SlideShare a Scribd company logo
What is social engineering?
ByCyber Security Expert
DEC 20, 2022 #Baiting, #Best practices to protect against social engineering, #Common Social
Engineering Tactics, #Goals of Social Engineering, #Identifying Social Engineering Attacks,
#Phishing, #Pretexting, #Scareware, #Social Engineering and Cybersecurity, #Types of Social
Engineering, #Understanding Social Engineering, #What is social engineering?
I. Introduction A. Definition of social engineering B. Examples of social engineering attacks II.
Understanding Social Engineering A. Types of Social Engineering B. Goals of Social
Engineering III. Common Social Engineering Tactics A. Phishing B. Pretexting C. Baiting D.
Scareware IV. Social Engineering and Cybersecurity A. Identifying Social Engineering Attacks B.
Best practices to protect against social engineering V. Conclusion A. Recap of social
engineering B. Importance of awareness
Table of Contents
​ What is social engineering?
​ Understanding Social Engineering
​ Types of Social Engineering
​ Phishing
​ Pretexting
​ Baiting
​ Scareware
​ Goals of Social Engineering
​ Common Social Engineering Tactics
​ Phishing
​ Pretexting
​ Baiting
​ Scareware
​ Social Engineering and Cybersecurity
​ Identifying Social Engineering Attacks
​ Best practices to protect against social engineering
​ Conclusion
​ FAQs
What is social engineering?
In the digital age, criminals have found new ways to steal valuable information from individuals
and organizations. One of the most effective tactics they use is social engineering. Social
engineering is the act of manipulating people into divulging confidential information or
performing actions that are not in their best interests. In this article, we will explore what social
engineering is, how it works, and how you can protect yourself from it.
Understanding Social Engineering
Types of Social Engineering
Social engineering can take many forms, from phishing emails to pretexting phone calls. The
most common types of social engineering attacks include:
Phishing
Phishing attacks are one of the most common social engineering tactics. In a phishing attack, a
criminal will send an email that appears to be from a legitimate source, such as a bank or an
online retailer. The email will typically ask the recipient to click on a link and enter their personal
information, such as their login credentials or credit card number. Once the victim enters this
information, the criminal can use it to steal their identity or commit fraud.
Pretexting
Pretexting is another common social engineering tactic. In a pretexting attack, the criminal will
create a fake scenario to gain the victim’s trust. For example, the criminal may pretend to be a
bank employee and ask the victim to verify their account information. Once the victim provides
this information, the criminal can use it for fraudulent purposes.
Baiting
Baiting attacks involve the criminal offering the victim something of value, such as a free USB
drive or a gift card, in exchange for their personal information. Once the victim takes the bait, the
criminal can use their personal information for malicious purposes.
Scareware
Scareware attacks involve the criminal creating fake security alerts or pop-up messages to
scare the victim into taking action. For example, the victim may be told that their computer is
infected with a virus and instructed to download a fake antivirus program. Once the victim
downloads the program, the criminal can use it to steal their personal information.
Goals of Social Engineering
The ultimate goal of social engineering attacks is to obtain valuable information, such as login
credentials, credit card numbers, or other sensitive data. Criminals can use this information for a
variety of purposes, including identity theft, fraud, or espionage. Social engineering attacks can
also be used to gain access to secure systems or networks, allowing criminals to steal
intellectual property or conduct other nefarious activities.
Common Social Engineering Tactics
To protect yourself from social engineering attacks, it is important to be aware of common tactics
that criminals use.
Phishing
To protect against phishing attacks, you should:
● Always verify that the sender is legitimate before providing any personal information
● Use anti-phishing software to block known phishing sites and emails
Pretexting
To protect against pretexting attacks, you should:
● Never provide personal information over the phone or via email unless you are certain of
the identity of the requester
● Verify the legitimacy of any requests for personal information before providing it
Baiting
To protect against baiting attacks, you should:
● Never accept free gifts or items from strangers, especially if they ask for personal
information in exchange
● Be wary of unsolicited emails or messages that offer free items or downloads
Scareware
To protect against scareware attacks, you should:
● Always use legitimate antivirus software and keep it up to date
● Be skeptical of pop-up messages or alerts that claim your computer is infected with a
virus
Social Engineering and Cybersecurity
Social engineering attacks are a major threat to cybersecurity. To protect against these attacks,
it is important to take a proactive approach. Here are a few best practices to help you protect
yourself:
Identifying Social Engineering Attacks
The first step in protecting against social engineering attacks is to be able to identify them. Here
are some signs that an email, message, or phone call may be a social engineering attack:
● The sender or requester is unknown or suspicious
● The message or request is urgent or creates a sense of panic
● The message contains misspellings or grammatical errors
● The message contains a request for personal information or asks you to perform an
action that seems unusual
Best practices to protect against social
engineering
To protect against social engineering attacks, you should:
● Enable two-factor authentication whenever possible
● Regularly back up your data to protect against loss or theft
Conclusion
By understanding how these attacks work and taking steps to protect yourself, you can reduce
your risk of becoming a victim. Remember to be vigilant, always verify requests for personal
information, and use strong security practices to protect your data.
FAQs
● To protect yourself from social engineering attacks, you should be aware of common
tactics, use strong and unique passwords, enable two-factor authentication, keep your
software up to date, and back up your data regularly.

