SlideShare a Scribd company logo
1 of 7
Phishing
1
Definition of Social
Engineering
Social engineering is the art of manipulating people to
disclose confidential information, perform actions, or
compromise security.
It involves psychological manipulation and technical
exploits.
Goals of Social Engineering
Obtain sensitive information (passwords, credit card
details, etc.)
Gain unauthorized access to systems or physical
spaces
Influence people's behavior to perform specific actions
Circumvent security measures and controls
Types of Social Engineering
Attacks
Phishing: Sending deceptive emails or messages to
trick recipients into revealing sensitive information.
Pretexting: Creating a false narrative or scenario to gain
someone's trust and extract information or access.
Baiting: Offering something enticing (e.g., USB drive, free
merchandise) to prompt a person to take an action that
compromises security.
Tailgating: Unauthorized entry to a restricted area by
following someone who has authorized access.
Impersonation: Pretending to be someone else, such as
a trusted authority figure, to gain trust and manipulate
individuals.
Phishing
91% of UK companies experienced at least one successful phishing attack in 2021
Phishing
When criminals use scam emails,
text messages (smishing) or
phone calls (vishing) to trick their
victim with the aim to make you
visit a website or open a file,
which may download a virus onto
your device or direct you to a
malicious website to steal your
personal details.
Don’t take the
bait
URGE
NT
DOES IT LOOK
LEGITIMATE?
REPORT
IT
Use your 'report
suspicious email'
button located at
the top of your
outlook window.
SPELLI
NG
MISTAK
ES
VAGU
E
FISHING THE
PHISH
Phishing CASES
A real-life demo of a phishing scam – this could be you!
FISHING THE
PHISH
2020: TWITTER In 2020, Twitter became the site of social engineering attacks where the
accounts of Barack Obama, Bill Gates, Elon Musk, and others were compromised to
solicit Bitcoins from their followers. The creators of the social engineering attack earned
nearly $120,000 in Bitcoin, but the greatest danger was the clear access the hackers
had to the celebrities' accounts, although supposedly no personal data was
compromised.
2016: Democratic Party The email hack of the US Democratic
Party during the presidential election campaign in 2016 is
one of the most emblematic social engineering attacks in recent memory.
Russian hackers launched a spear-phishing attack against Democratic Party leaders,
which allowed them to access sensitive campaign information and data from nearly
500,000 voters.
2019: Tinder Swindler The infamous "Tinder Swindler" has been around since 2011
and has deceived victims into financing a luxurious lifestyle through a series of
romantic scams. He used a combination of manipulation, love influence, and a lie as
an excuse, eventually stealing around $10 million in his last two years of social
engineering tricks. In 2019, he was convicted, and in 2022, the swindler himself fell
victim to a scam, losing nearly $7,000 of the money he had worked hard to earn
(through the scam).
2018: The Federal Police (PF) investigate the theft of computers from Petrobras
contained strategic information about oil exploration activities. According to PF
delegate Carla Dolinski in Macaé, the information was stored on four notebooks and
two hard drives belonging to the service provider company Halliburton, which were
stolen from a container transported from Santos to Macaé by the carrier Transmagno.
The shipment left Santos on January 18th and arrived in Macaé 12 days later. "On
January 31st, Halliburton employees noticed that the seal of the container had been
broken," the delegate said.).
Phishing
Best Practices for Personal
Security
• Protect personal information (e.g., avoid sharing sensitive details on social
media).
• Regularly update passwords and use strong, unique passwords for different
accounts.
• Enable two-factor authentication wherever possible.
• Be cautious when clicking on links or downloading attachments from unknown
or suspicious sources.
Conclusion
Social engineering attacks exploit human psychology and trust. By
understanding the techniques used in social engineering attacks, we can better
protect ourselves and our organizations.
Stay informed, stay
vigilant, and stay secure!
Phishing
A real-life demo of a phishing scam – this could be you!
FISHING THE
PHISH

