SlideShare a Scribd company logo
Social Engineering
BY SMITHA
What is Social Engineer?
• Social engineering is the act of manipulating a
person to take an action that may or may not
be in the “target’s” best interest.
Why hacker use Social Engineering?
• Least Resistance
• 10 time more successful than other attacks
• A common element of malicious Attackers
Typical goals
• Money
• Ego
• Revenge
• Cause
• Entertainment
• Knowledge
Common Attacks
• Customer Service
• Delivery Person
• Phone
• Tech Support
Social Engineering methods
• Dumpster Diving
• Shoulder surfing
• Baiting
• Vishing
• Phishing
• Whaling
Dumpster Diving
Dumpster Diving
• “Dumpster diving” means searching trash for
useful information. The trash may be in a public
dumpster or in a restricted area requiring
unauthorized entry. Dumpster diving depends on
a human weakness: the lack of security
knowledge. Many things can be found dumpster
diving (e.g., CDs, DVDs, hard drives, company
directories, and so forth). Probably the most
famous example of dumpster diving
Dumpster Diving
• Credit Card Receipts.
• Bills.
• Printed Email.
• Password.
• Phone Number.
• Names.
• Printed Emails.
• Expense Reports.
Shoulder Surfing
• A shoulder surfing attack explains a situation
when the attacker can physically view the devices
screens and the password typing keypad to
obtain personal information i.e. one of the group
of attack methods requires the hacker (attacker)
to be physically close to the victims for the attack
to succeed and thus a few shoulder surfing
attacks will occur with intruders virus malicious
intentions or virus malware accessing it. Some
similar might result from nosy to people, where it
is more an invasion of our privacy.
Shoulder surfing
Examples
Baiting
• As mentioned above, baiting is a kind of attack where a
social engineer will use a false promise or reward to
trap victims and steal their sensitive information by
infecting their systems with malware. Baits are very
attractive and enticing, not to mention manipulative,
and their end goal is to infect your system and gain
access to personal information.
• Attackers who practice baiting use physical devices and
enticing offers that appeal to people’s curiosity or need
to trap them and get what they want from their
victims. In many ways, baiting is similar to phishing
attacks, but overall, it’s different from most social
engineering attacks. Why? Because these attacks offer
something free that’s relevant to the target.
Baiting
Examples:
Phishing
• Phishing is a form of social engineering where
attackers deceive people into revealing sensitive
information or installing malware such as
ransomware.
Types of Phishing:
• Spear Phishing.
• Whaling.
• Vishing.
• Email Phishing-General.
Spear Phishing
• Spear phishing is an email or electronic
communications scam targeted towards a specific
individual, organization or business.
Spear Phishing
Example:
Whaling
• A whaling attack, also known as whaling
phishing or a whaling phishing attack, is a
specific type of phishing attack that targets
high-profile employees, such as the chief
executive officer or chief financial officer, in
order to steal sensitive information from a
company.
Whaling
Example:
WHAT IS VISHING?
• Vishing is a cyber crime that uses the phone to
steal personal confidential information from
victims. Often referred to as voice phishing.
Smishing
• Smishing is a type of
phishing attack that uses
social engineering to get
personal information
about someone using
text messaging.
How Zoom is being exploited for
phishing attacks
• Creating a Zoom phishing email
• Sending fake Zoom meeting to victim
• Victim clicks on Zoom meeting phishing link
• Malicious code is loaded in the victims system.
Social Engineering new.pptx

More Related Content

What's hot

Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?
JamRivera1
 
Social engineering
Social engineering Social engineering
Social engineering
Vîñàý Pãtêl
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human Behavior
James Krusic
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
pooja_doshi
 
Social Engineering Attacks & Principles
Social Engineering Attacks & PrinciplesSocial Engineering Attacks & Principles
Social Engineering Attacks & Principles
LearningwithRayYT
 
Social Engineering
Social EngineeringSocial Engineering
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering
OWASP Foundation
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
William Gregorian
 
Cyber attacks
Cyber attacks Cyber attacks
Cyber attacks
Anuradha Moti T
 
Social engineering
Social engineeringSocial engineering
Social engineering
Alexander Zhuravlev
 
PPT on Phishing
PPT on PhishingPPT on Phishing
PPT on Phishing
Pankaj Yadav
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
primeteacher32
 
Cyber security
Cyber securityCyber security
Cyber security
Bhavin Shah
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
Dinesh582831
 
Introduction to Social engineering | Techniques of Social engineering
Introduction to Social engineering | Techniques of Social engineeringIntroduction to Social engineering | Techniques of Social engineering
Introduction to Social engineering | Techniques of Social engineering
Prem Lamsal
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.
Pratum
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
ICT Frame Magazine Pvt. Ltd.
 