More Related Content

Similar to What is social engineering.pdf

Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ncell
 
Data security concepts chapter 2
Data security concepts chapter 2Data security concepts chapter 2
Data security concepts chapter 2
Nickkisha Farrell
 
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdf
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdfSafeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdf
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdf
CIOWomenMagazine
 
A Review On Adapting Social Engineering Services—Aardwolf Security
A Review On Adapting Social Engineering Services—Aardwolf SecurityA Review On Adapting Social Engineering Services—Aardwolf Security
A Review On Adapting Social Engineering Services—Aardwolf Security
Aardwolf Security
 
Cyber Crime Awareness.pptx
Cyber Crime Awareness.pptxCyber Crime Awareness.pptx
Cyber Crime Awareness.pptx
Mehedi Hasan
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
Manish Chauhan
 
Top Cyber Security institute in India - Gicseh.pdf
Top Cyber Security institute in India - Gicseh.pdfTop Cyber Security institute in India - Gicseh.pdf
Top Cyber Security institute in India - Gicseh.pdf
GICSEH
 
Top Cyber Security institute in India - Gicseh.pdf
Top Cyber Security institute in India - Gicseh.pdfTop Cyber Security institute in India - Gicseh.pdf
Top Cyber Security institute in India - Gicseh.pdf
GICSEH
 
Amir bouker
Amir bouker Amir bouker
Amir bouker
Amir Bouker
 
Benefits of Regular Social Engineering Services - Aardwolf Security
Benefits of Regular Social Engineering Services - Aardwolf SecurityBenefits of Regular Social Engineering Services - Aardwolf Security
Benefits of Regular Social Engineering Services - Aardwolf Security
Aardwolf Security
 
techalpha07
techalpha07techalpha07
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
Tapan Khilar
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
xenhalo561
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
Ankita Shirke
 
Unit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesUnit iii: Common Hacking Techniques
Unit iii: Common Hacking Techniques
Arnav Chowdhury
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
pooja_doshi
 
Learn About Social Engineering Services - Aardwolf Security
Learn About Social Engineering Services - Aardwolf SecurityLearn About Social Engineering Services - Aardwolf Security
Learn About Social Engineering Services - Aardwolf Security
Aardwolf Security
 
Email Hacking
Email Hacking Email Hacking
Email Hacking
InsecureLab
 
Facts About Social Engineering Services - Aardwolf Security
Facts About Social Engineering Services - Aardwolf SecurityFacts About Social Engineering Services - Aardwolf Security
Facts About Social Engineering Services - Aardwolf Security
Aardwolf Security
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
MohammedYaseen638128
 

Similar to What is social engineering.pdf (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Data security concepts chapter 2
Data security concepts chapter 2Data security concepts chapter 2
Data security concepts chapter 2
 
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdf
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdfSafeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdf
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdf
 