More Related Content

Similar to Social Engineering - Enterprise Phishing.pptx

Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2Conf
 
Copyright patent& intellectual property
Copyright patent& intellectual propertyCopyright patent& intellectual property
Copyright patent& intellectual propertyCarlos Gonsalves
 
THE CHANGING FACE OF IDENTITY THEFT
THE CHANGING FACE OF IDENTITY THEFTTHE CHANGING FACE OF IDENTITY THEFT
THE CHANGING FACE OF IDENTITY THEFT- Mark - Fullbright
 
Identity Theft and Society: What's in it for me?
Identity Theft and Society: What's in it for me?Identity Theft and Society: What's in it for me?
Identity Theft and Society: What's in it for me?Robert Bromwich
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityMuhammad Hamza
 
Social Engineering by Riziq Ramadani
Social Engineering by Riziq RamadaniSocial Engineering by Riziq Ramadani
Social Engineering by Riziq RamadaniRiziqRamadani
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasuresJorge Sebastiao
 
Introduction-to-Cybercrime Investigation.pptx
Introduction-to-Cybercrime Investigation.pptxIntroduction-to-Cybercrime Investigation.pptx
Introduction-to-Cybercrime Investigation.pptxOlusegun Mosugu
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 

Similar to Social Engineering - Enterprise Phishing.pptx (20)

Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
 
Copyright patent& intellectual property
Copyright patent& intellectual propertyCopyright patent& intellectual property
Copyright patent& intellectual property
 
THE CHANGING FACE OF IDENTITY THEFT
THE CHANGING FACE OF IDENTITY THEFTTHE CHANGING FACE OF IDENTITY THEFT
THE CHANGING FACE OF IDENTITY THEFT
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Unit 1
Unit 1Unit 1
Unit 1
 
Identity Theft and Society: What's in it for me?
Identity Theft and Society: What's in it for me?Identity Theft and Society: What's in it for me?
Identity Theft and Society: What's in it for me?
 
Cybercriminals Are Lurking
Cybercriminals Are LurkingCybercriminals Are Lurking
Cybercriminals Are Lurking
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Social Engineering : To Err is Human...
Social Engineering : To Err is Human...Social Engineering : To Err is Human...
Social Engineering : To Err is Human...
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Social Engineering by Riziq Ramadani
Social Engineering by Riziq RamadaniSocial Engineering by Riziq Ramadani
Social Engineering by Riziq Ramadani
 
Cybercrime blog
Cybercrime blogCybercrime blog
Cybercrime blog
 
IT Sample Paper
IT Sample PaperIT Sample Paper
IT Sample Paper
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Introduction-to-Cybercrime Investigation.pptx
Introduction-to-Cybercrime Investigation.pptxIntroduction-to-Cybercrime Investigation.pptx
Introduction-to-Cybercrime Investigation.pptx
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Module vi mis
Module vi misModule vi mis
Module vi mis
 
Databreach forecast
Databreach forecastDatabreach forecast
Databreach forecast
 
Hack
HackHack
Hack
 

Recently uploaded

Conf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming PipelinesConf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming PipelinesTimothy Spann
 
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degreeyuu sss
 
Learn How Data Science Changes Our World
Learn How Data Science Changes Our WorldLearn How Data Science Changes Our World
Learn How Data Science Changes Our WorldEduminds Learning
 
How we prevented account sharing with MFA
How we prevented account sharing with MFAHow we prevented account sharing with MFA
How we prevented account sharing with MFAAndrei Kaleshka
 
Top 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In QueensTop 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In Queensdataanalyticsqueen03
 
Data Factory in Microsoft Fabric (MsBIP #82)
Data Factory in Microsoft Fabric (MsBIP #82)Data Factory in Microsoft Fabric (MsBIP #82)
Data Factory in Microsoft Fabric (MsBIP #82)Cathrine Wilhelmsen
 