Social engineering
Social engineeringSocial engineering
Social engineering
ankushmohanty
 
PHISHING PROTECTION
PHISHING PROTECTIONPHISHING PROTECTION
PHISHING PROTECTION
Sylvain Martinez
 
Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015
Hovhannes Aghajanyan
 

What's hot (20)

Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?
 
Social engineering
Social engineering Social engineering
Social engineering
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human Behavior
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
 
Social Engineering Attacks & Principles
Social Engineering Attacks & PrinciplesSocial Engineering Attacks & Principles
Social Engineering Attacks & Principles
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Cyber attacks
Cyber attacks Cyber attacks
Cyber attacks
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
PPT on Phishing
PPT on PhishingPPT on Phishing
PPT on Phishing
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
Introduction to Social engineering | Techniques of Social engineering
Introduction to Social engineering | Techniques of Social engineeringIntroduction to Social engineering | Techniques of Social engineering
Introduction to Social engineering | Techniques of Social engineering
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
PHISHING PROTECTION
PHISHING PROTECTIONPHISHING PROTECTION
PHISHING PROTECTION
 
Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015
 

Similar to Social Engineering new.pptx

powerpointpresentThreat Actor Groups.pptx
powerpointpresentThreat Actor Groups.pptxpowerpointpresentThreat Actor Groups.pptx
powerpointpresentThreat Actor Groups.pptx
deveraralph2
 
- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf
Ramya Nellutla
 
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
PACE-IT, Security+3.3: Summary of Social Engineering AttacksPACE-IT, Security+3.3: Summary of Social Engineering Attacks
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
Pace IT at Edmonds Community College
 
Social Engineering.pdf
Social Engineering.pdfSocial Engineering.pdf
Social Engineering.pdf
MeshalALshammari12
 
The Insider Threat January.pptx
The Insider Threat January.pptxThe Insider Threat January.pptx
The Insider Threat January.pptx
BertrandRussell6
 
Unit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesUnit iii: Common Hacking Techniques
Unit iii: Common Hacking Techniques
Arnav Chowdhury
 
Counterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptxCounterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptx
ZakiAhmed70
 
Social engineering
Social engineeringSocial engineering
Social engineering
Maulik Kotak
 
Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)
Marta Barrio Marcos
 
What is social engineering.pdf
What is social engineering.pdfWhat is social engineering.pdf
What is social engineering.pdf
uzair
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
pixvilx
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
CakraWicaksono3
 
Cyber Security Motivation
Cyber Security MotivationCyber Security Motivation
Cyber Security Motivation
Suman Thapaliya
 
Types of Social engineering
Types of Social engineeringTypes of Social engineering
Types of Social engineering
Riddhi Sood
 
Using Social Media for Security Monitoring
Using Social Media for Security MonitoringUsing Social Media for Security Monitoring
Using Social Media for Security Monitoring
Sysomos
 
Social Engineering, or hacking people
Social Engineering, or hacking peopleSocial Engineering, or hacking people
Social Engineering, or hacking people
Tudor Damian
 
Spear Phishing Attacks
Spear Phishing AttacksSpear Phishing Attacks
Spear Phishing Attacks
IsaacDavid27
 
Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"
abercius24
 
edu 3 ppt.pptx
edu 3 ppt.pptxedu 3 ppt.pptx
edu 3 ppt.pptx
ArchaWashington
 
Cyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptxCyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptx
jenanityanand4
 

Similar to Social Engineering new.pptx (20)

powerpointpresentThreat Actor Groups.pptx
powerpointpresentThreat Actor Groups.pptxpowerpointpresentThreat Actor Groups.pptx
powerpointpresentThreat Actor Groups.pptx
 
- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf
 
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
PACE-IT, Security+3.3: Summary of Social Engineering AttacksPACE-IT, Security+3.3: Summary of Social Engineering Attacks
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
 
Social Engineering.pdf
Social Engineering.pdfSocial Engineering.pdf
Social Engineering.pdf
 
The Insider Threat January.pptx
The Insider Threat January.pptxThe Insider Threat January.pptx
The Insider Threat January.pptx
 
Unit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesUnit iii: Common Hacking Techniques
Unit iii: Common Hacking Techniques
 
Counterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptxCounterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptx
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)
 
