SlideShare a Scribd company logo
1 of 7
Phishing
1
Definition of Social
Engineering
Social engineering is the art of manipulating people to
disclose confidential information, perform actions, or
compromise security.
It involves psychological manipulation and technical
exploits.
Goals of Social Engineering
Obtain sensitive information (passwords, credit card
details, etc.)
Gain unauthorized access to systems or physical
spaces
Influence people's behavior to perform specific actions
Circumvent security measures and controls
Types of Social Engineering
Attacks
Phishing: Sending deceptive emails or messages to
trick recipients into revealing sensitive information.
Pretexting: Creating a false narrative or scenario to gain
someone's trust and extract information or access.
Baiting: Offering something enticing (e.g., USB drive, free
merchandise) to prompt a person to take an action that
compromises security.
Tailgating: Unauthorized entry to a restricted area by
following someone who has authorized access.
Impersonation: Pretending to be someone else, such as
a trusted authority figure, to gain trust and manipulate
individuals.
Phishing
91% of UK companies experienced at least one successful phishing attack in 2021
Phishing
When criminals use scam emails,
text messages (smishing) or
phone calls (vishing) to trick their
victim with the aim to make you
visit a website or open a file,
which may download a virus onto
your device or direct you to a
malicious website to steal your
personal details.
Don’t take the
bait
URGE
NT
DOES IT LOOK
LEGITIMATE?
REPORT
IT
Use your 'report
suspicious email'
button located at
the top of your
outlook window.
SPELLI
NG
MISTAK
ES
VAGU
E
FISHING THE
PHISH
Phishing CASES
A real-life demo of a phishing scam – this could be you!
FISHING THE
PHISH
2020: TWITTER In 2020, Twitter became the site of social engineering attacks where the
accounts of Barack Obama, Bill Gates, Elon Musk, and others were compromised to
solicit Bitcoins from their followers. The creators of the social engineering attack earned
nearly $120,000 in Bitcoin, but the greatest danger was the clear access the hackers
had to the celebrities' accounts, although supposedly no personal data was
compromised.
2016: Democratic Party The email hack of the US Democratic
Party during the presidential election campaign in 2016 is
one of the most emblematic social engineering attacks in recent memory.
Russian hackers launched a spear-phishing attack against Democratic Party leaders,
which allowed them to access sensitive campaign information and data from nearly
500,000 voters.
2019: Tinder Swindler The infamous "Tinder Swindler" has been around since 2011
and has deceived victims into financing a luxurious lifestyle through a series of
romantic scams. He used a combination of manipulation, love influence, and a lie as
an excuse, eventually stealing around $10 million in his last two years of social
engineering tricks. In 2019, he was convicted, and in 2022, the swindler himself fell
victim to a scam, losing nearly $7,000 of the money he had worked hard to earn
(through the scam).
2018: The Federal Police (PF) investigate the theft of computers from Petrobras
contained strategic information about oil exploration activities. According to PF
delegate Carla Dolinski in Macaé, the information was stored on four notebooks and
two hard drives belonging to the service provider company Halliburton, which were
stolen from a container transported from Santos to Macaé by the carrier Transmagno.
The shipment left Santos on January 18th and arrived in Macaé 12 days later. "On
January 31st, Halliburton employees noticed that the seal of the container had been
broken," the delegate said.).
Phishing
Best Practices for Personal
Security
• Protect personal information (e.g., avoid sharing sensitive details on social
media).
• Regularly update passwords and use strong, unique passwords for different
accounts.
• Enable two-factor authentication wherever possible.
• Be cautious when clicking on links or downloading attachments from unknown
or suspicious sources.
Conclusion
Social engineering attacks exploit human psychology and trust. By
understanding the techniques used in social engineering attacks, we can better
protect ourselves and our organizations.
Stay informed, stay
vigilant, and stay secure!
Phishing
A real-life demo of a phishing scam – this could be you!
FISHING THE
PHISH

More Related Content

Similar to Social Engineering - Enterprise Phishing.pptx

Similar to Social Engineering - Enterprise Phishing.pptx (20)

Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
 
Copyright patent& intellectual property
Copyright patent& intellectual propertyCopyright patent& intellectual property
Copyright patent& intellectual property
 
THE CHANGING FACE OF IDENTITY THEFT
THE CHANGING FACE OF IDENTITY THEFTTHE CHANGING FACE OF IDENTITY THEFT
THE CHANGING FACE OF IDENTITY THEFT
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Unit 1
Unit 1Unit 1
Unit 1
 
Identity Theft and Society: What's in it for me?
Identity Theft and Society: What's in it for me?Identity Theft and Society: What's in it for me?
Identity Theft and Society: What's in it for me?
 
