SlideShare a Scribd company logo
Social engineering is the process of using interpersonal skills to convince people to reveal access
credentials or other valuable information to an attacker. Employees are the greatest threats to an
organization's information security, as they use all kinds of resources and information in daily
activities. The organization's data or systems will be at risk when employees make mistakes.
Describe three social engineering techniques attackers use to get information or gain system
access. Describe how to reduce these types of errors made by employees. Have you encountered
one of these social engineering attacks? If so, what was your response to the attack?

More Related Content

More from prabhudhanakodi6

the 3 yeenterm on a mortgage of 133000 amoriaed over 15 ye.pdf
the 3 yeenterm on a mortgage of 133000 amoriaed over 15 ye.pdfthe 3 yeenterm on a mortgage of 133000 amoriaed over 15 ye.pdf
the 3 yeenterm on a mortgage of 133000 amoriaed over 15 ye.pdf
prabhudhanakodi6
 
source of fluid from joints.pdf
source of fluid from joints.pdfsource of fluid from joints.pdf
source of fluid from joints.pdf
prabhudhanakodi6
 
Question 27 03 pts In which environment are you most likely.pdf
Question 27 03 pts In which environment are you most likely.pdfQuestion 27 03 pts In which environment are you most likely.pdf
Question 27 03 pts In which environment are you most likely.pdf
prabhudhanakodi6
 
Pregunta 132 puntos Cul es CORRECTO sobre los virus oncog.pdf
Pregunta 132 puntos  Cul es CORRECTO sobre los virus oncog.pdfPregunta 132 puntos  Cul es CORRECTO sobre los virus oncog.pdf
Pregunta 132 puntos Cul es CORRECTO sobre los virus oncog.pdf
prabhudhanakodi6
 
Assume a Poisson distribution a If 25 find PX10 b .pdf
Assume a Poisson distribution a If 25 find PX10 b .pdfAssume a Poisson distribution a If 25 find PX10 b .pdf
Assume a Poisson distribution a If 25 find PX10 b .pdf
prabhudhanakodi6
 
Discussion question Trainers should have the following char.pdf
Discussion question Trainers should have the following char.pdfDiscussion question Trainers should have the following char.pdf
Discussion question Trainers should have the following char.pdf
prabhudhanakodi6
 
A Firm that has integrated world wide operations through a c.pdf
A Firm that has integrated world wide operations through a c.pdfA Firm that has integrated world wide operations through a c.pdf
A Firm that has integrated world wide operations through a c.pdf
prabhudhanakodi6
 
create fall risk assessment in aged care and The plan must i.pdf
create fall risk assessment in aged care and The plan must i.pdfcreate fall risk assessment in aged care and The plan must i.pdf
create fall risk assessment in aged care and The plan must i.pdf
prabhudhanakodi6
 
33 En cul de las siguientes tecnologas se puede almacen.pdf
33  En cul de las siguientes tecnologas se puede almacen.pdf33  En cul de las siguientes tecnologas se puede almacen.pdf
33 En cul de las siguientes tecnologas se puede almacen.pdf
prabhudhanakodi6
 
2 A hospital has a large number of registered physicians .pdf
2  A hospital has a large number of registered physicians .pdf2  A hospital has a large number of registered physicians .pdf
2 A hospital has a large number of registered physicians .pdf
prabhudhanakodi6
 
Alice Delvecchio is married and files a joint return with he.pdf
Alice Delvecchio is married and files a joint return with he.pdfAlice Delvecchio is married and files a joint return with he.pdf
Alice Delvecchio is married and files a joint return with he.pdf
prabhudhanakodi6
 
1 En los esfuerzos de marketing por correo electrnico reb.pdf
1 En los esfuerzos de marketing por correo electrnico reb.pdf1 En los esfuerzos de marketing por correo electrnico reb.pdf
1 En los esfuerzos de marketing por correo electrnico reb.pdf
prabhudhanakodi6
 
Liev runs a diner on Broadway Last year he earned 35000 .pdf
Liev runs a diner on Broadway Last year he earned 35000 .pdfLiev runs a diner on Broadway Last year he earned 35000 .pdf
Liev runs a diner on Broadway Last year he earned 35000 .pdf
prabhudhanakodi6
 
