We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byHaley Barrett
Modified over 2 years ago
Copyright © 2011 IsecT Ltd. Social engineering Spot it and stop it September 2011 Security awareness seminar
Copyright © 2011 IsecT Ltd. Slide 2 Introduction Social engineering is a way of tricking people into doing things they shouldnt do, such as disclosing secrets
Copyright © 2011 IsecT Ltd. Slide 3 Blending-in
Copyright © 2011 IsecT Ltd. Slide 4 Who are social engineers? Kids, partners, friends Sales reps Hackers, virus writers Journalists Jilted lovers Industrial spies & unethical competitors Private investigators Spies Former, current or prospective employees Visitors, phone callers, ers, chatters, gift givers, friends …
Copyright © 2011 IsecT Ltd. Slide 5 New tricks Fake survey or prize draw Discarded USB stick, CD, cellphone … Note on the windshield, FAX, letter … Fake maintenance worker, courier, cleaner, auditor, customer, supplier, manager, executive assistant … Lottery win, inheritance or tax refund … Stuck in a hotel, wallet stolen, in a fix Friend or friend of a friend Check out this cool video … Fake job ad and interview
Copyright © 2011 IsecT Ltd. Slide 6 How they do it
Copyright © 2011 IsecT Ltd. Slide 7 Clues to watch out for Have you ever been pestered by a persistent, pushy sales rep, trying hard to sell you something you really dont want? Parents of 7 year olds will probably appreciate their ability to manipulate us into doing what they want
Copyright © 2011 IsecT Ltd. Slide 8 Warning signs Unexpected callers or visitors probing your for information or acting suspiciously Unusual requests, FAXes, s, text messages, Tweets or phone calls Probing, pushy or threatening behavior Name-dropping or using company slang out of context Evasive, defensive or aggressive reaction when asked to verify their identity Nervousness and other nonspecific clues
Copyright © 2011 IsecT Ltd. Slide 9 DART them! D elay A uthenticate R esist T ransfer
Copyright © 2011 IsecT Ltd. Slide 10 Front-line defenses I just need to confirm your voic could you reset your PIN code to 1234 please? Mmmm, sounds fishy … Id better refer this call to IT
Copyright © 2011 IsecT Ltd. Slide 11 Other aspects
Copyright © 2011 IsecT Ltd. Slide 12 Conclusion Be alert for the signs that someone might be socially engineering you, and DART ( D elay, A uthenticate, R esist and T ransfer) them! Report possible social engineering incidents, suspicious calls and near misses to IT Help/Service Desk Help us create a stronger security culture
Copyright © 2011 IsecT Ltd. Slide 13 Further information Speak to your manager, call the IT Help/Service desk or contact Information Security. Discuss social engineering with your work colleagues and family. Visit the intranet Security Zone.
Copyright © 2011 IsecT Ltd. Securing people Security awareness seminar for IT professionals Information Security Awareness September 2011.
Information Security Awareness Copyright © 2011 IsecT Ltd. September 2011 Management seminar Building our security culture.
As some of you may know its not that safe to go online. So we the student council are here to teach you how to be safe online. This is all you need to.
Phishing, what you should know L kout Initiative.
Objective 7.03 Understand ways to avoid identity theft. Identity Theft.
A note for you We have created this presentation for you, the outstanding employee who has IT security on the brain. We want to help you spread the word.
Fraud Protection. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
Geneva Public Library February 15th, What is ? How many of you have had accounts before?
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Laptop For Workers By: Sherifa Malalla 7B. Paragraph #1 How did I become involved in this project? I chose this project because I like helping people.
NEXT LEVEL TRAINING RAMPING UP REFERRALS TAKING YOU TO YOUR NEXT LEVEL.
ING Fraud Collection GPCE Credit Union has arranged a collection of scams, outlining the most prevalent financial scams. We want our members to be aware,
What Are Scams? Scams are designed to trick you into giving away your money or your personal details. Scams come to you in many forms – by mail, ,
Bonnygate Primary School E-Safety Workshop. Safer Internet Day Survey 2013 Primary age children are highly engaged with digital technology: 86% of 7-11s.
*Prep for This Weeks Session* Notes for Managers: Review the slides prior to your sales meeting. Be prepared to read and go over the dialogue on the slides,
What people in my school and community think about the police and what they do: a small-scale study Christopher Orme age 10 age 10.
Safe Surfing Tips Internet Safety Tips for Teens By: LaQuacious Garrett.
Predator Identification Internet Safety Awareness For presentation at Mayfield Intermediate.
1 PRESENTATION TITLE 1 The Streetwise Security Zone Presents Turning Swiss Cheese Into Hard Candy Scott Wright The Streetwise Security Coach
TAB East Bay North The Alternative Board The Real Secrets of the Top 20% By Mike Brooks.
Internet Safety at Work Protect company, customer, and your data online.
Preventing Its More Than Just Your Wallet…. Identity Theft One New Identity Theft Victim Every 3 Seconds in 2012 (Javelin Strategy & Researchs 2012 Identity.
When Im at work: Solving problems. Have you had a problem at work? Do you wish you had handled it better? 2.
CHAPTER FIVE The Sales Presentation 5 Ways to Make It Pay Off.
How do I talk to my child about Internet safety? How do I protect my child from cyberbullying? What do I do if my child is cyberbullied? What information.
1 Copyright © 2011, 2007, 2003, 1999 by Saunders, an imprint of Elsevier Inc. All rights reserved. Telephone Techniques Chapter 9.
CYBER SECURITY October 2009 ARE YOU AWARE? The Federal Trade Commission reports that: For the seventh year in a row, identity theft tops the list, accounting.
2010 State Employees Campaign New Coordinators Course.
Chapter 3 Looking for a Job. Getting Ready for Work Legal Documents needed: –Social Security Number –Work Permit.
D1.HRS.CL1.04 D1.HOT.CL1.07 D2.TCC.CL1.05 Slide 1.
© 2016 SlidePlayer.com Inc. All rights reserved.