SlideShare a Scribd company logo
What is social engineering?
ByCyber Security Expert
DEC 20, 2022 #Baiting, #Best practices to protect against social engineering, #Common Social
Engineering Tactics, #Goals of Social Engineering, #Identifying Social Engineering Attacks,
#Phishing, #Pretexting, #Scareware, #Social Engineering and Cybersecurity, #Types of Social
Engineering, #Understanding Social Engineering, #What is social engineering?
I. Introduction A. Definition of social engineering B. Examples of social engineering attacks II.
Understanding Social Engineering A. Types of Social Engineering B. Goals of Social
Engineering III. Common Social Engineering Tactics A. Phishing B. Pretexting C. Baiting D.
Scareware IV. Social Engineering and Cybersecurity A. Identifying Social Engineering Attacks B.
Best practices to protect against social engineering V. Conclusion A. Recap of social
engineering B. Importance of awareness
Table of Contents
​ What is social engineering?
​ Understanding Social Engineering
​ Types of Social Engineering
​ Phishing
​ Pretexting
​ Baiting
​ Scareware
​ Goals of Social Engineering
​ Common Social Engineering Tactics
​ Phishing
​ Pretexting
​ Baiting
​ Scareware
​ Social Engineering and Cybersecurity
​ Identifying Social Engineering Attacks
​ Best practices to protect against social engineering
​ Conclusion
​ FAQs
What is social engineering?
In the digital age, criminals have found new ways to steal valuable information from individuals
and organizations. One of the most effective tactics they use is social engineering. Social
engineering is the act of manipulating people into divulging confidential information or
performing actions that are not in their best interests. In this article, we will explore what social
engineering is, how it works, and how you can protect yourself from it.
Understanding Social Engineering
Types of Social Engineering
Social engineering can take many forms, from phishing emails to pretexting phone calls. The
most common types of social engineering attacks include:
Phishing
Phishing attacks are one of the most common social engineering tactics. In a phishing attack, a
criminal will send an email that appears to be from a legitimate source, such as a bank or an
online retailer. The email will typically ask the recipient to click on a link and enter their personal
information, such as their login credentials or credit card number. Once the victim enters this
information, the criminal can use it to steal their identity or commit fraud.
Pretexting
Pretexting is another common social engineering tactic. In a pretexting attack, the criminal will
create a fake scenario to gain the victim’s trust. For example, the criminal may pretend to be a
bank employee and ask the victim to verify their account information. Once the victim provides
this information, the criminal can use it for fraudulent purposes.
Baiting
Baiting attacks involve the criminal offering the victim something of value, such as a free USB
drive or a gift card, in exchange for their personal information. Once the victim takes the bait, the
criminal can use their personal information for malicious purposes.
Scareware
Scareware attacks involve the criminal creating fake security alerts or pop-up messages to
scare the victim into taking action. For example, the victim may be told that their computer is
infected with a virus and instructed to download a fake antivirus program. Once the victim
downloads the program, the criminal can use it to steal their personal information.
Goals of Social Engineering
The ultimate goal of social engineering attacks is to obtain valuable information, such as login
credentials, credit card numbers, or other sensitive data. Criminals can use this information for a
variety of purposes, including identity theft, fraud, or espionage. Social engineering attacks can
also be used to gain access to secure systems or networks, allowing criminals to steal
intellectual property or conduct other nefarious activities.
Common Social Engineering Tactics
To protect yourself from social engineering attacks, it is important to be aware of common tactics
that criminals use.
Phishing
To protect against phishing attacks, you should:
● Always verify that the sender is legitimate before providing any personal information
● Use anti-phishing software to block known phishing sites and emails
Pretexting
To protect against pretexting attacks, you should:
● Never provide personal information over the phone or via email unless you are certain of
the identity of the requester
● Verify the legitimacy of any requests for personal information before providing it
Baiting
To protect against baiting attacks, you should:
● Never accept free gifts or items from strangers, especially if they ask for personal
information in exchange
● Be wary of unsolicited emails or messages that offer free items or downloads
Scareware
To protect against scareware attacks, you should:
● Always use legitimate antivirus software and keep it up to date
● Be skeptical of pop-up messages or alerts that claim your computer is infected with a
virus
Social Engineering and Cybersecurity
Social engineering attacks are a major threat to cybersecurity. To protect against these attacks,
it is important to take a proactive approach. Here are a few best practices to help you protect
yourself:
Identifying Social Engineering Attacks
The first step in protecting against social engineering attacks is to be able to identify them. Here
are some signs that an email, message, or phone call may be a social engineering attack:
● The sender or requester is unknown or suspicious
● The message or request is urgent or creates a sense of panic
● The message contains misspellings or grammatical errors
● The message contains a request for personal information or asks you to perform an
action that seems unusual
Best practices to protect against social
engineering
To protect against social engineering attacks, you should:
● Enable two-factor authentication whenever possible
● Regularly back up your data to protect against loss or theft
Conclusion
By understanding how these attacks work and taking steps to protect yourself, you can reduce
your risk of becoming a victim. Remember to be vigilant, always verify requests for personal
information, and use strong security practices to protect your data.
FAQs
● To protect yourself from social engineering attacks, you should be aware of common
tactics, use strong and unique passwords, enable two-factor authentication, keep your
software up to date, and back up your data regularly.

