SlideShare a Scribd company logo
1 of 70
Social Engineering: “The Cyber-Con” Stephen Schell ISDS 418 Dr. Sherif Cal-State Fullerton Spring 2006
Overview ,[object Object],[object Object],[object Object],[object Object]
Define Social Engineering
Define Social Engineering ,[object Object],[object Object],[object Object]
Define Social Engineering ,[object Object],[object Object],[object Object]
Define Social Engineering ,[object Object],[object Object],[object Object],[object Object]
Define Social Engineering ,[object Object],[object Object],[object Object],[object Object]
Define Social Engineering ,[object Object],[object Object],[object Object],[object Object]
Popular Methods of Attack
Popular Methods of Attack ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Popular Methods of Attack ,[object Object],[object Object],[object Object],[object Object]
Popular Methods of Attack ,[object Object],[object Object],[object Object],[object Object]
Popular Methods of Attack ,[object Object],[object Object],[object Object]
Popular Methods of Attack ,[object Object],[object Object],[object Object]
Popular Methods of Attack ,[object Object]
Popular Methods of Attack ,[object Object],[object Object],[object Object]
Popular Methods of Attack ,[object Object],[object Object],[object Object]
Popular Methods of Attack ,[object Object],[object Object]
Popular Methods of Attack ,[object Object],[object Object],[object Object]
Popular Methods of Attack ,[object Object]
Popular Methods of Attack ,[object Object]
Popular Methods of Attack ,[object Object],[object Object],[object Object],[object Object]
Popular Methods of Attack ,[object Object],[object Object],[object Object],[object Object],[object Object]
Popular Methods of Attack ,[object Object],[object Object],[object Object],[object Object]
Popular Methods of Attack ,[object Object],[object Object],[object Object]
Popular Methods of Attack ,[object Object],[object Object],[object Object],[object Object]
Popular Methods of Attack ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Popular Methods of Attack ,[object Object],[object Object],[object Object],[object Object]
Popular Methods of Attack ,[object Object],[object Object],[object Object]
Popular Methods of Attack ,[object Object],[object Object],[object Object]
Severity and Success Rates
Severity and Success Rates ,[object Object],[object Object],[object Object]
Severity and Success Rates ,[object Object],[object Object],*“The Art of Deception” by Kevin Mitnick, Chapter 1 ,[object Object]
Severity and Success Rates ,[object Object],*March 2005 report #2005-20-042 ,[object Object]
Severity and Success Rates ,[object Object],[object Object],[object Object]
Severity and Success Rates ,[object Object],[object Object],[object Object],[object Object]
Severity and Success Rates
Severity and Success Rates ,[object Object],[object Object],[object Object],[object Object]
Methods to Counter Attacks
Methods to Counter Attacks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Methods to Counter Attacks Secure Collection Bins Secure Transport Complete Document Shredding Materials Recycling ,[object Object],Recall Document Management Services at Recall.com
Methods to Counter Attacks ,[object Object],[object Object],[object Object],[object Object],[object Object]
Methods to Counter Attacks ,[object Object]
Methods to Counter Attacks ,[object Object],[object Object],[object Object]
Methods to Counter Attacks ,[object Object],[object Object],[object Object]
Methods to Counter Attacks ,[object Object]
Methods to Counter Attacks ,[object Object],[object Object],[object Object],[object Object]
Methods to Counter Attacks ,[object Object],[object Object],[object Object]
Methods to Counter Attacks ,[object Object],[object Object],[object Object],[object Object]
Methods to Counter Attacks ,[object Object],[object Object],[object Object],[object Object],[object Object]
Methods to Counter Attacks ,[object Object],[object Object]
Methods to Counter Attacks ,[object Object],[object Object],[object Object],[object Object]
Methods to Counter Attacks ,[object Object],[object Object],[object Object],[object Object],[object Object]
Methods to Counter Attacks ,[object Object]
Methods to Counter Attacks ,[object Object],[object Object],[object Object],[object Object]
Methods to Counter Attacks ,[object Object]
Methods to Counter Attacks ,[object Object],[object Object],[object Object],[object Object],[object Object]
Methods to Counter Attacks ,[object Object],[object Object],[object Object]
Methods to Counter Attacks ,[object Object],[object Object],[object Object],[object Object],[object Object]
Methods to Counter Attacks ,[object Object],[object Object],[object Object],[object Object]
Methods to Counter Attacks ,[object Object],[object Object],[object Object],[object Object]
Conclusion
Conclusion ,[object Object],[object Object]
Conclusion ,[object Object],[object Object]
Conclusion ,[object Object],[object Object],[object Object]
Questions from the Audience
References ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
References ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
References ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
References ,[object Object],[object Object]

More Related Content

What's hot

Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
pooja_doshi
 

What's hot (20)

Social engineering
Social engineeringSocial engineering
Social engineering
 
Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Social Engineering and What to do About it
Social Engineering and What to do About itSocial Engineering and What to do About it
Social Engineering and What to do About it
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
 
Cyber Crime Identity Theft
Cyber Crime Identity TheftCyber Crime Identity Theft
Cyber Crime Identity Theft
 
Information security awareness
Information security awarenessInformation security awareness
Information security awareness
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Information security awareness training
Information security awareness trainingInformation security awareness training
Information security awareness training
 
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering RiskBSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
 