A Review On Adapting Social Engineering Services—Aardwolf Security
A Review On Adapting Social Engineering Services—Aardwolf SecurityA Review On Adapting Social Engineering Services—Aardwolf Security
A Review On Adapting Social Engineering Services—Aardwolf Security
 
Cyber Crime Awareness.pptx
Cyber Crime Awareness.pptxCyber Crime Awareness.pptx
Cyber Crime Awareness.pptx
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Top Cyber Security institute in India - Gicseh.pdf
Top Cyber Security institute in India - Gicseh.pdfTop Cyber Security institute in India - Gicseh.pdf
Top Cyber Security institute in India - Gicseh.pdf
 
Top Cyber Security institute in India - Gicseh.pdf
Top Cyber Security institute in India - Gicseh.pdfTop Cyber Security institute in India - Gicseh.pdf
Top Cyber Security institute in India - Gicseh.pdf
 
Amir bouker
Amir bouker Amir bouker
Amir bouker
 
Benefits of Regular Social Engineering Services - Aardwolf Security
Benefits of Regular Social Engineering Services - Aardwolf SecurityBenefits of Regular Social Engineering Services - Aardwolf Security
Benefits of Regular Social Engineering Services - Aardwolf Security
 
techalpha07
techalpha07techalpha07
techalpha07
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
 
Unit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesUnit iii: Common Hacking Techniques
Unit iii: Common Hacking Techniques
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
 
Learn About Social Engineering Services - Aardwolf Security
Learn About Social Engineering Services - Aardwolf SecurityLearn About Social Engineering Services - Aardwolf Security
Learn About Social Engineering Services - Aardwolf Security
 
Email Hacking
Email Hacking Email Hacking
Email Hacking
 
Facts About Social Engineering Services - Aardwolf Security
Facts About Social Engineering Services - Aardwolf SecurityFacts About Social Engineering Services - Aardwolf Security
Facts About Social Engineering Services - Aardwolf Security
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 

More from uzair

Understanding Cyber Threat Intelligence A Guide for Analysts.pdf
Understanding Cyber Threat Intelligence A Guide for Analysts.pdfUnderstanding Cyber Threat Intelligence A Guide for Analysts.pdf
Understanding Cyber Threat Intelligence A Guide for Analysts.pdf
uzair
 
Git Tutorial A Comprehensive Guide for Beginners.pdf
Git Tutorial A Comprehensive Guide for Beginners.pdfGit Tutorial A Comprehensive Guide for Beginners.pdf
Git Tutorial A Comprehensive Guide for Beginners.pdf
uzair
 
A Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdfA Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdf
uzair
 
Top 5 Programming Languages for Hacking.pdf
Top 5 Programming Languages for Hacking.pdfTop 5 Programming Languages for Hacking.pdf
Top 5 Programming Languages for Hacking.pdf
uzair
 
How to Detect and Remove Malware from a Hacked Linux System.pdf
How to Detect and Remove Malware from a Hacked Linux System.pdfHow to Detect and Remove Malware from a Hacked Linux System.pdf
How to Detect and Remove Malware from a Hacked Linux System.pdf
uzair
 
What is web Attack tools.pdf
What is web Attack tools.pdfWhat is web Attack tools.pdf
What is web Attack tools.pdf
uzair
 
What is Remote Administration Tools (RAT).pdf
What is Remote Administration Tools (RAT).pdfWhat is Remote Administration Tools (RAT).pdf
What is Remote Administration Tools (RAT).pdf
uzair
 
Top Tools Used in XSS Attacks.pdf
Top Tools Used in XSS Attacks.pdfTop Tools Used in XSS Attacks.pdf
Top Tools Used in XSS Attacks.pdf
uzair
 
What is SocialMedia Bruteforce.pdf
What is SocialMedia Bruteforce.pdfWhat is SocialMedia Bruteforce.pdf
What is SocialMedia Bruteforce.pdf
uzair
 
What is Payload Injector.pdf
What is Payload Injector.pdfWhat is Payload Injector.pdf
What is Payload Injector.pdf
uzair
 
