cyber security social engineering
play

Cyber Security: Social Engineering Mid-America Technology Alliance - PowerPoint PPT Presentation

Cyber Security: Social Engineering Mid-America Technology Alliance Wednesday June 18th, 2015 What is Social Engineering? Social engineering, in the context of information security, is the art of manipulating people so they give up


  1. Cyber Security: Social Engineering Mid-America Technology Alliance Wednesday June 18th, 2015

  2. What is Social Engineering? Social engineering, in the context of information security, is the art of manipulating people so they give up confidential information.

  3. Social Engineering: Pretexting Use information from prior research to establish legitimacy in the mind of the victim. “This is Joel from IT, calling to install the new backup software on your computer.” “This is John with Customer XYZ, calling to reset my email password.”

  4. Social Engineering: Phishing Email appears to come from your bank or credit card company requesting “verification” of information with link to fake website. “Your account has been compromised. Login to your account and change your password.” Avoid links and phone numbers in emails.

  5. Social Engineering: Phone Phishing Recreate a legitimate-sounding copy of a phone system on a different phone number. “Thank you for calling Bank of America. Please enter your 16 digit credit card number now.” “We were unable to verify your account. Transferring you to a customer care specialist.”

  6. Social Engineering: Baiting Attacker leaves malware-infected flash drive in a location sure to be found and waits for a victim to use the device. Label drive as “Work”, “Personal”, “Home”, etc. Never use unknown discs or flash drives!

  7. Social Engineering: Quid Pro Quo Something for something. Call victim claiming to be returning call from tech support. Help “solve” problem, and in process, have user type commands that give access or launch malware. Always verify incoming callers or call them back at known phone number!

  8. Social Engineering: Tailgating Attacker seeking entry to a restricted area secured by unattended electronic access control simply walks in behind a person who has legitimate access. Avoid being “too nice”. Holding doors for unknown people carrying large boxes, not questioning people who are on the phone, etc.

  9. Social Engineering: Countermeasures ● Think twice before providing sensitive info or access to unknown people. ● Verify incoming callers or call them back at a known phone number. ● Verify incoming emails or reply to a known email address. ● Avoid using unknown discs or flash drives.

  10. Social Engineering: Contact Info Jason Klein, CEO Datility Networks, Inc. 316-282-0774 x3400 jason.klein@datility.net

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend