Social engineering involves deceiving people into providing private information through manipulation. Common social engineering attacks include phishing scams by email or phone that try to steal login credentials. Other methods are shoulder surfing to see passwords, dumpster diving to find sensitive trash, and tailgating to access restricted areas. Social engineering works because people are inclined to trust authority, follow social proof, reciprocate kindness, and make decisions based on scarcity and distractions. Protecting against social engineering requires vigilance, secure disposal of documents, awareness of manipulation tactics, and escalating any suspicious requests for information.
What is Social Engineering? An illustrated presentation.Pratum
Social engineering relies profoundly on human interaction and often involves the misleading of employees into violating their organization’s security procedures. Humans are naturally helpful, but when it comes to protecting an organization’s security, being helpful to an outsider can do more harm than good.
These slides discuss social engineering, the most common attack methods, and the best means for defending against a social engineering attack.
For more helpful cyber security blog articles, visit www.integritysrc.com/blog.
Presentation of Social Engineering - The Art of Human Hackingmsaksida
Nowadays if you want to hack a corporation or damage a personal "enemy" fast, Social Engineering techniques work every time and more often than not it works the first time. Within the presentation you will be able to learn what social engineering is, types of social engineering and related threats.
Learn what is social engineering attack. It includes the social engineering techniques like shoulder surfing, eavesdropping, baiting, Tailgating, phishing, spear phishing and pretexting.
Social Engineering - Human aspects of industrial and economic espionageMarin Ivezic
Social engineering is not just a supporting process to obtain system access; it could be the main attack. Organizations that focus only on a narrow definition of social engineering as an attack vector to obtain system access will fail to create awareness of all other possible social engineering attack methods.
What is Social Engineering? An illustrated presentation.Pratum
Social engineering relies profoundly on human interaction and often involves the misleading of employees into violating their organization’s security procedures. Humans are naturally helpful, but when it comes to protecting an organization’s security, being helpful to an outsider can do more harm than good.
These slides discuss social engineering, the most common attack methods, and the best means for defending against a social engineering attack.
For more helpful cyber security blog articles, visit www.integritysrc.com/blog.
Presentation of Social Engineering - The Art of Human Hackingmsaksida
Nowadays if you want to hack a corporation or damage a personal "enemy" fast, Social Engineering techniques work every time and more often than not it works the first time. Within the presentation you will be able to learn what social engineering is, types of social engineering and related threats.
Learn what is social engineering attack. It includes the social engineering techniques like shoulder surfing, eavesdropping, baiting, Tailgating, phishing, spear phishing and pretexting.
Social Engineering - Human aspects of industrial and economic espionageMarin Ivezic
Social engineering is not just a supporting process to obtain system access; it could be the main attack. Organizations that focus only on a narrow definition of social engineering as an attack vector to obtain system access will fail to create awareness of all other possible social engineering attack methods.
Attacker uses human interaction to obtain or compromise information.Attacker my appear unassuming or respectable
Pretend to be a new employee, repair man,
May even offer credentials.
By:Maulik Kotak
Social Engineering - Human aspects of grey and black competitive intelligence. What is social engineering? How it is used in the context of competitive intelligence and industrial espionage? How to recognize HUMINT / social engineering attacks? Which governments are known to use it?
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...Okan YILDIZ
Smishing and vishing are phishing attacks that lure victims via SMS messages and voice calls. Both rely on the same emotional appeals employed in traditional phishing scams and are designed to drive you into urgent action. The difference is the delivery method.
“Cyberthieves can apply manipulation techniques to many forms of communication because the underlying principles remain constant,” explains security awareness leader Stu Sjouwerman, CEO of KnowBe4. “Lure victims with bait and then catch them with hooks.”
Companies are generally very good at protecting themselves against external attacks, but only rarely do they guard themselves against internal attacks. By using what’s known as ‘Social Engineering’, hackers exploit unsuspecting people who in good faith open up their doors to unwanted strangers.
Social engineering, or SE, is the art of manipulating people into performing actions or so they give up confidential information. Social Engineering can mean different things to different people.
Social Engineering as the Art of "Human OS" hacking
Main points of the presentation (1) Overall introduction on social engineering (2) Case studies (3) Defending against Social Engineering.
for: http://armsec.org/
Internet 2.0 Conference Reviews On Social Engineering Scams & Frauds.pptxInternet 2Conf
This presentation by the Internet 2.0 Conference reviews the social engineering scams or frauds and tricks cyber criminals use to get people's personal information.
Attacker uses human interaction to obtain or compromise information.Attacker my appear unassuming or respectable
Pretend to be a new employee, repair man,
May even offer credentials.