What is a Zero-Day Exploit Understanding the Threat of Unknown Vulnerabilitie...
What is a Zero-Day Exploit Understanding the Threat of Unknown Vulnerabilitie...What is a Zero-Day Exploit Understanding the Threat of Unknown Vulnerabilitie...
What is a Zero-Day Exploit Understanding the Threat of Unknown Vulnerabilitie...
uzair
 
What is Remote Buffer Overflow Attack.pdf
What is Remote Buffer Overflow Attack.pdfWhat is Remote Buffer Overflow Attack.pdf
What is Remote Buffer Overflow Attack.pdf
uzair
 
How to Use Linux Forensic Analysis Tools for Digital Investigations.pdf
How to Use Linux Forensic Analysis Tools for Digital Investigations.pdfHow to Use Linux Forensic Analysis Tools for Digital Investigations.pdf
How to Use Linux Forensic Analysis Tools for Digital Investigations.pdf
uzair
 
Top Tools Used by Blue Teams in Cybersecurity.pdf
Top Tools Used by Blue Teams in Cybersecurity.pdfTop Tools Used by Blue Teams in Cybersecurity.pdf
Top Tools Used by Blue Teams in Cybersecurity.pdf
uzair
 
How to Hack Windows on Linux A Comprehensive Guide.pdf
How to Hack Windows on Linux A Comprehensive Guide.pdfHow to Hack Windows on Linux A Comprehensive Guide.pdf
How to Hack Windows on Linux A Comprehensive Guide.pdf
uzair
 
What Are Script Kiddies.pdf
What Are Script Kiddies.pdfWhat Are Script Kiddies.pdf
What Are Script Kiddies.pdf
uzair
 
Using Kali Linux Tools for Illegal Services.pdf
Using Kali Linux Tools for Illegal Services.pdfUsing Kali Linux Tools for Illegal Services.pdf
Using Kali Linux Tools for Illegal Services.pdf
uzair
 
How to Execute Virus Target with CMD Commands.pdf
How to Execute Virus Target with CMD Commands.pdfHow to Execute Virus Target with CMD Commands.pdf
How to Execute Virus Target with CMD Commands.pdf
uzair
 
Hacking Tools A Comprehensive Guide for Black Hat Hackers.pdf
Hacking Tools A Comprehensive Guide for Black Hat Hackers.pdfHacking Tools A Comprehensive Guide for Black Hat Hackers.pdf
Hacking Tools A Comprehensive Guide for Black Hat Hackers.pdf
uzair
 
Botnet Attacks How They Work and How to Defend Against Them.pdf
Botnet Attacks How They Work and How to Defend Against Them.pdfBotnet Attacks How They Work and How to Defend Against Them.pdf
Botnet Attacks How They Work and How to Defend Against Them.pdf
uzair
 

More from uzair (20)

Understanding Cyber Threat Intelligence A Guide for Analysts.pdf
Understanding Cyber Threat Intelligence A Guide for Analysts.pdfUnderstanding Cyber Threat Intelligence A Guide for Analysts.pdf
Understanding Cyber Threat Intelligence A Guide for Analysts.pdf
 
Git Tutorial A Comprehensive Guide for Beginners.pdf
Git Tutorial A Comprehensive Guide for Beginners.pdfGit Tutorial A Comprehensive Guide for Beginners.pdf
Git Tutorial A Comprehensive Guide for Beginners.pdf
 
A Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdfA Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdf
 
Top 5 Programming Languages for Hacking.pdf
Top 5 Programming Languages for Hacking.pdfTop 5 Programming Languages for Hacking.pdf
Top 5 Programming Languages for Hacking.pdf
 
How to Detect and Remove Malware from a Hacked Linux System.pdf
How to Detect and Remove Malware from a Hacked Linux System.pdfHow to Detect and Remove Malware from a Hacked Linux System.pdf
How to Detect and Remove Malware from a Hacked Linux System.pdf
 
What is web Attack tools.pdf
What is web Attack tools.pdfWhat is web Attack tools.pdf
What is web Attack tools.pdf
 
