SlideShare a Scribd company logo
1 of 21
Social Engineering
BY SMITHA
What is Social Engineer?
• Social engineering is the act of manipulating a
person to take an action that may or may not
be in the “target’s” best interest.
Why hacker use Social Engineering?
• Least Resistance
• 10 time more successful than other attacks
• A common element of malicious Attackers
Typical goals
• Money
• Ego
• Revenge
• Cause
• Entertainment
• Knowledge
Common Attacks
• Customer Service
• Delivery Person
• Phone
• Tech Support
Social Engineering methods
• Dumpster Diving
• Shoulder surfing
• Baiting
• Vishing
• Phishing
• Whaling
Dumpster Diving
Dumpster Diving
• “Dumpster diving” means searching trash for
useful information. The trash may be in a public
dumpster or in a restricted area requiring
unauthorized entry. Dumpster diving depends on
a human weakness: the lack of security
knowledge. Many things can be found dumpster
diving (e.g., CDs, DVDs, hard drives, company
directories, and so forth). Probably the most
famous example of dumpster diving
Dumpster Diving
• Credit Card Receipts.
• Bills.
• Printed Email.
• Password.
• Phone Number.
• Names.
• Printed Emails.
• Expense Reports.
Shoulder Surfing
• A shoulder surfing attack explains a situation
when the attacker can physically view the devices
screens and the password typing keypad to
obtain personal information i.e. one of the group
of attack methods requires the hacker (attacker)
to be physically close to the victims for the attack
to succeed and thus a few shoulder surfing
attacks will occur with intruders virus malicious
intentions or virus malware accessing it. Some
similar might result from nosy to people, where it
is more an invasion of our privacy.
Shoulder surfing
Examples
Baiting
• As mentioned above, baiting is a kind of attack where a
social engineer will use a false promise or reward to
trap victims and steal their sensitive information by
infecting their systems with malware. Baits are very
attractive and enticing, not to mention manipulative,
and their end goal is to infect your system and gain
access to personal information.
• Attackers who practice baiting use physical devices and
enticing offers that appeal to people’s curiosity or need
to trap them and get what they want from their
victims. In many ways, baiting is similar to phishing
attacks, but overall, it’s different from most social
engineering attacks. Why? Because these attacks offer
something free that’s relevant to the target.
Baiting
Examples:
Phishing
• Phishing is a form of social engineering where
attackers deceive people into revealing sensitive
information or installing malware such as
ransomware.
Types of Phishing:
• Spear Phishing.
• Whaling.
• Vishing.
• Email Phishing-General.
Spear Phishing
• Spear phishing is an email or electronic
communications scam targeted towards a specific
individual, organization or business.
Spear Phishing
Example:
Whaling
• A whaling attack, also known as whaling
phishing or a whaling phishing attack, is a
specific type of phishing attack that targets
high-profile employees, such as the chief
executive officer or chief financial officer, in
order to steal sensitive information from a
company.
Whaling
Example:
WHAT IS VISHING?
• Vishing is a cyber crime that uses the phone to
steal personal confidential information from
victims. Often referred to as voice phishing.
Smishing
• Smishing is a type of
phishing attack that uses
social engineering to get
personal information
about someone using
text messaging.
How Zoom is being exploited for
phishing attacks
• Creating a Zoom phishing email
• Sending fake Zoom meeting to victim
• Victim clicks on Zoom meeting phishing link
• Malicious code is loaded in the victims system.
Social Engineering new.pptx

More Related Content

What's hot

Social Engineering and What to do About it
Social Engineering and What to do About itSocial Engineering and What to do About it
Social Engineering and What to do About itAleksandr Yampolskiy
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness TrainingDave Monahan
 
Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?JamRivera1
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.Pratum
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
Social engineering
Social engineeringSocial engineering
Social engineeringVishal Kumar
 
Information Security Awareness for everyone
Information Security Awareness for everyoneInformation Security Awareness for everyone
Information Security Awareness for everyoneYasir Nafees
 
Social engineering
Social engineeringSocial engineering
Social engineeringRobert Hood
 
Social Engineering Attacks & Principles
Social Engineering Attacks & PrinciplesSocial Engineering Attacks & Principles
Social Engineering Attacks & PrinciplesLearningwithRayYT
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxDinesh582831
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
Social engineering hacking attack
Social engineering hacking attackSocial engineering hacking attack
Social engineering hacking attackPankaj Dubey
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
 
Cyber security
Cyber securityCyber security
Cyber securitySabir Raja
 

What's hot (20)

Social Engineering and What to do About it
Social Engineering and What to do About itSocial Engineering and What to do About it
Social Engineering and What to do About it
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?
 