By:Maulik Kotak
Social Engineering - Human aspects of grey and black competitive intelligence. What is social engineering? How it is used in the context of competitive intelligence and industrial espionage? How to recognize HUMINT / social engineering attacks? Which governments are known to use it?
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...Okan YILDIZ
Smishing and vishing are phishing attacks that lure victims via SMS messages and voice calls. Both rely on the same emotional appeals employed in traditional phishing scams and are designed to drive you into urgent action. The difference is the delivery method.
“Cyberthieves can apply manipulation techniques to many forms of communication because the underlying principles remain constant,” explains security awareness leader Stu Sjouwerman, CEO of KnowBe4. “Lure victims with bait and then catch them with hooks.”
Companies are generally very good at protecting themselves against external attacks, but only rarely do they guard themselves against internal attacks. By using what’s known as ‘Social Engineering’, hackers exploit unsuspecting people who in good faith open up their doors to unwanted strangers.
Social engineering, or SE, is the art of manipulating people into performing actions or so they give up confidential information. Social Engineering can mean different things to different people.
Social Engineering as the Art of "Human OS" hacking
Main points of the presentation (1) Overall introduction on social engineering (2) Case studies (3) Defending against Social Engineering.
for: http://armsec.org/
Internet 2.0 Conference Reviews On Social Engineering Scams & Frauds.pptxInternet 2Conf
This presentation by the Internet 2.0 Conference reviews the social engineering scams or frauds and tricks cyber criminals use to get people's personal information.
Social engineering is the practice of obtaining confidential information by manipulation of legitimate users. A social engineer will commonly use the telephone or internet to trick a person into revealing sensitive information or getting them to do something that is against typical policies.
This presentation for discuss the various laws related to computer crime. That is important information that
technical people probably know little about, and of which even law-enforcement
officers may need more in-depth knowledge, but in which most attorneys would
already be well versed. If any aspect of your work brings you into contact with
computer crime, then this book is for you. It is also appropriate for college
courses on computer crime.
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2Conf
The presentation on phishing scam offenses by Internet 2.0 Conference offers a comprehensive overview of this prevalent form of cybercrime. It covers the nature of phishing scams, various types including spear phishing, whaling, smishing, and vishing, and highlights legit ways of avoiding such scams.
In a world so connected, cyber security awareness is key to a safe online experience, because the weakest information security link to any organisation is the users of technology. This presentation speaks to basic cyber security awareness for everyday internet users
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
2. Social engineering is the process of deceiving
people into giving confidential, private and or
privileged information to unauthorized people.
Apart from breaching confidentiality, social
engineering compromises data integrity and
its availability.
3. What are the common types of
SOCIAL ENGINEERING attacks?
4. D E C E P T I V E P H I S H I N G
Fraudsters impersonate a legitimate company in
an attempt to steal people’s personal data or
login credentials. Those emails frequently use
threats and a sense of urgency to scare users
into doing what the attackers want.
S P E A R P H I S H I N G
Fraudsters customize their attack emails with
the target’s name, position, company, work
phone number and other information in an
attempt to trick the recipient into believing that
they have a connection with the sender. The
goal is the same as deceptive phishing, even so:
trick the victim into clicking on a malicious URL
or email attachment so that they will hand over
their personal data.
S H O U L D E R S U R F I N G
The practice of spying on the user of an ATM,
computer, or other electronic device in order
to obtain their personal access information.
D U M P S T E R D I V I N G
This is the process of searching trash to obtain useful information about a
person/business. Dumpster divers will be looking for the following:
• Email address/address
• Phone numbers to carry out Vishing
• Passwords and other social security numbers that might have been
written on sticky notes for convenience
• Bank statements/financial statements
• Medical records
• Important documents
• Account login credentials
• Business secrets and marketing secrets
• Information of the employees
• Information about the software, tools, or technologies that is being
used at the company
V I S H I N G
This type of phishing attack dispenses with sending out an email and
instead goes for placing a phone call.
THE DI FFERENT FORMS OF PHI SHING
5. W A T E R H O L I N G
Watering hole attacks are used to distribute malware onto
victims’ computers in a similar way phishing activities are
conducted. Cybercriminals infect popular websites with
malware, and anyone who has had the misfortune to visit have
their computers automatically loaded with malware.
The malware used in these attacks usually collects the target’s
personal information and sends it back to the hacker’s server.
In extreme cases, the hacker will actively take control of the
infected computer.
C E O F R A U D
In these scams, fraudsters try to harpoon an
executive and steal their login details.
