SlideShare a Scribd company logo
1 of 11
IT’S TIME FOR SOCIAL ENGINEERING by Rodion Baronov, ISCIS
[object Object]
Login: user Password: **** Information
EXPLOITATION THE OF TRUST
“ Seven Deadly Weaknesses” Human Weeknesses: Top 7
Sex Appeal Greed Trust Sloth Vanity Compassion
Personal Information Pretexting Phishing Diversion Baiting
 
 
Up-to-date Software Understanding Education Behaviour Minimize Attack Surface Social Engineering
THANKS FOR YOUR ATTENTION

More Related Content

Viewers also liked

Размышляешь ли ты о теле Господа
Размышляешь ли ты о теле ГосподаРазмышляешь ли ты о теле Господа
Размышляешь ли ты о теле ГосподаSergeyBRSA
 
Надеющиеся на Господа обновятся в силе
Надеющиеся на Господа обновятся в силеНадеющиеся на Господа обновятся в силе
Надеющиеся на Господа обновятся в силеSergeyBRSA
 
Cила цели
Cила целиCила цели
Cила целиSergeyBRSA
 
Apartments in Świnoujście
Apartments in ŚwinoujścieApartments in Świnoujście
Apartments in ŚwinoujścieCirko Norge
 
Где почтение ко мне
Где почтение ко мнеГде почтение ко мне
Где почтение ко мнеSergeyBRSA
 
Жизнь по Духу - здоровое тело
Жизнь по Духу -  здоровое телоЖизнь по Духу -  здоровое тело
Жизнь по Духу - здоровое телоSergeyBRSA
 
Церковь план Божий
Церковь план БожийЦерковь план Божий
Церковь план БожийSergeyBRSA
 

Viewers also liked (14)

Размышляешь ли ты о теле Господа
Размышляешь ли ты о теле ГосподаРазмышляешь ли ты о теле Господа
Размышляешь ли ты о теле Господа
 
Надеющиеся на Господа обновятся в силе
Надеющиеся на Господа обновятся в силеНадеющиеся на Господа обновятся в силе
Надеющиеся на Господа обновятся в силе
 
Cила цели
Cила целиCила цели
Cила цели
 
Apartments in Świnoujście
Apartments in ŚwinoujścieApartments in Świnoujście
Apartments in Świnoujście
 
Daycare
DaycareDaycare
Daycare
 
Thanksgiving
ThanksgivingThanksgiving
Thanksgiving
 
Где почтение ко мне
Где почтение ко мнеГде почтение ко мне
Где почтение ко мне
 
Жизнь по Духу - здоровое тело
Жизнь по Духу -  здоровое телоЖизнь по Духу -  здоровое тело
Жизнь по Духу - здоровое тело
 
Media evaluation
Media evaluationMedia evaluation
Media evaluation
 
Chapter ( 1 ) (4)
Chapter ( 1 ) (4)Chapter ( 1 ) (4)
Chapter ( 1 ) (4)
 
Церковь план Божий
Церковь план БожийЦерковь план Божий
Церковь план Божий
 
SE_KPI
SE_KPISE_KPI
SE_KPI
 
Volkswagen
VolkswagenVolkswagen
Volkswagen
 
Sheeshgar's
Sheeshgar'sSheeshgar's
Sheeshgar's
 

Recently uploaded

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 

Recently uploaded (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 

SE

Editor's Notes

  1. http://www.social-engineer.org
  2. social engineering A technique that defeats security precautions by exploiting human vulnerabilities. Social engineering scams can be both online (such as receiving email messages that ask the recipient to click the attachment, which is actually malware) and offline (such as receiving a phone call from someone posing as a representative from one’s credit card company). Regardless of the method selected, the purpose of a social engineering attack remains the same—to get the targeted user to perform an action of the attacker's choice
  3. Software Many social engineering attacks involve tricking the user into opening a malicious file or browsing to a malicious website that takes advantage of a code vulnerability. As the data presented in this report shows, in many cases these attacks use vulnerabilities for which a security update has already been made available—sometimes quite a while ago. One of the most important things you can do to blunt social engineering attacks is to keep software as up-to-date as possible. The Microsoft Security Update Guide, Second Edition, available from the Microsoft Download Center, provides guidance on how to deliver updates to your users in a timely and effective manner, in consideration of all of the other challenges in your IT environment.
  4. Types of SE Attacks
  5. Data Used To apply this taxonomy to infection data, Microsoft researchers analyzed infections reported by the Microsoft Malicious Software Removal Tool (MSRT) during the first half of 2011. The MSRT is a free tool that Microsoft designed to help identify and remove selected prevalent malware families from Windows– based computers. A new version of the MSRT is released each month and ® distributed through Windows Update, Microsoft Update, and the Microsoft Download Center. The MSRT was selected as the data source for this exercise for several reasons: ? The MSRT runs on more than 600 million individual computers around the world each month. ? The MSRT specifically targets malware families that present a severe risk to users or are particularly prevalent. ? MSRT data represents infected computers (as opposed to infection attempts that were blocked by real-time protection products). ? Installations of the MSRT are strongly correlated with usage of Windows Update and Microsoft Update, the tool’s primary distribution mechanisms, which helps provide a reasonably accurate picture of the risks faced by computers that likely apply regular security updates.
  6. Phishers have traditionally targeted financial sites more than other types of sites, but the largest share of phishing impressions in 1H11 was for sites that targeted social networks, reaching a high of 83.8 percent of impressions in April. Overall, impressions that targeted social networks accounted for 47.8 percent of all impressions in 1H11, followed by those that targeted financial institutions at 35.0 percent. ? By contrast, phishing sites that targeted financial institutions accounted for an average of 78.3 percent of active phishing sites tracked each month in 1H11, compared to just 5.4 percent for social networks. Financial institutions targeted by phishers can number in the hundreds, and customized phishing approaches are required for each one. The number of popular social networking sites is much smaller, so phishers who target social networks can effectively target many more people per site. Still, the potential for direct illicit access to victims’ bank accounts means that financial institutions remain perennially popular phishing targets, and they continue to receive the largest or second-largest number of impressions each month. ? This phenomenon also occurs on a smaller scale with online services and gaming sites. A small number of online services account for the majority of traffic to such sites, so phishing sites that targeted online services garnered 11.0 percent of impressions with just 3.6 percent of sites. Online gaming traffic tends to be spread out among a larger number of sites, so phishing sites that targeted online gaming destinations accounted for 8.9 percent of active sites but gained just 4.3 percent of impressions. ? Phishing sites that targeted e-commerce were responsible for just 3.8 percent of active sites and 1.9 percent of impressions, suggesting that phishers have not found e-commerce sites to be especially profitable targets.
  7. Advices (Methods) to prevent social Engineering Attacks