Social engineering
Social engineering Social engineering
Social engineering
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Information Security Awareness for everyone
Information Security Awareness for everyoneInformation Security Awareness for everyone
Information Security Awareness for everyone
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Social Engineering Attacks & Principles
Social Engineering Attacks & PrinciplesSocial Engineering Attacks & Principles
Social Engineering Attacks & Principles
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Social engineering hacking attack
Social engineering hacking attackSocial engineering hacking attack
Social engineering hacking attack
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Information security awareness, middle management
Information security awareness, middle managementInformation security awareness, middle management
Information security awareness, middle management
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar to Social Engineering new.pptx

Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorJames Krusic
 
- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdfRamya Nellutla
 
Introduction to Social engineering | Techniques of Social engineering
Introduction to Social engineering | Techniques of Social engineeringIntroduction to Social engineering | Techniques of Social engineering
Introduction to Social engineering | Techniques of Social engineeringPrem Lamsal
 
The Insider Threat January.pptx
The Insider Threat January.pptxThe Insider Threat January.pptx
The Insider Threat January.pptxBertrandRussell6
 
Unit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesUnit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesArnav Chowdhury
 
Counterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptxCounterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptxZakiAhmed70
 
Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)Marta Barrio Marcos
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering OWASP Foundation
 
What is social engineering.pdf
What is social engineering.pdfWhat is social engineering.pdf
What is social engineering.pdfuzair
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptCakraWicaksono3
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptpixvilx
 
Cyber Security Motivation
Cyber Security MotivationCyber Security Motivation
Cyber Security MotivationSuman Thapaliya
 
Types of Social engineering
Types of Social engineeringTypes of Social engineering
Types of Social engineeringRiddhi Sood
 
Using Social Media for Security Monitoring
Using Social Media for Security MonitoringUsing Social Media for Security Monitoring
Using Social Media for Security MonitoringSysomos
 
Social Engineering, or hacking people
Social Engineering, or hacking peopleSocial Engineering, or hacking people
Social Engineering, or hacking peopleTudor Damian
 
Spear Phishing Attacks
Spear Phishing AttacksSpear Phishing Attacks
Spear Phishing AttacksIsaacDavid27
 
Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"abercius24
 

Similar to Social Engineering new.pptx (20)

Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human Behavior
 
- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf
 
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
PACE-IT, Security+3.3: Summary of Social Engineering AttacksPACE-IT, Security+3.3: Summary of Social Engineering Attacks
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
 
Introduction to Social engineering | Techniques of Social engineering
Introduction to Social engineering | Techniques of Social engineeringIntroduction to Social engineering | Techniques of Social engineering
Introduction to Social engineering | Techniques of Social engineering
 
Social Engineering.pdf
Social Engineering.pdfSocial Engineering.pdf
Social Engineering.pdf
 
The Insider Threat January.pptx
The Insider Threat January.pptxThe Insider Threat January.pptx
The Insider Threat January.pptx
 
Unit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesUnit iii: Common Hacking Techniques
Unit iii: Common Hacking Techniques
 
Counterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptxCounterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptx
 
Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering
 
What is social engineering.pdf
What is social engineering.pdfWhat is social engineering.pdf
What is social engineering.pdf
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
 
Cyber Security Motivation
Cyber Security MotivationCyber Security Motivation
Cyber Security Motivation
 
Types of Social engineering
Types of Social engineeringTypes of Social engineering
Types of Social engineering
 