More Related Content

Similar to What is social engineering.pdf

Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ncell
 
Data security concepts chapter 2
Data security concepts chapter 2Data security concepts chapter 2
Data security concepts chapter 2
Nickkisha Farrell
 
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdf
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdfSafeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdf
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdf
CIOWomenMagazine
 
A Review On Adapting Social Engineering Services—Aardwolf Security
A Review On Adapting Social Engineering Services—Aardwolf SecurityA Review On Adapting Social Engineering Services—Aardwolf Security
A Review On Adapting Social Engineering Services—Aardwolf Security
Aardwolf Security
 
Cyber Crime Awareness.pptx
Cyber Crime Awareness.pptxCyber Crime Awareness.pptx
Cyber Crime Awareness.pptx
Mehedi Hasan
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
Manish Chauhan
 
Top Cyber Security institute in India - Gicseh.pdf
Top Cyber Security institute in India - Gicseh.pdfTop Cyber Security institute in India - Gicseh.pdf
Top Cyber Security institute in India - Gicseh.pdf
GICSEH
 
Top Cyber Security institute in India - Gicseh.pdf
Top Cyber Security institute in India - Gicseh.pdfTop Cyber Security institute in India - Gicseh.pdf
Top Cyber Security institute in India - Gicseh.pdf
GICSEH
 
Amir bouker
Amir bouker Amir bouker
Amir bouker
Amir Bouker
 
Benefits of Regular Social Engineering Services - Aardwolf Security
Benefits of Regular Social Engineering Services - Aardwolf SecurityBenefits of Regular Social Engineering Services - Aardwolf Security
Benefits of Regular Social Engineering Services - Aardwolf Security
Aardwolf Security
 
techalpha07
techalpha07techalpha07
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
Tapan Khilar
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
xenhalo561
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
Ankita Shirke
 
Unit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesUnit iii: Common Hacking Techniques
Unit iii: Common Hacking Techniques
Arnav Chowdhury
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentationpooja_doshi
 
Learn About Social Engineering Services - Aardwolf Security
Learn About Social Engineering Services - Aardwolf SecurityLearn About Social Engineering Services - Aardwolf Security
Learn About Social Engineering Services - Aardwolf Security
Aardwolf Security
 
Email Hacking
Email Hacking Email Hacking
Email Hacking
InsecureLab
 
Facts About Social Engineering Services - Aardwolf Security
Facts About Social Engineering Services - Aardwolf SecurityFacts About Social Engineering Services - Aardwolf Security
Facts About Social Engineering Services - Aardwolf Security
Aardwolf Security
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
MohammedYaseen638128
 

Similar to What is social engineering.pdf (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Data security concepts chapter 2
Data security concepts chapter 2Data security concepts chapter 2
Data security concepts chapter 2
 
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdf
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdfSafeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdf
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdf
 
A Review On Adapting Social Engineering Services—Aardwolf Security
A Review On Adapting Social Engineering Services—Aardwolf SecurityA Review On Adapting Social Engineering Services—Aardwolf Security
A Review On Adapting Social Engineering Services—Aardwolf Security
 