What is Remote Administration Tools (RAT).pdf
What is Remote Administration Tools (RAT).pdfWhat is Remote Administration Tools (RAT).pdf
What is Remote Administration Tools (RAT).pdf
 
Top Tools Used in XSS Attacks.pdf
Top Tools Used in XSS Attacks.pdfTop Tools Used in XSS Attacks.pdf
Top Tools Used in XSS Attacks.pdf
 
What is SocialMedia Bruteforce.pdf
What is SocialMedia Bruteforce.pdfWhat is SocialMedia Bruteforce.pdf
What is SocialMedia Bruteforce.pdf
 
What is Payload Injector.pdf
What is Payload Injector.pdfWhat is Payload Injector.pdf
What is Payload Injector.pdf
 
What is a Zero-Day Exploit Understanding the Threat of Unknown Vulnerabilitie...
What is a Zero-Day Exploit Understanding the Threat of Unknown Vulnerabilitie...What is a Zero-Day Exploit Understanding the Threat of Unknown Vulnerabilitie...
What is a Zero-Day Exploit Understanding the Threat of Unknown Vulnerabilitie...
 
What is Remote Buffer Overflow Attack.pdf
What is Remote Buffer Overflow Attack.pdfWhat is Remote Buffer Overflow Attack.pdf
What is Remote Buffer Overflow Attack.pdf
 
How to Use Linux Forensic Analysis Tools for Digital Investigations.pdf
How to Use Linux Forensic Analysis Tools for Digital Investigations.pdfHow to Use Linux Forensic Analysis Tools for Digital Investigations.pdf
How to Use Linux Forensic Analysis Tools for Digital Investigations.pdf
 
Top Tools Used by Blue Teams in Cybersecurity.pdf
Top Tools Used by Blue Teams in Cybersecurity.pdfTop Tools Used by Blue Teams in Cybersecurity.pdf
Top Tools Used by Blue Teams in Cybersecurity.pdf
 
How to Hack Windows on Linux A Comprehensive Guide.pdf
How to Hack Windows on Linux A Comprehensive Guide.pdfHow to Hack Windows on Linux A Comprehensive Guide.pdf
How to Hack Windows on Linux A Comprehensive Guide.pdf
 
What Are Script Kiddies.pdf
What Are Script Kiddies.pdfWhat Are Script Kiddies.pdf
What Are Script Kiddies.pdf
 
Using Kali Linux Tools for Illegal Services.pdf
Using Kali Linux Tools for Illegal Services.pdfUsing Kali Linux Tools for Illegal Services.pdf
Using Kali Linux Tools for Illegal Services.pdf
 
How to Execute Virus Target with CMD Commands.pdf
How to Execute Virus Target with CMD Commands.pdfHow to Execute Virus Target with CMD Commands.pdf
How to Execute Virus Target with CMD Commands.pdf
 
Hacking Tools A Comprehensive Guide for Black Hat Hackers.pdf
Hacking Tools A Comprehensive Guide for Black Hat Hackers.pdfHacking Tools A Comprehensive Guide for Black Hat Hackers.pdf
Hacking Tools A Comprehensive Guide for Black Hat Hackers.pdf
 
Botnet Attacks How They Work and How to Defend Against Them.pdf
Botnet Attacks How They Work and How to Defend Against Them.pdfBotnet Attacks How They Work and How to Defend Against Them.pdf
Botnet Attacks How They Work and How to Defend Against Them.pdf
 

Recently uploaded

A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
DharmaBanothu
 
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
MadhavJungKarki
 
Ericsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.pptEricsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.ppt
wafawafa52
 
AI in customer support Use cases solutions development and implementation.pdf
AI in customer support Use cases solutions development and implementation.pdfAI in customer support Use cases solutions development and implementation.pdf
AI in customer support Use cases solutions development and implementation.pdf
mahaffeycheryld
 
Presentation on Food Delivery Systems
Presentation on Food Delivery SystemsPresentation on Food Delivery Systems
Presentation on Food Delivery Systems
Abdullah Al Noman
 
openshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoinopenshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoin
snaprevwdev
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
aryanpankaj78
 