Cybercriminals Are Lurking
Cybercriminals Are LurkingCybercriminals Are Lurking
Cybercriminals Are Lurking
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Social Engineering : To Err is Human...
Social Engineering : To Err is Human...Social Engineering : To Err is Human...
Social Engineering : To Err is Human...
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Social Engineering by Riziq Ramadani
Social Engineering by Riziq RamadaniSocial Engineering by Riziq Ramadani
Social Engineering by Riziq Ramadani
 
Cybercrime blog
Cybercrime blogCybercrime blog
Cybercrime blog
 
IT Sample Paper
IT Sample PaperIT Sample Paper
IT Sample Paper
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Introduction-to-Cybercrime Investigation.pptx
Introduction-to-Cybercrime Investigation.pptxIntroduction-to-Cybercrime Investigation.pptx
Introduction-to-Cybercrime Investigation.pptx
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Module vi mis
Module vi misModule vi mis
Module vi mis
 
Databreach forecast
Databreach forecastDatabreach forecast
Databreach forecast
 
Hack
HackHack
Hack
 

Recently uploaded

Displacement, Velocity, Acceleration, and Second Derivatives
Displacement, Velocity, Acceleration, and Second DerivativesDisplacement, Velocity, Acceleration, and Second Derivatives
Displacement, Velocity, Acceleration, and Second Derivatives
23050636
 
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
Amil baba
 
obat aborsi Bontang wa 082135199655 jual obat aborsi cytotec asli di Bontang
obat aborsi Bontang wa 082135199655 jual obat aborsi cytotec asli di  Bontangobat aborsi Bontang wa 082135199655 jual obat aborsi cytotec asli di  Bontang
obat aborsi Bontang wa 082135199655 jual obat aborsi cytotec asli di Bontang
siskavia95
 
Abortion Clinic in Kempton Park +27791653574 WhatsApp Abortion Clinic Service...
Abortion Clinic in Kempton Park +27791653574 WhatsApp Abortion Clinic Service...Abortion Clinic in Kempton Park +27791653574 WhatsApp Abortion Clinic Service...
Abortion Clinic in Kempton Park +27791653574 WhatsApp Abortion Clinic Service...
mikehavy0
 
如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证
如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证
如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证
zifhagzkk
 
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
pwgnohujw
 
一比一原版(ucla文凭证书)加州大学洛杉矶分校毕业证学历认证官方成绩单
一比一原版(ucla文凭证书)加州大学洛杉矶分校毕业证学历认证官方成绩单一比一原版(ucla文凭证书)加州大学洛杉矶分校毕业证学历认证官方成绩单
一比一原版(ucla文凭证书)加州大学洛杉矶分校毕业证学历认证官方成绩单
aqpto5bt
 
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
yulianti213969
 
Jual Obat Aborsi Lhokseumawe ( Asli No.1 ) 088980685493 Obat Penggugur Kandun...
Jual Obat Aborsi Lhokseumawe ( Asli No.1 ) 088980685493 Obat Penggugur Kandun...Jual Obat Aborsi Lhokseumawe ( Asli No.1 ) 088980685493 Obat Penggugur Kandun...
Jual Obat Aborsi Lhokseumawe ( Asli No.1 ) 088980685493 Obat Penggugur Kandun...
Obat Aborsi 088980685493 Jual Obat Aborsi
 
一比一原版(Monash毕业证书)莫纳什大学毕业证原件一模一样
一比一原版(Monash毕业证书)莫纳什大学毕业证原件一模一样一比一原版(Monash毕业证书)莫纳什大学毕业证原件一模一样
一比一原版(Monash毕业证书)莫纳什大学毕业证原件一模一样
yhavx
 

Recently uploaded (20)

Aggregations - The Elasticsearch "GROUP BY"
Aggregations - The Elasticsearch "GROUP BY"Aggregations - The Elasticsearch "GROUP BY"
Aggregations - The Elasticsearch "GROUP BY"
 