Celiac Disease 1 Discuss a treatment protocol innovations .pdf
Celiac Disease 1 Discuss a treatment protocol innovations .pdfCeliac Disease 1 Discuss a treatment protocol innovations .pdf
Celiac Disease 1 Discuss a treatment protocol innovations .pdf
prabhudhanakodi6
 
A sixteenyear old female was admitted to the ED with lowe.pdf
 A sixteenyear old female was admitted to the ED with lowe.pdf A sixteenyear old female was admitted to the ED with lowe.pdf
A sixteenyear old female was admitted to the ED with lowe.pdf
prabhudhanakodi6
 
A spinner has 10 equal size spaces numbered 110 The spinne.pdf
A spinner has 10 equal size spaces numbered 110 The spinne.pdfA spinner has 10 equal size spaces numbered 110 The spinne.pdf
A spinner has 10 equal size spaces numbered 110 The spinne.pdf
prabhudhanakodi6
 
Please refer to the graph above The society currently has p.pdf
Please refer to the graph above The society currently has p.pdfPlease refer to the graph above The society currently has p.pdf
Please refer to the graph above The society currently has p.pdf
prabhudhanakodi6
 
El 1 de mayo Bok y Che acuerdan oralmente que Che guiar a .pdf
El 1 de mayo Bok y Che acuerdan oralmente que Che guiar a .pdfEl 1 de mayo Bok y Che acuerdan oralmente que Che guiar a .pdf
El 1 de mayo Bok y Che acuerdan oralmente que Che guiar a .pdf
prabhudhanakodi6
 
Consider an economy with the following CobbDouglas producti.pdf
Consider an economy with the following CobbDouglas producti.pdfConsider an economy with the following CobbDouglas producti.pdf
Consider an economy with the following CobbDouglas producti.pdf
prabhudhanakodi6
 
Lately you have taken to growing Sea Monkeys in a large aqu.pdf
Lately you have taken to growing Sea Monkeys in a large aqu.pdfLately you have taken to growing Sea Monkeys in a large aqu.pdf
Lately you have taken to growing Sea Monkeys in a large aqu.pdf
prabhudhanakodi6
 

More from prabhudhanakodi6 (20)

the 3 yeenterm on a mortgage of 133000 amoriaed over 15 ye.pdf
the 3 yeenterm on a mortgage of 133000 amoriaed over 15 ye.pdfthe 3 yeenterm on a mortgage of 133000 amoriaed over 15 ye.pdf
the 3 yeenterm on a mortgage of 133000 amoriaed over 15 ye.pdf
 
source of fluid from joints.pdf
source of fluid from joints.pdfsource of fluid from joints.pdf
source of fluid from joints.pdf
 
Question 27 03 pts In which environment are you most likely.pdf
Question 27 03 pts In which environment are you most likely.pdfQuestion 27 03 pts In which environment are you most likely.pdf
Question 27 03 pts In which environment are you most likely.pdf
 
Pregunta 132 puntos Cul es CORRECTO sobre los virus oncog.pdf
Pregunta 132 puntos  Cul es CORRECTO sobre los virus oncog.pdfPregunta 132 puntos  Cul es CORRECTO sobre los virus oncog.pdf
Pregunta 132 puntos Cul es CORRECTO sobre los virus oncog.pdf
 
Assume a Poisson distribution a If 25 find PX10 b .pdf
Assume a Poisson distribution a If 25 find PX10 b .pdfAssume a Poisson distribution a If 25 find PX10 b .pdf
Assume a Poisson distribution a If 25 find PX10 b .pdf
 
Discussion question Trainers should have the following char.pdf
Discussion question Trainers should have the following char.pdfDiscussion question Trainers should have the following char.pdf
Discussion question Trainers should have the following char.pdf
 