Real-Time AI Streaming - AI Max Princeton
Real-Time AI  Streaming - AI Max PrincetonReal-Time AI  Streaming - AI Max Princeton
Real-Time AI Streaming - AI Max PrincetonTimothy Spann
 
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default  Presentation : Data Analysis Project PPTPredictive Analysis for Loan Default  Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPTBoston Institute of Analytics
 
科罗拉多大学波尔得分校毕业证学位证成绩单-可办理
科罗拉多大学波尔得分校毕业证学位证成绩单-可办理科罗拉多大学波尔得分校毕业证学位证成绩单-可办理
科罗拉多大学波尔得分校毕业证学位证成绩单-可办理e4aez8ss
 
Heart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis ProjectHeart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis ProjectBoston Institute of Analytics
 
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...ssuserf63bd7
 
Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Colleen Farrelly
 
modul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptxmodul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptxaleedritatuxx
 
LLMs, LMMs, their Improvement Suggestions and the Path towards AGI
LLMs, LMMs, their Improvement Suggestions and the Path towards AGILLMs, LMMs, their Improvement Suggestions and the Path towards AGI
LLMs, LMMs, their Improvement Suggestions and the Path towards AGIThomas Poetter
 
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改yuu sss
 
Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...Seán Kennedy
 
Thiophen Mechanism khhjjjjjjjhhhhhhhhhhh
Thiophen Mechanism khhjjjjjjjhhhhhhhhhhhThiophen Mechanism khhjjjjjjjhhhhhhhhhhh
Thiophen Mechanism khhjjjjjjjhhhhhhhhhhhYasamin16
 
IMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptxIMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptxdolaknnilon
 
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...Thomas Poetter
 
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一F La
 

Recently uploaded (20)

Conf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming PipelinesConf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
 
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
 
Learn How Data Science Changes Our World
Learn How Data Science Changes Our WorldLearn How Data Science Changes Our World
Learn How Data Science Changes Our World
 
How we prevented account sharing with MFA
How we prevented account sharing with MFAHow we prevented account sharing with MFA
How we prevented account sharing with MFA
 
Top 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In QueensTop 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In Queens
 
Data Factory in Microsoft Fabric (MsBIP #82)
Data Factory in Microsoft Fabric (MsBIP #82)Data Factory in Microsoft Fabric (MsBIP #82)
Data Factory in Microsoft Fabric (MsBIP #82)
 
Real-Time AI Streaming - AI Max Princeton
Real-Time AI  Streaming - AI Max PrincetonReal-Time AI  Streaming - AI Max Princeton
Real-Time AI Streaming - AI Max Princeton
 
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default  Presentation : Data Analysis Project PPTPredictive Analysis for Loan Default  Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
 
科罗拉多大学波尔得分校毕业证学位证成绩单-可办理
科罗拉多大学波尔得分校毕业证学位证成绩单-可办理科罗拉多大学波尔得分校毕业证学位证成绩单-可办理
科罗拉多大学波尔得分校毕业证学位证成绩单-可办理
 
Heart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis ProjectHeart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis Project
 
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...
 
Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024
 
modul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptxmodul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptx
 
LLMs, LMMs, their Improvement Suggestions and the Path towards AGI
LLMs, LMMs, their Improvement Suggestions and the Path towards AGILLMs, LMMs, their Improvement Suggestions and the Path towards AGI
LLMs, LMMs, their Improvement Suggestions and the Path towards AGI
 
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
 
Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...
 
