Social Engineering

594 views

Published on

MIS Project For Dr. Mohammad

Published in: Technology, News & Politics
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
594
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
13
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Social Engineering

  1. 1. Used social engineering sometimes withinthe fraud the Internet to achieve theintended purpose of the victim, where theprimary purpose of social engineering isto ask simple questions or trivial )byphone or e-mail with the impersonate anauthority or of the work allows him toask such questions without raising.)suspicion
  2. 2. The advantages of knowing how socialengineering techniques are effective :include• prevents unauthorized access from occurring• prevents possible information theft• prevents the possibility of downloading malicious software on unsuspecting user systems• preserves the integrity of information systems
  3. 3. The disadvantages of being uninformedwith respect to social engineering:techniques include • possible data theft )bank account numbers, social security numbers, user IDs/passwords, etc.) • possible identity theft • possible corruption of data • possible unplanned system downtime • possible )physical) security threat

×