Scams and-fraud-presentation
Scams and-fraud-presentationScams and-fraud-presentation
Scams and-fraud-presentation
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human Behavior
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Identity theft
Identity theftIdentity theft
Identity theft
 

Viewers also liked

Module 3 social engineering-b
Module 3   social engineering-bModule 3   social engineering-b
Module 3 social engineering-b
BbAOC
 

Viewers also liked (20)

Ceh v5 module 09 social engineering
Ceh v5 module 09 social engineeringCeh v5 module 09 social engineering
Ceh v5 module 09 social engineering
 
Module 3 social engineering-b
Module 3   social engineering-bModule 3   social engineering-b
Module 3 social engineering-b
 
Osint overview 26 mar 2015
Osint overview  26 mar 2015Osint overview  26 mar 2015
Osint overview 26 mar 2015
 
Social engineering tales
Social engineering tales Social engineering tales
Social engineering tales
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.
 
Social Engineering 2.0
Social Engineering 2.0Social Engineering 2.0
Social Engineering 2.0
 
project cvs (1)
project cvs (1)project cvs (1)
project cvs (1)
 
Cehv8 - Module 09: Social Engineering.
Cehv8 - Module 09: Social Engineering.Cehv8 - Module 09: Social Engineering.
Cehv8 - Module 09: Social Engineering.
 
OSINT 2.0 - Past, present and future
OSINT 2.0  - Past, present and futureOSINT 2.0  - Past, present and future
OSINT 2.0 - Past, present and future
 
Social Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessSocial Engineering Audit & Security Awareness
Social Engineering Audit & Security Awareness
 
Social engineering with in for kanban
Social engineering with in for kanbanSocial engineering with in for kanban
Social engineering with in for kanban
 
TH3 Professional Developper CEH social engineering
TH3 Professional Developper CEH social engineeringTH3 Professional Developper CEH social engineering
TH3 Professional Developper CEH social engineering
 
20070317 Osint Presentation
20070317 Osint Presentation20070317 Osint Presentation
20070317 Osint Presentation
 
ShadyRAT: Anatomy of targeted attack
ShadyRAT: Anatomy of targeted attackShadyRAT: Anatomy of targeted attack
ShadyRAT: Anatomy of targeted attack
 
Datasploit - An Open Source Intelligence Tool
Datasploit - An Open Source Intelligence ToolDatasploit - An Open Source Intelligence Tool
Datasploit - An Open Source Intelligence Tool
 
Osint ashish mistry
Osint ashish mistryOsint ashish mistry
Osint ashish mistry
 
Hacker tooltalk: Social Engineering Toolkit (SET)
Hacker tooltalk: Social Engineering Toolkit (SET)Hacker tooltalk: Social Engineering Toolkit (SET)
Hacker tooltalk: Social Engineering Toolkit (SET)
 
Presentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human HackingPresentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human Hacking
 
OSINT for Attack and Defense
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and Defense
 
Social Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
Social Engineering: The Human Element of Sourcing and Recruiting | Glen CatheySocial Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
Social Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
 

Similar to Social Engineering: "The Cyber-Con"

Information security threats
Information security threatsInformation security threats
Information security threats
complianceonline123
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
Russell Publishing
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
prosunghosh7
 
Article1DISCUSSION_1Information security within an organi
Article1DISCUSSION_1Information security within an organiArticle1DISCUSSION_1Information security within an organi
Article1DISCUSSION_1Information security within an organi
mallisonshavon
 

Similar to Social Engineering: "The Cyber-Con" (20)

Cyber security.docx
Cyber security.docxCyber security.docx
Cyber security.docx
 
Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015
 
Information security threats
Information security threatsInformation security threats
Information security threats
 
Application security meetup data privacy_27052021
Application security meetup data privacy_27052021Application security meetup data privacy_27052021
Application security meetup data privacy_27052021
 
- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf
 
Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
Facts About Social Engineering Services - Aardwolf Security
Facts About Social Engineering Services - Aardwolf SecurityFacts About Social Engineering Services - Aardwolf Security
Facts About Social Engineering Services - Aardwolf Security
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
 
social engineering attacks.docx
social engineering attacks.docxsocial engineering attacks.docx
social engineering attacks.docx
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Article1DISCUSSION_1Information security within an organi
Article1DISCUSSION_1Information security within an organiArticle1DISCUSSION_1Information security within an organi
Article1DISCUSSION_1Information security within an organi
 
Infographic - What is Vishing?
Infographic - What is Vishing?Infographic - What is Vishing?
Infographic - What is Vishing?
 
The Inside Job: Detecting, Preventing and Investigating Data Theft
The Inside Job: Detecting, Preventing and Investigating Data TheftThe Inside Job: Detecting, Preventing and Investigating Data Theft
The Inside Job: Detecting, Preventing and Investigating Data Theft
 
Mobile security
Mobile securityMobile security
Mobile security
 
Cyber_security_.pdf
Cyber_security_.pdfCyber_security_.pdf
Cyber_security_.pdf
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Monitoring, Detecting And Preventing Insider Fraud And Abuse V2
Monitoring, Detecting And Preventing Insider Fraud And Abuse V2Monitoring, Detecting And Preventing Insider Fraud And Abuse V2
Monitoring, Detecting And Preventing Insider Fraud And Abuse V2
 
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
 

Social Engineering: "The Cyber-Con"