netiquette
Plagiarism, Copyright, and Netiquette
Mya0726
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
Areeb Khan
 
Private & Personal Information
Private & Personal InformationPrivate & Personal Information
Private & Personal Information
bigblueteacher
 
Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI Demystified
Michael Sexton
 

What's hot (12)

Netiquette, Copyright, and Plagiarism
Netiquette, Copyright, and Plagiarism Netiquette, Copyright, and Plagiarism
Netiquette, Copyright, and Plagiarism
 
Plagiarism, Copyright, and Netiquette
Plagiarism, Copyright, and NetiquettePlagiarism, Copyright, and Netiquette
Plagiarism, Copyright, and Netiquette
 
DIGITAL LITERACY Steps to Becoming a Digital Citizen
DIGITAL LITERACY Steps to Becoming a Digital CitizenDIGITAL LITERACY Steps to Becoming a Digital Citizen
DIGITAL LITERACY Steps to Becoming a Digital Citizen
 
Kids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe onlineKids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe online
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Private & Personal Information
Private & Personal InformationPrivate & Personal Information
Private & Personal Information
 
Digital Citizenship Presentation
Digital Citizenship PresentationDigital Citizenship Presentation
Digital Citizenship Presentation
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Isao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismIsao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalism
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.
 
Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI Demystified
 

Similar to ICS201--C3

Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02
ITNet
 
Module 3 social engineering-b
Module 3   social engineering-bModule 3   social engineering-b
Module 3 social engineering-b
BbAOC
 
Disadvantages of Digital Identity
Disadvantages of Digital IdentityDisadvantages of Digital Identity
Disadvantages of Digital Identity
Digital-identity
 

Similar to ICS201--C3 (20)

Types of Social engineering
Types of Social engineeringTypes of Social engineering
Types of Social engineering
 
Social Engineering by Riziq Ramadani
Social Engineering by Riziq RamadaniSocial Engineering by Riziq Ramadani
Social Engineering by Riziq Ramadani
 
Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02
 
Cyber Crime Identity Theft
Cyber Crime Identity Theft Cyber Crime Identity Theft
Cyber Crime Identity Theft
 
computer law.pptx
computer law.pptxcomputer law.pptx
computer law.pptx
 
social engineering
 social engineering social engineering
social engineering
 
Benefits of Regular Social Engineering Services - Aardwolf Security
Benefits of Regular Social Engineering Services - Aardwolf SecurityBenefits of Regular Social Engineering Services - Aardwolf Security
Benefits of Regular Social Engineering Services - Aardwolf Security
 
Module 3 social engineering-b
Module 3   social engineering-bModule 3   social engineering-b
Module 3 social engineering-b
 
Cyber crimes & cyber security
Cyber crimes & cyber securityCyber crimes & cyber security
Cyber crimes & cyber security
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Cyber security ATTACK on Retired Personnel, MITIGATION and Best Practices
Cyber security ATTACK on Retired Personnel, MITIGATION and Best PracticesCyber security ATTACK on Retired Personnel, MITIGATION and Best Practices
Cyber security ATTACK on Retired Personnel, MITIGATION and Best Practices
 
Social Engineering - Enterprise Phishing.pptx
Social Engineering - Enterprise Phishing.pptxSocial Engineering - Enterprise Phishing.pptx
Social Engineering - Enterprise Phishing.pptx
 
Disadvantages of Digital Identity
Disadvantages of Digital IdentityDisadvantages of Digital Identity
Disadvantages of Digital Identity
 
IST Presentation
IST PresentationIST Presentation
IST Presentation
 
Security awareness-checklist 2019
Security awareness-checklist 2019Security awareness-checklist 2019
Security awareness-checklist 2019
 
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015
 
Social Engineering.pdf
Social Engineering.pdfSocial Engineering.pdf
Social Engineering.pdf
 
Facebook
FacebookFacebook
Facebook
 

ICS201--C3