Cyber Crime Awareness.pptx
Cyber Crime Awareness.pptxCyber Crime Awareness.pptx
Cyber Crime Awareness.pptx
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Top Cyber Security institute in India - Gicseh.pdf
Top Cyber Security institute in India - Gicseh.pdfTop Cyber Security institute in India - Gicseh.pdf
Top Cyber Security institute in India - Gicseh.pdf
 
Top Cyber Security institute in India - Gicseh.pdf
Top Cyber Security institute in India - Gicseh.pdfTop Cyber Security institute in India - Gicseh.pdf
Top Cyber Security institute in India - Gicseh.pdf
 
Amir bouker
Amir bouker Amir bouker
Amir bouker
 
Benefits of Regular Social Engineering Services - Aardwolf Security
Benefits of Regular Social Engineering Services - Aardwolf SecurityBenefits of Regular Social Engineering Services - Aardwolf Security
Benefits of Regular Social Engineering Services - Aardwolf Security
 
techalpha07
techalpha07techalpha07
techalpha07
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
 
Unit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesUnit iii: Common Hacking Techniques
Unit iii: Common Hacking Techniques
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
 
Learn About Social Engineering Services - Aardwolf Security
Learn About Social Engineering Services - Aardwolf SecurityLearn About Social Engineering Services - Aardwolf Security
Learn About Social Engineering Services - Aardwolf Security
 
Email Hacking
Email Hacking Email Hacking
Email Hacking
 
Facts About Social Engineering Services - Aardwolf Security
Facts About Social Engineering Services - Aardwolf SecurityFacts About Social Engineering Services - Aardwolf Security
Facts About Social Engineering Services - Aardwolf Security
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 

More from uzair

Understanding Cyber Threat Intelligence A Guide for Analysts.pdf
Understanding Cyber Threat Intelligence A Guide for Analysts.pdfUnderstanding Cyber Threat Intelligence A Guide for Analysts.pdf
Understanding Cyber Threat Intelligence A Guide for Analysts.pdf
uzair
 
Git Tutorial A Comprehensive Guide for Beginners.pdf
Git Tutorial A Comprehensive Guide for Beginners.pdfGit Tutorial A Comprehensive Guide for Beginners.pdf
Git Tutorial A Comprehensive Guide for Beginners.pdf
uzair
 
A Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdfA Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdf
uzair
 
Top 5 Programming Languages for Hacking.pdf
Top 5 Programming Languages for Hacking.pdfTop 5 Programming Languages for Hacking.pdf
Top 5 Programming Languages for Hacking.pdf
uzair
 
How to Detect and Remove Malware from a Hacked Linux System.pdf
How to Detect and Remove Malware from a Hacked Linux System.pdfHow to Detect and Remove Malware from a Hacked Linux System.pdf
How to Detect and Remove Malware from a Hacked Linux System.pdf
uzair
 
What is web Attack tools.pdf
What is web Attack tools.pdfWhat is web Attack tools.pdf
What is web Attack tools.pdf
uzair
 
What is Remote Administration Tools (RAT).pdf
What is Remote Administration Tools (RAT).pdfWhat is Remote Administration Tools (RAT).pdf
What is Remote Administration Tools (RAT).pdf
uzair
 
Top Tools Used in XSS Attacks.pdf
Top Tools Used in XSS Attacks.pdfTop Tools Used in XSS Attacks.pdf
Top Tools Used in XSS Attacks.pdf
uzair
 
What is SocialMedia Bruteforce.pdf
What is SocialMedia Bruteforce.pdfWhat is SocialMedia Bruteforce.pdf
What is SocialMedia Bruteforce.pdf
uzair
 
What is Payload Injector.pdf
What is Payload Injector.pdfWhat is Payload Injector.pdf
What is Payload Injector.pdf
uzair
 
What is a Zero-Day Exploit Understanding the Threat of Unknown Vulnerabilitie...
What is a Zero-Day Exploit Understanding the Threat of Unknown Vulnerabilitie...What is a Zero-Day Exploit Understanding the Threat of Unknown Vulnerabilitie...
What is a Zero-Day Exploit Understanding the Threat of Unknown Vulnerabilitie...
uzair
 