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
ijseajournal
 
Digital Image Processing Unit -2 Notes complete
Digital Image Processing Unit -2 Notes completeDigital Image Processing Unit -2 Notes complete
Digital Image Processing Unit -2 Notes complete
shubhamsaraswat8740
 
Levelised Cost of Hydrogen (LCOH) Calculator Manual
Levelised Cost of Hydrogen  (LCOH) Calculator ManualLevelised Cost of Hydrogen  (LCOH) Calculator Manual
Levelised Cost of Hydrogen (LCOH) Calculator Manual
Massimo Talia
 
Blood finder application project report (1).pdf
Blood finder application project report (1).pdfBlood finder application project report (1).pdf
Blood finder application project report (1).pdf
Kamal Acharya
 
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Transcat
 
SCALING OF MOS CIRCUITS m .pptx
SCALING OF MOS CIRCUITS m                 .pptxSCALING OF MOS CIRCUITS m                 .pptx
SCALING OF MOS CIRCUITS m .pptx
harshapolam10
 
OOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming languageOOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming language
PreethaV16
 
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICSUNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
vmspraneeth
 
Introduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.pptIntroduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.ppt
Dwarkadas J Sanghvi College of Engineering
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
PriyankaKilaniya
 
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptxSENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
b0754201
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
nedcocy
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
PreethaV16
 

Recently uploaded (20)

A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
 
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
 
Ericsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.pptEricsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.ppt
 
AI in customer support Use cases solutions development and implementation.pdf
AI in customer support Use cases solutions development and implementation.pdfAI in customer support Use cases solutions development and implementation.pdf
AI in customer support Use cases solutions development and implementation.pdf
 
Presentation on Food Delivery Systems
Presentation on Food Delivery SystemsPresentation on Food Delivery Systems
Presentation on Food Delivery Systems
 
openshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoinopenshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoin
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
 
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
 
Digital Image Processing Unit -2 Notes complete
Digital Image Processing Unit -2 Notes completeDigital Image Processing Unit -2 Notes complete
Digital Image Processing Unit -2 Notes complete
 
Levelised Cost of Hydrogen (LCOH) Calculator Manual
Levelised Cost of Hydrogen  (LCOH) Calculator ManualLevelised Cost of Hydrogen  (LCOH) Calculator Manual
Levelised Cost of Hydrogen (LCOH) Calculator Manual
 
Blood finder application project report (1).pdf
Blood finder application project report (1).pdfBlood finder application project report (1).pdf
Blood finder application project report (1).pdf
 
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
 
SCALING OF MOS CIRCUITS m .pptx
SCALING OF MOS CIRCUITS m                 .pptxSCALING OF MOS CIRCUITS m                 .pptx
SCALING OF MOS CIRCUITS m .pptx
 
OOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming languageOOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming language
 
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICSUNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
 
Introduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.pptIntroduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.ppt
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
 
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptxSENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
 

