We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byHaley Barrett
Modified over 3 years ago
Copyright © 2011 IsecT Ltd. Social engineering Spot it and stop it September 2011 Security awareness seminar
Copyright © 2011 IsecT Ltd. Slide 2 Introduction Social engineering is a way of tricking people into doing things they shouldnt do, such as disclosing secrets
Copyright © 2011 IsecT Ltd. Slide 3 Blending-in
Copyright © 2011 IsecT Ltd. Slide 4 Who are social engineers? Kids, partners, friends Sales reps Hackers, virus writers Journalists Jilted lovers Industrial spies & unethical competitors Private investigators Spies Former, current or prospective employees Visitors, phone callers, emailers, chatters, gift givers, friends …
Copyright © 2011 IsecT Ltd. Slide 5 New tricks Fake survey or prize draw Discarded USB stick, CD, cellphone … Note on the windshield, FAX, letter … Fake maintenance worker, courier, cleaner, auditor, customer, supplier, manager, executive assistant … Lottery win, inheritance or tax refund … Stuck in a hotel, wallet stolen, in a fix Friend or friend of a friend Check out this cool video … Fake job ad and interview
Copyright © 2011 IsecT Ltd. Slide 6 How they do it
Copyright © 2011 IsecT Ltd. Slide 7 Clues to watch out for Have you ever been pestered by a persistent, pushy sales rep, trying hard to sell you something you really dont want? Parents of 7 year olds will probably appreciate their ability to manipulate us into doing what they want
Copyright © 2011 IsecT Ltd. Slide 8 Warning signs Unexpected callers or visitors probing your for information or acting suspiciously Unusual requests, FAXes, emails, text messages, Tweets or phone calls Probing, pushy or threatening behavior Name-dropping or using company slang out of context Evasive, defensive or aggressive reaction when asked to verify their identity Nervousness and other nonspecific clues
Copyright © 2011 IsecT Ltd. Slide 9 DART them! D elay A uthenticate R esist T ransfer
Copyright © 2011 IsecT Ltd. Slide 10 Front-line defenses I just need to confirm your voicemail : could you reset your PIN code to 1234 please? Mmmm, sounds fishy … Id better refer this call to IT
Copyright © 2011 IsecT Ltd. Slide 11 Other aspects
Copyright © 2011 IsecT Ltd. Slide 12 Conclusion Be alert for the signs that someone might be socially engineering you, and DART ( D elay, A uthenticate, R esist and T ransfer) them! Report possible social engineering incidents, suspicious calls and near misses to IT Help/Service Desk Help us create a stronger security culture
Copyright © 2011 IsecT Ltd. Slide 13 Further information Speak to your manager, call the IT Help/Service desk or contact Information Security. Discuss social engineering with your work colleagues and family. Visit the intranet Security Zone.
Copyright © 2011 IsecT Ltd. Securing people Security awareness seminar for IT professionals Information Security Awareness September 2011.
Building our security culture
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
BTT12OI. Do you know someone who has been scammed? What happened? Been tricked into sending someone else money (not who they thought they were)
JANELL LAYSER Training Manual. AWARENESS! Social Engineers are out there, and everyone should be prepared to deal with them! They can contact you by phone,
Social Engineering PA Turnpike Commission. “Social Engineering is the practice of obtaining confidential information by manipulation of legitimate users”
BTT12OI. Do you know someone who has been scammed online? What happened? Been tricked into sending someone else money (not who they thought they were)
Designed By: Jennifer Gohn. “Getting people to do things they wouldn’t ordinarily do for a stranger” –Kevin Mitnick There are several different.
Common Scams Lewis Collantine & Clare Cunningham Thurrock Trading Standards 8 th September 2015.
What is identity theft, and how can you protect yourself from it?
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Jeff loses his identity! Lesson 8: Identity Theft.
SAFETY What to be aware of and how to avoid problems. **This is not meant to make you fearful of . The goal of this discussion is to make sure.
that keeping money and personal information safe is very important That losing money or having personal information stolen can be distressing.
What you don’t know CAN hurt you! SMART Surfing. Be SMART when socializing, shopping, working or playing online: You are responsible for the quality of.
Fraud Protection. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
Facebook Twitter MySpace Windows LiveSpace.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
Linked-In Basics and Networking Tool Finding your way into the right connection.
1 Hands Off My $$! Preventing & Reporting Financial Abuse Presented by Office of Clients Rights Advocacy.
5. MAKING REQUESTS BUSINESS ENGLISH CONVERSATION & LISTENING Instructor: Hsin-Hsin Cindy Lee, PhD.
Social Engineering Training. Training Goals Increase Laboratory Awareness. Provide the tools required to identify, avoid and report advanced Social Engineering.
Scams & Schemes Common Sense Media. Vocabulary Scam Identity Theft – an attempt to trick someone, usually with the intention of stealing money or.
Jeff loses his identity! Lesson 5: Identity Theft.
Friday June 6, 2014 OBJ: SWBAT understand what identity theft is, what the consequences are, and how to prevent it. Drill: What statement is this cartoon.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
2nd Annual Financial Wellness Conference by Money Management Counselors Ken M. Shaurette, CISSP, CISA, CISM, CRISC FIPCO a subsidiary of the Wisconsin.
Protecting Your Assets By Preventing Identity Theft 1.
Slides by Kent Seamons and Tim van der Horst Last Updated: Nov 30, 2011.
1 RXQ Customer Drop Submitted by Supplier Process Flow Diagram Customer Supplier Distribution Company Supplier sends Drop Request to Distribution.
Security Awareness Lloyd Guyot – Steelcase Ed Jaros – Tenundra Inc. July 17, 2003.
High School Safe Environment “Boundaries – Part One” Resources and Assessment Materials.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Internet Fraud By Jessica Habermehl &Ally Erwine Period 9.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Social Engineering Training. Why Social Engineering Training? The Department of Energy (DOE) authorized the Red Team to perform vulnerability assessments.
1 Online Self-Defense: Avoiding Scams Chau Mai December 5, 2013.
Scams and Schemes VICTORIA ISD COMMON SENSE MEDIA GRADE 6: SCAMS AND SCHEMES.
Sales Training Presented by [Name]. Company overview Job responsibilities Company message Competitors.
ECONOMIC EDUCATION FOR CONSUMERS ○ Chapter 4 WHAT’S AHEAD 4.1Get to Know Yourself 4.2Explore Careers 4.3Apply for a Job 4.4Interview Successfully 4.5Prepare.
Marketing and Public Relations By danny relacion.
Today’s Agenda… Knowledge Check What is Cyber Crime? Identity Theft Phishing Common Scams inc. online and mobile phone scams Prevention Methods.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Staying safe at home Your home should be a safe place. Most callers to your home will be people you know. But you need to be careful when people you don’t.
Information Security 2013 Roadshow. Roadshow Outline Why We Care About Information Security Safe Computing Recognize a Secure Web Site (HTTPS) How.
© 2017 SlidePlayer.com Inc. All rights reserved.