What is Remote Buffer Overflow Attack.pdf
What is Remote Buffer Overflow Attack.pdfWhat is Remote Buffer Overflow Attack.pdf
What is Remote Buffer Overflow Attack.pdf
uzair
 
How to Use Linux Forensic Analysis Tools for Digital Investigations.pdf
How to Use Linux Forensic Analysis Tools for Digital Investigations.pdfHow to Use Linux Forensic Analysis Tools for Digital Investigations.pdf
How to Use Linux Forensic Analysis Tools for Digital Investigations.pdf
uzair
 
Top Tools Used by Blue Teams in Cybersecurity.pdf
Top Tools Used by Blue Teams in Cybersecurity.pdfTop Tools Used by Blue Teams in Cybersecurity.pdf
Top Tools Used by Blue Teams in Cybersecurity.pdf
uzair
 
How to Hack Windows on Linux A Comprehensive Guide.pdf
How to Hack Windows on Linux A Comprehensive Guide.pdfHow to Hack Windows on Linux A Comprehensive Guide.pdf
How to Hack Windows on Linux A Comprehensive Guide.pdf
uzair
 
What Are Script Kiddies.pdf
What Are Script Kiddies.pdfWhat Are Script Kiddies.pdf
What Are Script Kiddies.pdf
uzair
 
Using Kali Linux Tools for Illegal Services.pdf
Using Kali Linux Tools for Illegal Services.pdfUsing Kali Linux Tools for Illegal Services.pdf
Using Kali Linux Tools for Illegal Services.pdf
uzair
 
How to Execute Virus Target with CMD Commands.pdf
How to Execute Virus Target with CMD Commands.pdfHow to Execute Virus Target with CMD Commands.pdf
How to Execute Virus Target with CMD Commands.pdf
uzair
 
Hacking Tools A Comprehensive Guide for Black Hat Hackers.pdf
Hacking Tools A Comprehensive Guide for Black Hat Hackers.pdfHacking Tools A Comprehensive Guide for Black Hat Hackers.pdf
Hacking Tools A Comprehensive Guide for Black Hat Hackers.pdf
uzair
 
Botnet Attacks How They Work and How to Defend Against Them.pdf
Botnet Attacks How They Work and How to Defend Against Them.pdfBotnet Attacks How They Work and How to Defend Against Them.pdf
Botnet Attacks How They Work and How to Defend Against Them.pdf
uzair
 

More from uzair (20)

Understanding Cyber Threat Intelligence A Guide for Analysts.pdf
Understanding Cyber Threat Intelligence A Guide for Analysts.pdfUnderstanding Cyber Threat Intelligence A Guide for Analysts.pdf
Understanding Cyber Threat Intelligence A Guide for Analysts.pdf
 
Git Tutorial A Comprehensive Guide for Beginners.pdf
Git Tutorial A Comprehensive Guide for Beginners.pdfGit Tutorial A Comprehensive Guide for Beginners.pdf
Git Tutorial A Comprehensive Guide for Beginners.pdf
 
A Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdfA Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdf
 
Top 5 Programming Languages for Hacking.pdf
Top 5 Programming Languages for Hacking.pdfTop 5 Programming Languages for Hacking.pdf
Top 5 Programming Languages for Hacking.pdf
 
How to Detect and Remove Malware from a Hacked Linux System.pdf
How to Detect and Remove Malware from a Hacked Linux System.pdfHow to Detect and Remove Malware from a Hacked Linux System.pdf
How to Detect and Remove Malware from a Hacked Linux System.pdf
 
What is web Attack tools.pdf
What is web Attack tools.pdfWhat is web Attack tools.pdf
What is web Attack tools.pdf
 
What is Remote Administration Tools (RAT).pdf
What is Remote Administration Tools (RAT).pdfWhat is Remote Administration Tools (RAT).pdf
What is Remote Administration Tools (RAT).pdf
 
Top Tools Used in XSS Attacks.pdf
Top Tools Used in XSS Attacks.pdfTop Tools Used in XSS Attacks.pdf
Top Tools Used in XSS Attacks.pdf
 