What is social engineering.pdf
What is social engineering.pdfWhat is social engineering.pdf
What is social engineering.pdf
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
 
Cyber Security Motivation
Cyber Security MotivationCyber Security Motivation
Cyber Security Motivation
 
Types of Social engineering
Types of Social engineeringTypes of Social engineering
Types of Social engineering
 
Using Social Media for Security Monitoring
Using Social Media for Security MonitoringUsing Social Media for Security Monitoring
Using Social Media for Security Monitoring
 
Social Engineering, or hacking people
Social Engineering, or hacking peopleSocial Engineering, or hacking people
Social Engineering, or hacking people
 
Spear Phishing Attacks
Spear Phishing AttacksSpear Phishing Attacks
Spear Phishing Attacks
 
Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"
 
edu 3 ppt.pptx
edu 3 ppt.pptxedu 3 ppt.pptx
edu 3 ppt.pptx
 
Cyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptxCyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptx
 

More from Santhosh Prabhu

data_analysis_step_by_step_booklet.pdf
data_analysis_step_by_step_booklet.pdfdata_analysis_step_by_step_booklet.pdf
data_analysis_step_by_step_booklet.pdf
Santhosh Prabhu
 
DataAnalysis.pdf
DataAnalysis.pdfDataAnalysis.pdf
DataAnalysis.pdf
Santhosh Prabhu
 
Wiley_Excel_Pivot_Tables_and_Charts.pdf
Wiley_Excel_Pivot_Tables_and_Charts.pdfWiley_Excel_Pivot_Tables_and_Charts.pdf
Wiley_Excel_Pivot_Tables_and_Charts.pdf
Santhosh Prabhu
 
Predictive marketing _ easy ways every marketer can use customer analytics an...
Predictive marketing _ easy ways every marketer can use customer analytics an...Predictive marketing _ easy ways every marketer can use customer analytics an...
Predictive marketing _ easy ways every marketer can use customer analytics an...
Santhosh Prabhu
 
Predictive HR Analytics_ Mastering the HR Metric ( PDFDrive ).pdf
Predictive HR Analytics_ Mastering the HR Metric ( PDFDrive ).pdfPredictive HR Analytics_ Mastering the HR Metric ( PDFDrive ).pdf
Predictive HR Analytics_ Mastering the HR Metric ( PDFDrive ).pdf
Santhosh Prabhu
 
DMBAR - Data Mining and Business Analytics with R - Johannes Ledolter.pdf
DMBAR - Data Mining and Business Analytics with R - Johannes Ledolter.pdfDMBAR - Data Mining and Business Analytics with R - Johannes Ledolter.pdf
DMBAR - Data Mining and Business Analytics with R - Johannes Ledolter.pdf
Santhosh Prabhu
 
hrtdtna.pptx
hrtdtna.pptxhrtdtna.pptx
hrtdtna.pptx
Santhosh Prabhu
 
Concept of training.pptx
Concept of training.pptxConcept of training.pptx
Concept of training.pptx
Santhosh Prabhu
 
Data Encryption Standards (1).pptx
Data Encryption Standards (1).pptxData Encryption Standards (1).pptx
Data Encryption Standards (1).pptx
Santhosh Prabhu
 
methodsofdatacollectione.pptx
methodsofdatacollectione.pptxmethodsofdatacollectione.pptx
methodsofdatacollectione.pptx
Santhosh Prabhu
 
Decision Making.pptx
Decision Making.pptxDecision Making.pptx
Decision Making.pptx
Santhosh Prabhu
 

More from Santhosh Prabhu (11)

data_analysis_step_by_step_booklet.pdf
data_analysis_step_by_step_booklet.pdfdata_analysis_step_by_step_booklet.pdf
data_analysis_step_by_step_booklet.pdf
 
DataAnalysis.pdf
DataAnalysis.pdfDataAnalysis.pdf
DataAnalysis.pdf
 
Wiley_Excel_Pivot_Tables_and_Charts.pdf
Wiley_Excel_Pivot_Tables_and_Charts.pdfWiley_Excel_Pivot_Tables_and_Charts.pdf
Wiley_Excel_Pivot_Tables_and_Charts.pdf
 
Predictive marketing _ easy ways every marketer can use customer analytics an...
Predictive marketing _ easy ways every marketer can use customer analytics an...Predictive marketing _ easy ways every marketer can use customer analytics an...
Predictive marketing _ easy ways every marketer can use customer analytics an...
 