A Firm that has integrated world wide operations through a c.pdf
A Firm that has integrated world wide operations through a c.pdfA Firm that has integrated world wide operations through a c.pdf
A Firm that has integrated world wide operations through a c.pdf
 
create fall risk assessment in aged care and The plan must i.pdf
create fall risk assessment in aged care and The plan must i.pdfcreate fall risk assessment in aged care and The plan must i.pdf
create fall risk assessment in aged care and The plan must i.pdf
 
33 En cul de las siguientes tecnologas se puede almacen.pdf
33  En cul de las siguientes tecnologas se puede almacen.pdf33  En cul de las siguientes tecnologas se puede almacen.pdf
33 En cul de las siguientes tecnologas se puede almacen.pdf
 
2 A hospital has a large number of registered physicians .pdf
2  A hospital has a large number of registered physicians .pdf2  A hospital has a large number of registered physicians .pdf
2 A hospital has a large number of registered physicians .pdf
 
Alice Delvecchio is married and files a joint return with he.pdf
Alice Delvecchio is married and files a joint return with he.pdfAlice Delvecchio is married and files a joint return with he.pdf
Alice Delvecchio is married and files a joint return with he.pdf
 
1 En los esfuerzos de marketing por correo electrnico reb.pdf
1 En los esfuerzos de marketing por correo electrnico reb.pdf1 En los esfuerzos de marketing por correo electrnico reb.pdf
1 En los esfuerzos de marketing por correo electrnico reb.pdf
 
Liev runs a diner on Broadway Last year he earned 35000 .pdf
Liev runs a diner on Broadway Last year he earned 35000 .pdfLiev runs a diner on Broadway Last year he earned 35000 .pdf
Liev runs a diner on Broadway Last year he earned 35000 .pdf
 
Celiac Disease 1 Discuss a treatment protocol innovations .pdf
Celiac Disease 1 Discuss a treatment protocol innovations .pdfCeliac Disease 1 Discuss a treatment protocol innovations .pdf
Celiac Disease 1 Discuss a treatment protocol innovations .pdf
 
A sixteenyear old female was admitted to the ED with lowe.pdf
 A sixteenyear old female was admitted to the ED with lowe.pdf A sixteenyear old female was admitted to the ED with lowe.pdf
A sixteenyear old female was admitted to the ED with lowe.pdf
 
A spinner has 10 equal size spaces numbered 110 The spinne.pdf
A spinner has 10 equal size spaces numbered 110 The spinne.pdfA spinner has 10 equal size spaces numbered 110 The spinne.pdf
A spinner has 10 equal size spaces numbered 110 The spinne.pdf
 
Please refer to the graph above The society currently has p.pdf
Please refer to the graph above The society currently has p.pdfPlease refer to the graph above The society currently has p.pdf
Please refer to the graph above The society currently has p.pdf
 
El 1 de mayo Bok y Che acuerdan oralmente que Che guiar a .pdf
El 1 de mayo Bok y Che acuerdan oralmente que Che guiar a .pdfEl 1 de mayo Bok y Che acuerdan oralmente que Che guiar a .pdf
El 1 de mayo Bok y Che acuerdan oralmente que Che guiar a .pdf
 
Consider an economy with the following CobbDouglas producti.pdf
Consider an economy with the following CobbDouglas producti.pdfConsider an economy with the following CobbDouglas producti.pdf
Consider an economy with the following CobbDouglas producti.pdf
 
Lately you have taken to growing Sea Monkeys in a large aqu.pdf
Lately you have taken to growing Sea Monkeys in a large aqu.pdfLately you have taken to growing Sea Monkeys in a large aqu.pdf
Lately you have taken to growing Sea Monkeys in a large aqu.pdf
 

Recently uploaded

Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 

Recently uploaded (20)

Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 

Social engineering is the process of using interpersonal ski.pdf

  • 1. Social engineering is the process of using interpersonal skills to convince people to reveal access credentials or other valuable information to an attacker. Employees are the greatest threats to an organization's information security, as they use all kinds of resources and information in daily activities. The organization's data or systems will be at risk when employees make mistakes. Describe three social engineering techniques attackers use to get information or gain system access. Describe how to reduce these types of errors made by employees. Have you encountered one of these social engineering attacks? If so, what was your response to the attack?