What is SocialMedia Bruteforce.pdf
What is SocialMedia Bruteforce.pdfWhat is SocialMedia Bruteforce.pdf
What is SocialMedia Bruteforce.pdf
 
What is Payload Injector.pdf
What is Payload Injector.pdfWhat is Payload Injector.pdf
What is Payload Injector.pdf
 
What is a Zero-Day Exploit Understanding the Threat of Unknown Vulnerabilitie...
What is a Zero-Day Exploit Understanding the Threat of Unknown Vulnerabilitie...What is a Zero-Day Exploit Understanding the Threat of Unknown Vulnerabilitie...
What is a Zero-Day Exploit Understanding the Threat of Unknown Vulnerabilitie...
 
What is Remote Buffer Overflow Attack.pdf
What is Remote Buffer Overflow Attack.pdfWhat is Remote Buffer Overflow Attack.pdf
What is Remote Buffer Overflow Attack.pdf
 
How to Use Linux Forensic Analysis Tools for Digital Investigations.pdf
How to Use Linux Forensic Analysis Tools for Digital Investigations.pdfHow to Use Linux Forensic Analysis Tools for Digital Investigations.pdf
How to Use Linux Forensic Analysis Tools for Digital Investigations.pdf
 
Top Tools Used by Blue Teams in Cybersecurity.pdf
Top Tools Used by Blue Teams in Cybersecurity.pdfTop Tools Used by Blue Teams in Cybersecurity.pdf
Top Tools Used by Blue Teams in Cybersecurity.pdf
 
How to Hack Windows on Linux A Comprehensive Guide.pdf
How to Hack Windows on Linux A Comprehensive Guide.pdfHow to Hack Windows on Linux A Comprehensive Guide.pdf
How to Hack Windows on Linux A Comprehensive Guide.pdf
 
What Are Script Kiddies.pdf
What Are Script Kiddies.pdfWhat Are Script Kiddies.pdf
What Are Script Kiddies.pdf
 
Using Kali Linux Tools for Illegal Services.pdf
Using Kali Linux Tools for Illegal Services.pdfUsing Kali Linux Tools for Illegal Services.pdf
Using Kali Linux Tools for Illegal Services.pdf
 
How to Execute Virus Target with CMD Commands.pdf
How to Execute Virus Target with CMD Commands.pdfHow to Execute Virus Target with CMD Commands.pdf
How to Execute Virus Target with CMD Commands.pdf
 
Hacking Tools A Comprehensive Guide for Black Hat Hackers.pdf
Hacking Tools A Comprehensive Guide for Black Hat Hackers.pdfHacking Tools A Comprehensive Guide for Black Hat Hackers.pdf
Hacking Tools A Comprehensive Guide for Black Hat Hackers.pdf
 
Botnet Attacks How They Work and How to Defend Against Them.pdf
Botnet Attacks How They Work and How to Defend Against Them.pdfBotnet Attacks How They Work and How to Defend Against Them.pdf
Botnet Attacks How They Work and How to Defend Against Them.pdf
 

Recently uploaded

Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
MuhammadTufail242431
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
abh.arya
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
Kamal Acharya
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
Kamal Acharya
 

Recently uploaded (20)

Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
 

What is social engineering.pdf

  • 1. What is social engineering? ByCyber Security Expert DEC 20, 2022 #Baiting, #Best practices to protect against social engineering, #Common Social Engineering Tactics, #Goals of Social Engineering, #Identifying Social Engineering Attacks, #Phishing, #Pretexting, #Scareware, #Social Engineering and Cybersecurity, #Types of Social Engineering, #Understanding Social Engineering, #What is social engineering? I. Introduction A. Definition of social engineering B. Examples of social engineering attacks II. Understanding Social Engineering A. Types of Social Engineering B. Goals of Social Engineering III. Common Social Engineering Tactics A. Phishing B. Pretexting C. Baiting D. Scareware IV. Social Engineering and Cybersecurity A. Identifying Social Engineering Attacks B.
  • 2. Best practices to protect against social engineering V. Conclusion A. Recap of social engineering B. Importance of awareness Table of Contents ​ What is social engineering? ​ Understanding Social Engineering ​ Types of Social Engineering ​ Phishing ​ Pretexting ​ Baiting ​ Scareware ​ Goals of Social Engineering ​ Common Social Engineering Tactics ​ Phishing ​ Pretexting ​ Baiting ​ Scareware ​ Social Engineering and Cybersecurity ​ Identifying Social Engineering Attacks ​ Best practices to protect against social engineering ​ Conclusion ​ FAQs What is social engineering? In the digital age, criminals have found new ways to steal valuable information from individuals and organizations. One of the most effective tactics they use is social engineering. Social engineering is the act of manipulating people into divulging confidential information or performing actions that are not in their best interests. In this article, we will explore what social engineering is, how it works, and how you can protect yourself from it. Understanding Social Engineering
  • 3. Types of Social Engineering Social engineering can take many forms, from phishing emails to pretexting phone calls. The most common types of social engineering attacks include: Phishing Phishing attacks are one of the most common social engineering tactics. In a phishing attack, a criminal will send an email that appears to be from a legitimate source, such as a bank or an online retailer. The email will typically ask the recipient to click on a link and enter their personal information, such as their login credentials or credit card number. Once the victim enters this information, the criminal can use it to steal their identity or commit fraud. Pretexting Pretexting is another common social engineering tactic. In a pretexting attack, the criminal will create a fake scenario to gain the victim’s trust. For example, the criminal may pretend to be a bank employee and ask the victim to verify their account information. Once the victim provides this information, the criminal can use it for fraudulent purposes. Baiting Baiting attacks involve the criminal offering the victim something of value, such as a free USB drive or a gift card, in exchange for their personal information. Once the victim takes the bait, the criminal can use their personal information for malicious purposes. Scareware Scareware attacks involve the criminal creating fake security alerts or pop-up messages to scare the victim into taking action. For example, the victim may be told that their computer is infected with a virus and instructed to download a fake antivirus program. Once the victim downloads the program, the criminal can use it to steal their personal information.
  • 4. Goals of Social Engineering The ultimate goal of social engineering attacks is to obtain valuable information, such as login credentials, credit card numbers, or other sensitive data. Criminals can use this information for a variety of purposes, including identity theft, fraud, or espionage. Social engineering attacks can also be used to gain access to secure systems or networks, allowing criminals to steal intellectual property or conduct other nefarious activities. Common Social Engineering Tactics To protect yourself from social engineering attacks, it is important to be aware of common tactics that criminals use. Phishing To protect against phishing attacks, you should: ● Always verify that the sender is legitimate before providing any personal information ● Use anti-phishing software to block known phishing sites and emails Pretexting To protect against pretexting attacks, you should: ● Never provide personal information over the phone or via email unless you are certain of the identity of the requester ● Verify the legitimacy of any requests for personal information before providing it Baiting To protect against baiting attacks, you should: ● Never accept free gifts or items from strangers, especially if they ask for personal information in exchange ● Be wary of unsolicited emails or messages that offer free items or downloads
  • 5. Scareware To protect against scareware attacks, you should: ● Always use legitimate antivirus software and keep it up to date ● Be skeptical of pop-up messages or alerts that claim your computer is infected with a virus Social Engineering and Cybersecurity Social engineering attacks are a major threat to cybersecurity. To protect against these attacks, it is important to take a proactive approach. Here are a few best practices to help you protect yourself: Identifying Social Engineering Attacks The first step in protecting against social engineering attacks is to be able to identify them. Here are some signs that an email, message, or phone call may be a social engineering attack: ● The sender or requester is unknown or suspicious ● The message or request is urgent or creates a sense of panic ● The message contains misspellings or grammatical errors ● The message contains a request for personal information or asks you to perform an action that seems unusual Best practices to protect against social engineering To protect against social engineering attacks, you should: ● Enable two-factor authentication whenever possible ● Regularly back up your data to protect against loss or theft Conclusion
  • 6. By understanding how these attacks work and taking steps to protect yourself, you can reduce your risk of becoming a victim. Remember to be vigilant, always verify requests for personal information, and use strong security practices to protect your data. FAQs ● To protect yourself from social engineering attacks, you should be aware of common tactics, use strong and unique passwords, enable two-factor authentication, keep your software up to date, and back up your data regularly.