What is social engineering.pdf

  • 1. What is social engineering? ByCyber Security Expert DEC 20, 2022 #Baiting, #Best practices to protect against social engineering, #Common Social Engineering Tactics, #Goals of Social Engineering, #Identifying Social Engineering Attacks, #Phishing, #Pretexting, #Scareware, #Social Engineering and Cybersecurity, #Types of Social Engineering, #Understanding Social Engineering, #What is social engineering? I. Introduction A. Definition of social engineering B. Examples of social engineering attacks II. Understanding Social Engineering A. Types of Social Engineering B. Goals of Social Engineering III. Common Social Engineering Tactics A. Phishing B. Pretexting C. Baiting D. Scareware IV. Social Engineering and Cybersecurity A. Identifying Social Engineering Attacks B.
  • 2. Best practices to protect against social engineering V. Conclusion A. Recap of social engineering B. Importance of awareness Table of Contents ​ What is social engineering? ​ Understanding Social Engineering ​ Types of Social Engineering ​ Phishing ​ Pretexting ​ Baiting ​ Scareware ​ Goals of Social Engineering ​ Common Social Engineering Tactics ​ Phishing ​ Pretexting ​ Baiting ​ Scareware ​ Social Engineering and Cybersecurity ​ Identifying Social Engineering Attacks ​ Best practices to protect against social engineering ​ Conclusion ​ FAQs What is social engineering? In the digital age, criminals have found new ways to steal valuable information from individuals and organizations. One of the most effective tactics they use is social engineering. Social engineering is the act of manipulating people into divulging confidential information or performing actions that are not in their best interests. In this article, we will explore what social engineering is, how it works, and how you can protect yourself from it. Understanding Social Engineering
  • 3. Types of Social Engineering Social engineering can take many forms, from phishing emails to pretexting phone calls. The most common types of social engineering attacks include: Phishing Phishing attacks are one of the most common social engineering tactics. In a phishing attack, a criminal will send an email that appears to be from a legitimate source, such as a bank or an online retailer. The email will typically ask the recipient to click on a link and enter their personal information, such as their login credentials or credit card number. Once the victim enters this information, the criminal can use it to steal their identity or commit fraud. Pretexting Pretexting is another common social engineering tactic. In a pretexting attack, the criminal will create a fake scenario to gain the victim’s trust. For example, the criminal may pretend to be a bank employee and ask the victim to verify their account information. Once the victim provides this information, the criminal can use it for fraudulent purposes. Baiting Baiting attacks involve the criminal offering the victim something of value, such as a free USB drive or a gift card, in exchange for their personal information. Once the victim takes the bait, the criminal can use their personal information for malicious purposes. Scareware Scareware attacks involve the criminal creating fake security alerts or pop-up messages to scare the victim into taking action. For example, the victim may be told that their computer is infected with a virus and instructed to download a fake antivirus program. Once the victim downloads the program, the criminal can use it to steal their personal information.
  • 4. Goals of Social Engineering The ultimate goal of social engineering attacks is to obtain valuable information, such as login credentials, credit card numbers, or other sensitive data. Criminals can use this information for a variety of purposes, including identity theft, fraud, or espionage. Social engineering attacks can also be used to gain access to secure systems or networks, allowing criminals to steal intellectual property or conduct other nefarious activities. Common Social Engineering Tactics To protect yourself from social engineering attacks, it is important to be aware of common tactics that criminals use. Phishing To protect against phishing attacks, you should: ● Always verify that the sender is legitimate before providing any personal information ● Use anti-phishing software to block known phishing sites and emails Pretexting To protect against pretexting attacks, you should: ● Never provide personal information over the phone or via email unless you are certain of the identity of the requester ● Verify the legitimacy of any requests for personal information before providing it Baiting To protect against baiting attacks, you should: ● Never accept free gifts or items from strangers, especially if they ask for personal information in exchange ● Be wary of unsolicited emails or messages that offer free items or downloads
  • 5. Scareware To protect against scareware attacks, you should: ● Always use legitimate antivirus software and keep it up to date ● Be skeptical of pop-up messages or alerts that claim your computer is infected with a virus Social Engineering and Cybersecurity Social engineering attacks are a major threat to cybersecurity. To protect against these attacks, it is important to take a proactive approach. Here are a few best practices to help you protect yourself: Identifying Social Engineering Attacks The first step in protecting against social engineering attacks is to be able to identify them. Here are some signs that an email, message, or phone call may be a social engineering attack: ● The sender or requester is unknown or suspicious ● The message or request is urgent or creates a sense of panic ● The message contains misspellings or grammatical errors ● The message contains a request for personal information or asks you to perform an action that seems unusual Best practices to protect against social engineering To protect against social engineering attacks, you should: ● Enable two-factor authentication whenever possible ● Regularly back up your data to protect against loss or theft Conclusion
  • 6. By understanding how these attacks work and taking steps to protect yourself, you can reduce your risk of becoming a victim. Remember to be vigilant, always verify requests for personal information, and use strong security practices to protect your data. FAQs ● To protect yourself from social engineering attacks, you should be aware of common tactics, use strong and unique passwords, enable two-factor authentication, keep your software up to date, and back up your data regularly.