Using Social Media for Security Monitoring
Using Social Media for Security MonitoringUsing Social Media for Security Monitoring
Using Social Media for Security Monitoring
 
Social Engineering, or hacking people
Social Engineering, or hacking peopleSocial Engineering, or hacking people
Social Engineering, or hacking people
 
Spear Phishing Attacks
Spear Phishing AttacksSpear Phishing Attacks
Spear Phishing Attacks
 
Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"
 
edu 3 ppt.pptx
edu 3 ppt.pptxedu 3 ppt.pptx
edu 3 ppt.pptx
 

More from Santhosh Prabhu

data_analysis_step_by_step_booklet.pdf
data_analysis_step_by_step_booklet.pdfdata_analysis_step_by_step_booklet.pdf
data_analysis_step_by_step_booklet.pdfSanthosh Prabhu
 
Wiley_Excel_Pivot_Tables_and_Charts.pdf
Wiley_Excel_Pivot_Tables_and_Charts.pdfWiley_Excel_Pivot_Tables_and_Charts.pdf
Wiley_Excel_Pivot_Tables_and_Charts.pdfSanthosh Prabhu
 
Predictive marketing _ easy ways every marketer can use customer analytics an...
Predictive marketing _ easy ways every marketer can use customer analytics an...Predictive marketing _ easy ways every marketer can use customer analytics an...
Predictive marketing _ easy ways every marketer can use customer analytics an...Santhosh Prabhu
 
Predictive HR Analytics_ Mastering the HR Metric ( PDFDrive ).pdf
Predictive HR Analytics_ Mastering the HR Metric ( PDFDrive ).pdfPredictive HR Analytics_ Mastering the HR Metric ( PDFDrive ).pdf
Predictive HR Analytics_ Mastering the HR Metric ( PDFDrive ).pdfSanthosh Prabhu
 
DMBAR - Data Mining and Business Analytics with R - Johannes Ledolter.pdf
DMBAR - Data Mining and Business Analytics with R - Johannes Ledolter.pdfDMBAR - Data Mining and Business Analytics with R - Johannes Ledolter.pdf
DMBAR - Data Mining and Business Analytics with R - Johannes Ledolter.pdfSanthosh Prabhu
 
Concept of training.pptx
Concept of training.pptxConcept of training.pptx
Concept of training.pptxSanthosh Prabhu
 
Data Encryption Standards (1).pptx
Data Encryption Standards (1).pptxData Encryption Standards (1).pptx
Data Encryption Standards (1).pptxSanthosh Prabhu
 
methodsofdatacollectione.pptx
methodsofdatacollectione.pptxmethodsofdatacollectione.pptx
methodsofdatacollectione.pptxSanthosh Prabhu
 

More from Santhosh Prabhu (11)

data_analysis_step_by_step_booklet.pdf
data_analysis_step_by_step_booklet.pdfdata_analysis_step_by_step_booklet.pdf
data_analysis_step_by_step_booklet.pdf
 
DataAnalysis.pdf
DataAnalysis.pdfDataAnalysis.pdf
DataAnalysis.pdf
 
Wiley_Excel_Pivot_Tables_and_Charts.pdf
Wiley_Excel_Pivot_Tables_and_Charts.pdfWiley_Excel_Pivot_Tables_and_Charts.pdf
Wiley_Excel_Pivot_Tables_and_Charts.pdf
 
Predictive marketing _ easy ways every marketer can use customer analytics an...
Predictive marketing _ easy ways every marketer can use customer analytics an...Predictive marketing _ easy ways every marketer can use customer analytics an...
Predictive marketing _ easy ways every marketer can use customer analytics an...
 