Thiophen Mechanism khhjjjjjjjhhhhhhhhhhh
Thiophen Mechanism khhjjjjjjjhhhhhhhhhhhThiophen Mechanism khhjjjjjjjhhhhhhhhhhh
Thiophen Mechanism khhjjjjjjjhhhhhhhhhhh
 
IMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptxIMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptx
 
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
 
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
 

Social Engineering - Enterprise Phishing.pptx

  • 2. Definition of Social Engineering Social engineering is the art of manipulating people to disclose confidential information, perform actions, or compromise security. It involves psychological manipulation and technical exploits. Goals of Social Engineering Obtain sensitive information (passwords, credit card details, etc.) Gain unauthorized access to systems or physical spaces Influence people's behavior to perform specific actions Circumvent security measures and controls
  • 3. Types of Social Engineering Attacks Phishing: Sending deceptive emails or messages to trick recipients into revealing sensitive information. Pretexting: Creating a false narrative or scenario to gain someone's trust and extract information or access. Baiting: Offering something enticing (e.g., USB drive, free merchandise) to prompt a person to take an action that compromises security. Tailgating: Unauthorized entry to a restricted area by following someone who has authorized access. Impersonation: Pretending to be someone else, such as a trusted authority figure, to gain trust and manipulate individuals.
  • 4. Phishing 91% of UK companies experienced at least one successful phishing attack in 2021 Phishing When criminals use scam emails, text messages (smishing) or phone calls (vishing) to trick their victim with the aim to make you visit a website or open a file, which may download a virus onto your device or direct you to a malicious website to steal your personal details. Don’t take the bait URGE NT DOES IT LOOK LEGITIMATE? REPORT IT Use your 'report suspicious email' button located at the top of your outlook window. SPELLI NG MISTAK ES VAGU E FISHING THE PHISH
  • 5. Phishing CASES A real-life demo of a phishing scam – this could be you! FISHING THE PHISH 2020: TWITTER In 2020, Twitter became the site of social engineering attacks where the accounts of Barack Obama, Bill Gates, Elon Musk, and others were compromised to solicit Bitcoins from their followers. The creators of the social engineering attack earned nearly $120,000 in Bitcoin, but the greatest danger was the clear access the hackers had to the celebrities' accounts, although supposedly no personal data was compromised. 2016: Democratic Party The email hack of the US Democratic Party during the presidential election campaign in 2016 is one of the most emblematic social engineering attacks in recent memory. Russian hackers launched a spear-phishing attack against Democratic Party leaders, which allowed them to access sensitive campaign information and data from nearly 500,000 voters. 2019: Tinder Swindler The infamous "Tinder Swindler" has been around since 2011 and has deceived victims into financing a luxurious lifestyle through a series of romantic scams. He used a combination of manipulation, love influence, and a lie as an excuse, eventually stealing around $10 million in his last two years of social engineering tricks. In 2019, he was convicted, and in 2022, the swindler himself fell victim to a scam, losing nearly $7,000 of the money he had worked hard to earn (through the scam). 2018: The Federal Police (PF) investigate the theft of computers from Petrobras contained strategic information about oil exploration activities. According to PF delegate Carla Dolinski in Macaé, the information was stored on four notebooks and two hard drives belonging to the service provider company Halliburton, which were stolen from a container transported from Santos to Macaé by the carrier Transmagno. The shipment left Santos on January 18th and arrived in Macaé 12 days later. "On January 31st, Halliburton employees noticed that the seal of the container had been broken," the delegate said.).
  • 6. Phishing Best Practices for Personal Security • Protect personal information (e.g., avoid sharing sensitive details on social media). • Regularly update passwords and use strong, unique passwords for different accounts. • Enable two-factor authentication wherever possible. • Be cautious when clicking on links or downloading attachments from unknown or suspicious sources. Conclusion Social engineering attacks exploit human psychology and trust. By understanding the techniques used in social engineering attacks, we can better protect ourselves and our organizations. Stay informed, stay vigilant, and stay secure!
  • 7. Phishing A real-life demo of a phishing scam – this could be you! FISHING THE PHISH

Editor's Notes

  1. Click to add text
  2. Click to add text
  3. Click to add text
  4. Click to add text
  5. Click to add text
  6. Click to add text
  7. Click to add text