Predictive Precipitation: Advanced Rain Forecasting Techniques
Predictive Precipitation: Advanced Rain Forecasting TechniquesPredictive Precipitation: Advanced Rain Forecasting Techniques
Predictive Precipitation: Advanced Rain Forecasting Techniques
 
Displacement, Velocity, Acceleration, and Second Derivatives
Displacement, Velocity, Acceleration, and Second DerivativesDisplacement, Velocity, Acceleration, and Second Derivatives
Displacement, Velocity, Acceleration, and Second Derivatives
 
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
 
SCI8-Q4-MOD11.pdfwrwujrrjfaajerjrajrrarj
SCI8-Q4-MOD11.pdfwrwujrrjfaajerjrajrrarjSCI8-Q4-MOD11.pdfwrwujrrjfaajerjrajrrarj
SCI8-Q4-MOD11.pdfwrwujrrjfaajerjrajrrarj
 
社内勉強会資料_Object Recognition as Next Token Prediction
社内勉強会資料_Object Recognition as Next Token Prediction社内勉強会資料_Object Recognition as Next Token Prediction
社内勉強会資料_Object Recognition as Next Token Prediction
 
obat aborsi Bontang wa 082135199655 jual obat aborsi cytotec asli di Bontang
obat aborsi Bontang wa 082135199655 jual obat aborsi cytotec asli di  Bontangobat aborsi Bontang wa 082135199655 jual obat aborsi cytotec asli di  Bontang
obat aborsi Bontang wa 082135199655 jual obat aborsi cytotec asli di Bontang
 
Abortion Clinic in Kempton Park +27791653574 WhatsApp Abortion Clinic Service...
Abortion Clinic in Kempton Park +27791653574 WhatsApp Abortion Clinic Service...Abortion Clinic in Kempton Park +27791653574 WhatsApp Abortion Clinic Service...
Abortion Clinic in Kempton Park +27791653574 WhatsApp Abortion Clinic Service...
 
Seven tools of quality control.slideshare
Seven tools of quality control.slideshareSeven tools of quality control.slideshare
Seven tools of quality control.slideshare
 
如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证
如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证
如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证
 
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
 
Bios of leading Astrologers & Researchers
Bios of leading Astrologers & ResearchersBios of leading Astrologers & Researchers
Bios of leading Astrologers & Researchers
 
一比一原版(ucla文凭证书)加州大学洛杉矶分校毕业证学历认证官方成绩单
一比一原版(ucla文凭证书)加州大学洛杉矶分校毕业证学历认证官方成绩单一比一原版(ucla文凭证书)加州大学洛杉矶分校毕业证学历认证官方成绩单
一比一原版(ucla文凭证书)加州大学洛杉矶分校毕业证学历认证官方成绩单
 
NOAM AAUG Adobe Summit 2024: Summit Slam Dunks
NOAM AAUG Adobe Summit 2024: Summit Slam DunksNOAM AAUG Adobe Summit 2024: Summit Slam Dunks
NOAM AAUG Adobe Summit 2024: Summit Slam Dunks
 
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
 
Jual Obat Aborsi Lhokseumawe ( Asli No.1 ) 088980685493 Obat Penggugur Kandun...
Jual Obat Aborsi Lhokseumawe ( Asli No.1 ) 088980685493 Obat Penggugur Kandun...Jual Obat Aborsi Lhokseumawe ( Asli No.1 ) 088980685493 Obat Penggugur Kandun...
Jual Obat Aborsi Lhokseumawe ( Asli No.1 ) 088980685493 Obat Penggugur Kandun...
 
一比一原版(Monash毕业证书)莫纳什大学毕业证原件一模一样
一比一原版(Monash毕业证书)莫纳什大学毕业证原件一模一样一比一原版(Monash毕业证书)莫纳什大学毕业证原件一模一样
一比一原版(Monash毕业证书)莫纳什大学毕业证原件一模一样
 
Jual Obat Aborsi Bandung (Asli No.1) Wa 082134680322 Klinik Obat Penggugur Ka...
Jual Obat Aborsi Bandung (Asli No.1) Wa 082134680322 Klinik Obat Penggugur Ka...Jual Obat Aborsi Bandung (Asli No.1) Wa 082134680322 Klinik Obat Penggugur Ka...
Jual Obat Aborsi Bandung (Asli No.1) Wa 082134680322 Klinik Obat Penggugur Ka...
 
RESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptx
RESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptxRESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptx
RESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptx
 
Statistics Informed Decisions Using Data 5th edition by Michael Sullivan solu...
Statistics Informed Decisions Using Data 5th edition by Michael Sullivan solu...Statistics Informed Decisions Using Data 5th edition by Michael Sullivan solu...
Statistics Informed Decisions Using Data 5th edition by Michael Sullivan solu...
 

Social Engineering - Enterprise Phishing.pptx

  • 2. Definition of Social Engineering Social engineering is the art of manipulating people to disclose confidential information, perform actions, or compromise security. It involves psychological manipulation and technical exploits. Goals of Social Engineering Obtain sensitive information (passwords, credit card details, etc.) Gain unauthorized access to systems or physical spaces Influence people's behavior to perform specific actions Circumvent security measures and controls
  • 3. Types of Social Engineering Attacks Phishing: Sending deceptive emails or messages to trick recipients into revealing sensitive information. Pretexting: Creating a false narrative or scenario to gain someone's trust and extract information or access. Baiting: Offering something enticing (e.g., USB drive, free merchandise) to prompt a person to take an action that compromises security. Tailgating: Unauthorized entry to a restricted area by following someone who has authorized access. Impersonation: Pretending to be someone else, such as a trusted authority figure, to gain trust and manipulate individuals.
  • 4. Phishing 91% of UK companies experienced at least one successful phishing attack in 2021 Phishing When criminals use scam emails, text messages (smishing) or phone calls (vishing) to trick their victim with the aim to make you visit a website or open a file, which may download a virus onto your device or direct you to a malicious website to steal your personal details. Don’t take the bait URGE NT DOES IT LOOK LEGITIMATE? REPORT IT Use your 'report suspicious email' button located at the top of your outlook window. SPELLI NG MISTAK ES VAGU E FISHING THE PHISH
  • 5. Phishing CASES A real-life demo of a phishing scam – this could be you! FISHING THE PHISH 2020: TWITTER In 2020, Twitter became the site of social engineering attacks where the accounts of Barack Obama, Bill Gates, Elon Musk, and others were compromised to solicit Bitcoins from their followers. The creators of the social engineering attack earned nearly $120,000 in Bitcoin, but the greatest danger was the clear access the hackers had to the celebrities' accounts, although supposedly no personal data was compromised. 2016: Democratic Party The email hack of the US Democratic Party during the presidential election campaign in 2016 is one of the most emblematic social engineering attacks in recent memory. Russian hackers launched a spear-phishing attack against Democratic Party leaders, which allowed them to access sensitive campaign information and data from nearly 500,000 voters. 2019: Tinder Swindler The infamous "Tinder Swindler" has been around since 2011 and has deceived victims into financing a luxurious lifestyle through a series of romantic scams. He used a combination of manipulation, love influence, and a lie as an excuse, eventually stealing around $10 million in his last two years of social engineering tricks. In 2019, he was convicted, and in 2022, the swindler himself fell victim to a scam, losing nearly $7,000 of the money he had worked hard to earn (through the scam). 2018: The Federal Police (PF) investigate the theft of computers from Petrobras contained strategic information about oil exploration activities. According to PF delegate Carla Dolinski in Macaé, the information was stored on four notebooks and two hard drives belonging to the service provider company Halliburton, which were stolen from a container transported from Santos to Macaé by the carrier Transmagno. The shipment left Santos on January 18th and arrived in Macaé 12 days later. "On January 31st, Halliburton employees noticed that the seal of the container had been broken," the delegate said.).
  • 6. Phishing Best Practices for Personal Security • Protect personal information (e.g., avoid sharing sensitive details on social media). • Regularly update passwords and use strong, unique passwords for different accounts. • Enable two-factor authentication wherever possible. • Be cautious when clicking on links or downloading attachments from unknown or suspicious sources. Conclusion Social engineering attacks exploit human psychology and trust. By understanding the techniques used in social engineering attacks, we can better protect ourselves and our organizations. Stay informed, stay vigilant, and stay secure!
  • 7. Phishing A real-life demo of a phishing scam – this could be you! FISHING THE PHISH

Editor's Notes

  1. Click to add text
  2. Click to add text
  3. Click to add text
  4. Click to add text
  5. Click to add text
  6. Click to add text
  7. Click to add text