P H A R M I N G
This method of phishing uses a cache poisoning
attack which allows attackers to redirect users from a
valid website to a malicious website. Under this kind
of attack, a pharmer targets a DNS server and
changes the IP address associated with an
alphabetical website name. That means an attacker
can redirect users to a malicious website of their
choice. That’s the case even if the victim enters the
correct site name.
R E V E R S E S O C I A L E N G I N E E R I N G
In a reverse social engineering attack, the attacker does not
initiate contact with the victim. Rather, the victim is tricked
into contacting the attacker herself. As a result, a high degree
of trust is established between the victim and the attacker as
the victim is the entity that established the relationship.
7. Ta i l g a t i n g involves an attacker
seeking entry to a restricted area that lacks
the proper authentication.
Example: An attacker who does not have an
ID or badge can simply walk in behind a
person who is authorized to access the area.
B a i t i n g occurs when attackers use a
false promise to pique a victim’s greed or
curiosity. They lure users into a trap that steals
their personal information or inflicts their
systems with malware.
Example: Malware-infected flash drives that
look authentic, labelled as the company's
payroll list
A d v a n c e d P e r s i s t e n t
T h r e a t is an advanced persistent threat
is an attack in which an unauthorized user
gains access to a system or network and
remains there for an extended period of
time without being detected.
The goal of APT is to spy, obtain financial
gain, perpetrate hacktivism, and to destruct.
8. Why and how is social engineering effective?
People value authority, social proof, similarities,
and reciprocity. Also, social engineers are skilled
in using scarcity and deception to malign
others.
9. SOCIAL ENGINEERING
is effective because of:
Authority
Society trains people not to question authority and majority
of the public has the tendency to follow blindly.
Social Poof
People let their guard and suspicion down when everyone
else appears to share the same behaviors and risks. In this
way, they will not be held solely responsible for their actions.
Liking, Similarity & Deception
People prefer to abide to whom (they think) they know or
like, or to whom they are similar to or familiar with, as well
as attracted to.
Jam Rivera
10. Commitment, Reciprocation & Consistency
People feel more confident in their decision once they
commit (publicly) to a specific action. They have the
tendency to want to follow it through until the end. The
majority is also inclined to believe what others say, especially
when it comes to needing something from them. When
people are given kindness to, there is also a natural response
to want to return the favor.
Distraction
People tend to focus their attention on what they can gain,
what they need, what they can lose. what they might miss
out on. These distractions can heighten people’s emotional
state and make them forget other logical facts to consider
when making decisions.
Scarcity
Perceived scarcity will generate demand.
Jam Rivera
12. Social engineers
usually go through a
4-STEP ATTACK CYCLE:
Information gathering
In this step, the attacker
gathers as much data about
the target victim. Social
media is a frequent source of
information.
Engaging with victim
After gathering enough information,
the attacker will begin to start
conversations with the target.
The goal of this step is to
gain trust to obtain
any missing data
required to
fulfill the goal.
Jam Rivera
13. Closing the interaction
During this step, the attacker will spend more
time masquerading the attack and the proceeds
of it. Less to nil time will be spent engaging with
the victim. If the attacker leaves the
communication open, the only purpose is for
the attack to reoccur. Sometimes the entire
social engineering cycle has been completed
without the victim knowing.
Attacking
By the time the attacker has enough data through research
and conversations with the target, the
attack will commence.
14. How do you protect your data against
social engineering attacks?
15. BEST PRACTICES AGAINST
SOCIAL ENGINEERING
Phishing
Recognize the refusal to give contact information,
rushing, namedropping, intimidation, small mistakes
(misspellings, misnomers, odd questions), and
requesting forbidden information. “Look for things that
don’t quite add up.” Escalate any suspicions around
phishing.
Common ways to detect phishing emails:
• A mismatched URL
• URLs with a misleading domain name
• Poor spellings and grammatical error
• Asking for sensitive information
• Too good to be true message
• Surprise lottery!
• Asking to send money to cover for
medical expenses
• Unrealistic threats
• From a government agency
Jam Rivera
16. Shoulder Surfing
• Angle your computer or cell phone screen so that
other people cannot see what you are typing
• Use a privacy screen to make your screen less
visible to others
• If possible, sit or stand with your back to a wall
when entering a password on a device in public
• Stand in a quiet spot away from a crowd of
people
• Try to avoid opening personal accounts in public
• Shield forms from viewing when filling out
paperwork in public
• Use strong passwords to make it more difficult
for someone to try and guess what
you typed
• As always, remember to lock your
computer or device when you leave
your desk
Jam Rivera
17. Dumpster Diving
o Limit social sharing
o Safely dispose and put away any documents
containing the following information:
• Pre-approved credit card offers
• Street address
• Social Security number
• Telephone number
• Email address
• Bank account information
• Employment history
• Other personal information
Jam Rivera
18. Waterholing
• Remove or disable
software vulnerable to
watering hole attacks.