Predictive HR Analytics_ Mastering the HR Metric ( PDFDrive ).pdf
Predictive HR Analytics_ Mastering the HR Metric ( PDFDrive ).pdfPredictive HR Analytics_ Mastering the HR Metric ( PDFDrive ).pdf
Predictive HR Analytics_ Mastering the HR Metric ( PDFDrive ).pdf
 
DMBAR - Data Mining and Business Analytics with R - Johannes Ledolter.pdf
DMBAR - Data Mining and Business Analytics with R - Johannes Ledolter.pdfDMBAR - Data Mining and Business Analytics with R - Johannes Ledolter.pdf
DMBAR - Data Mining and Business Analytics with R - Johannes Ledolter.pdf
 
hrtdtna.pptx
hrtdtna.pptxhrtdtna.pptx
hrtdtna.pptx
 
Concept of training.pptx
Concept of training.pptxConcept of training.pptx
Concept of training.pptx
 
Data Encryption Standards (1).pptx
Data Encryption Standards (1).pptxData Encryption Standards (1).pptx
Data Encryption Standards (1).pptx
 
methodsofdatacollectione.pptx
methodsofdatacollectione.pptxmethodsofdatacollectione.pptx
methodsofdatacollectione.pptx
 
Decision Making.pptx
Decision Making.pptxDecision Making.pptx
Decision Making.pptx
 

Recently uploaded

20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 

Recently uploaded (20)

20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 

Social Engineering new.pptx

  • 2. What is Social Engineer? • Social engineering is the act of manipulating a person to take an action that may or may not be in the “target’s” best interest.
  • 3. Why hacker use Social Engineering? • Least Resistance • 10 time more successful than other attacks • A common element of malicious Attackers
  • 4. Typical goals • Money • Ego • Revenge • Cause • Entertainment • Knowledge
  • 5. Common Attacks • Customer Service • Delivery Person • Phone • Tech Support
  • 6. Social Engineering methods • Dumpster Diving • Shoulder surfing • Baiting • Vishing • Phishing • Whaling
  • 7. Dumpster Diving Dumpster Diving • “Dumpster diving” means searching trash for useful information. The trash may be in a public dumpster or in a restricted area requiring unauthorized entry. Dumpster diving depends on a human weakness: the lack of security knowledge. Many things can be found dumpster diving (e.g., CDs, DVDs, hard drives, company directories, and so forth). Probably the most famous example of dumpster diving
  • 8. Dumpster Diving • Credit Card Receipts. • Bills. • Printed Email. • Password. • Phone Number. • Names. • Printed Emails. • Expense Reports.
  • 9. Shoulder Surfing • A shoulder surfing attack explains a situation when the attacker can physically view the devices screens and the password typing keypad to obtain personal information i.e. one of the group of attack methods requires the hacker (attacker) to be physically close to the victims for the attack to succeed and thus a few shoulder surfing attacks will occur with intruders virus malicious intentions or virus malware accessing it. Some similar might result from nosy to people, where it is more an invasion of our privacy.
  • 11. Baiting • As mentioned above, baiting is a kind of attack where a social engineer will use a false promise or reward to trap victims and steal their sensitive information by infecting their systems with malware. Baits are very attractive and enticing, not to mention manipulative, and their end goal is to infect your system and gain access to personal information. • Attackers who practice baiting use physical devices and enticing offers that appeal to people’s curiosity or need to trap them and get what they want from their victims. In many ways, baiting is similar to phishing attacks, but overall, it’s different from most social engineering attacks. Why? Because these attacks offer something free that’s relevant to the target.
  • 13. Phishing • Phishing is a form of social engineering where attackers deceive people into revealing sensitive information or installing malware such as ransomware. Types of Phishing: • Spear Phishing. • Whaling. • Vishing. • Email Phishing-General.
  • 14. Spear Phishing • Spear phishing is an email or electronic communications scam targeted towards a specific individual, organization or business.
  • 16. Whaling • A whaling attack, also known as whaling phishing or a whaling phishing attack, is a specific type of phishing attack that targets high-profile employees, such as the chief executive officer or chief financial officer, in order to steal sensitive information from a company.
  • 18. WHAT IS VISHING? • Vishing is a cyber crime that uses the phone to steal personal confidential information from victims. Often referred to as voice phishing.
  • 19. Smishing • Smishing is a type of phishing attack that uses social engineering to get personal information about someone using text messaging.
  • 20. How Zoom is being exploited for phishing attacks • Creating a Zoom phishing email • Sending fake Zoom meeting to victim • Victim clicks on Zoom meeting phishing link • Malicious code is loaded in the victims system.