Predictive HR Analytics_ Mastering the HR Metric ( PDFDrive ).pdf
Predictive HR Analytics_ Mastering the HR Metric ( PDFDrive ).pdfPredictive HR Analytics_ Mastering the HR Metric ( PDFDrive ).pdf
Predictive HR Analytics_ Mastering the HR Metric ( PDFDrive ).pdf
 
DMBAR - Data Mining and Business Analytics with R - Johannes Ledolter.pdf
DMBAR - Data Mining and Business Analytics with R - Johannes Ledolter.pdfDMBAR - Data Mining and Business Analytics with R - Johannes Ledolter.pdf
DMBAR - Data Mining and Business Analytics with R - Johannes Ledolter.pdf
 
hrtdtna.pptx
hrtdtna.pptxhrtdtna.pptx
hrtdtna.pptx
 
Concept of training.pptx
Concept of training.pptxConcept of training.pptx
Concept of training.pptx
 
Data Encryption Standards (1).pptx
Data Encryption Standards (1).pptxData Encryption Standards (1).pptx
Data Encryption Standards (1).pptx
 
methodsofdatacollectione.pptx
methodsofdatacollectione.pptxmethodsofdatacollectione.pptx
methodsofdatacollectione.pptx
 
Decision Making.pptx
Decision Making.pptxDecision Making.pptx
Decision Making.pptx
 

Recently uploaded

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Recently uploaded (20)

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 

Social Engineering new.pptx

  • 2. What is Social Engineer? • Social engineering is the act of manipulating a person to take an action that may or may not be in the “target’s” best interest.
  • 3. Why hacker use Social Engineering? • Least Resistance • 10 time more successful than other attacks • A common element of malicious Attackers
  • 4. Typical goals • Money • Ego • Revenge • Cause • Entertainment • Knowledge
  • 5. Common Attacks • Customer Service • Delivery Person • Phone • Tech Support
  • 6. Social Engineering methods • Dumpster Diving • Shoulder surfing • Baiting • Vishing • Phishing • Whaling
  • 7. Dumpster Diving Dumpster Diving • “Dumpster diving” means searching trash for useful information. The trash may be in a public dumpster or in a restricted area requiring unauthorized entry. Dumpster diving depends on a human weakness: the lack of security knowledge. Many things can be found dumpster diving (e.g., CDs, DVDs, hard drives, company directories, and so forth). Probably the most famous example of dumpster diving
  • 8. Dumpster Diving • Credit Card Receipts. • Bills. • Printed Email. • Password. • Phone Number. • Names. • Printed Emails. • Expense Reports.
  • 9. Shoulder Surfing • A shoulder surfing attack explains a situation when the attacker can physically view the devices screens and the password typing keypad to obtain personal information i.e. one of the group of attack methods requires the hacker (attacker) to be physically close to the victims for the attack to succeed and thus a few shoulder surfing attacks will occur with intruders virus malicious intentions or virus malware accessing it. Some similar might result from nosy to people, where it is more an invasion of our privacy.
  • 11. Baiting • As mentioned above, baiting is a kind of attack where a social engineer will use a false promise or reward to trap victims and steal their sensitive information by infecting their systems with malware. Baits are very attractive and enticing, not to mention manipulative, and their end goal is to infect your system and gain access to personal information. • Attackers who practice baiting use physical devices and enticing offers that appeal to people’s curiosity or need to trap them and get what they want from their victims. In many ways, baiting is similar to phishing attacks, but overall, it’s different from most social engineering attacks. Why? Because these attacks offer something free that’s relevant to the target.
  • 13. Phishing • Phishing is a form of social engineering where attackers deceive people into revealing sensitive information or installing malware such as ransomware. Types of Phishing: • Spear Phishing. • Whaling. • Vishing. • Email Phishing-General.
  • 14. Spear Phishing • Spear phishing is an email or electronic communications scam targeted towards a specific individual, organization or business.
  • 16. Whaling • A whaling attack, also known as whaling phishing or a whaling phishing attack, is a specific type of phishing attack that targets high-profile employees, such as the chief executive officer or chief financial officer, in order to steal sensitive information from a company.
  • 18. WHAT IS VISHING? • Vishing is a cyber crime that uses the phone to steal personal confidential information from victims. Often referred to as voice phishing.
  • 19. Smishing • Smishing is a type of phishing attack that uses social engineering to get personal information about someone using text messaging.
  • 20. How Zoom is being exploited for phishing attacks • Creating a Zoom phishing email • Sending fake Zoom meeting to victim • Victim clicks on Zoom meeting phishing link • Malicious code is loaded in the victims system.