• Have a malware-
protection system
Baiting
Only rely on flash drives
you know and trust.
Jam Rivera
19. Tailgating
• Lock your system and other devices
while leaving the work station
• Do not let unknown people enter
restricted premises of office unless
they have appropriate credentials or
authority of access
• Never help strangers access a secured
location when they ask to open the
door or are from delivery services
• Always keep your access identity card
with you while you are on the
premises; keep it secure from being
misused by unauthorized employees
Jam Rivera
20. Here’s some of the most prominent
social engineering attacks recently:
21. Sony Pictures
On Monday, November 24, 2014, many of Sony
Picture’s employees began to see skulls appearing
on their computer screens with software rendering
their machines inoperable. This social engineering
attack lead to the leaking of unreleased films to
social media with theaters opting not to screen
these movies anymore. The effect of this hacking
also revealed that many female actors were paid less
than their male counterparts. In addition, personal
information about employees were leaked, including
information about their families, inter-office e-mails,
salary, and more.
22. Toyota
Toyota Boshoku Corporation, an auto
parts supplier, was the victim of a social
engineering and BEC (Business Email
Compromise) attack in 2019.
The money lost amounts to USD 37
million due to fraudulent bank
transfer instructions that
someone in the company
took as legitimate.
Attackers successfully
persuaded a finance
executive to change the
recipient's bank account
information before a
wire transfer.
23. What impact does social engineering have
towards:
a. The public
b. The businesses
c. The government
d. The economies
25. People are more likely to respond to the effects
of a cyberattack rather than the attack itself. One
example of this is a cyber-attack where malware
infects a national power station causing the
hundreds of thousands of citizens to be without
power.
The general public can be affected socially and
psychologically by the incident.
The social impact of a cyber-attack refers to
aspects such as the social disruption
caused to people’s daily lives,
and widespread issues such as
anxiety or loss of confidence
in cyber or technology.
Psychological impact can be informed
by social impact, and can include
more personal aspects such as an
individual’s anxiety, worry, anger,
outrage, depression and so on.
Jam Rivera
28. The cybercrime industry generated at least $1.5
trillion in revenue in 2018, which massively affects
economies all over the world.
The U.S. President’s proposed FY 2020 budget
requests more than $17 billion for cybersecurity and
cyber operations
On May 28, 2020––in a single day, there were
49,127,689 cyber attacks worldwide which equates to
568 cyber attacks occurring every second!
Social media contributes to the sale of stolen
personal data in an underground economy that’s
now worth about $630 million per year.
In average, 300,000 cybercrime-related complaints
are received each year by the FBI -that’s an average
of more than 800 complaints per day.
Jam Rivera
29. Being affected by social engineering is costly
and inconvenient. Knowing how to protect
information and how to escalate concerns go a
long way.
Jam Rivera
Photos are from pixabay.com and unsplash.com. Icons from flaticons.com.
Principles of Persuasion in Social Engineering
Stajano, F., Wilson, P.: Understanding scam victims: seven principles for systems security. Commun. ACM 54(3), 70–75 (2011)
Principles of Persuasion in Social Engineering
Stajano, F., Wilson, P.: Understanding scam victims: seven principles for systems security. Commun. ACM 54(3), 70–75 (2011)
Photos are from pixabay.com and unsplash.com. Icons from flaticons.com.
Icons made by <a href="https://www.flaticon.com/authors/freepik" title="Freepik">Freepik</a> from <a href="https://www.flaticon.com/" title="Flaticon"> www.flaticon.com</a>
Icons made by <a href="https://www.flaticon.com/authors/itim2101" title="itim2101">itim2101</a> from <a href="https://www.flaticon.com/" title="Flaticon"> www.flaticon.com</a>
Icons made by <a href="https://www.flaticon.com/authors/freepik" title="Freepik">Freepik</a> from <a href="https://www.flaticon.com/" title="Flaticon"> www.flaticon.com</a>
Icons made by <a href="https://www.flaticon.com/authors/freepik" title="Freepik">Freepik</a> from <a href="https://www.flaticon.com/" title="Flaticon"> www.flaticon.com</a>
Icons made by <a href="https://www.flaticon.com/authors/freepik" title="Freepik">Freepik</a> from <a href="https://www.flaticon.com/" title="Flaticon"> www.flaticon.com</a>