We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byHaley Barrett
Modified over 3 years ago
Copyright © 2011 IsecT Ltd. Social engineering Spot it and stop it September 2011 Security awareness seminar
Copyright © 2011 IsecT Ltd. Slide 2 Introduction Social engineering is a way of tricking people into doing things they shouldnt do, such as disclosing secrets
Copyright © 2011 IsecT Ltd. Slide 3 Blending-in
Copyright © 2011 IsecT Ltd. Slide 4 Who are social engineers? Kids, partners, friends Sales reps Hackers, virus writers Journalists Jilted lovers Industrial spies & unethical competitors Private investigators Spies Former, current or prospective employees Visitors, phone callers, ers, chatters, gift givers, friends …
Copyright © 2011 IsecT Ltd. Slide 5 New tricks Fake survey or prize draw Discarded USB stick, CD, cellphone … Note on the windshield, FAX, letter … Fake maintenance worker, courier, cleaner, auditor, customer, supplier, manager, executive assistant … Lottery win, inheritance or tax refund … Stuck in a hotel, wallet stolen, in a fix Friend or friend of a friend Check out this cool video … Fake job ad and interview
Copyright © 2011 IsecT Ltd. Slide 6 How they do it
Copyright © 2011 IsecT Ltd. Slide 7 Clues to watch out for Have you ever been pestered by a persistent, pushy sales rep, trying hard to sell you something you really dont want? Parents of 7 year olds will probably appreciate their ability to manipulate us into doing what they want
Copyright © 2011 IsecT Ltd. Slide 8 Warning signs Unexpected callers or visitors probing your for information or acting suspiciously Unusual requests, FAXes, s, text messages, Tweets or phone calls Probing, pushy or threatening behavior Name-dropping or using company slang out of context Evasive, defensive or aggressive reaction when asked to verify their identity Nervousness and other nonspecific clues
Copyright © 2011 IsecT Ltd. Slide 9 DART them! D elay A uthenticate R esist T ransfer
Copyright © 2011 IsecT Ltd. Slide 10 Front-line defenses I just need to confirm your voic could you reset your PIN code to 1234 please? Mmmm, sounds fishy … Id better refer this call to IT
Copyright © 2011 IsecT Ltd. Slide 11 Other aspects
Copyright © 2011 IsecT Ltd. Slide 12 Conclusion Be alert for the signs that someone might be socially engineering you, and DART ( D elay, A uthenticate, R esist and T ransfer) them! Report possible social engineering incidents, suspicious calls and near misses to IT Help/Service Desk Help us create a stronger security culture
Copyright © 2011 IsecT Ltd. Slide 13 Further information Speak to your manager, call the IT Help/Service desk or contact Information Security. Discuss social engineering with your work colleagues and family. Visit the intranet Security Zone.
Copyright © 2011 IsecT Ltd. Securing people Security awareness seminar for IT professionals Information Security Awareness September 2011.
Information Security Awareness Copyright © 2011 IsecT Ltd. September 2011 Management seminar Building our security culture.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Facebook Twitter MySpace Windows LiveSpace.
BTT12OI. Do you know someone who has been scammed online? What happened? Been tricked into sending someone else money (not who they thought they were)
Social Engineering PA Turnpike Commission. “Social Engineering is the practice of obtaining confidential information by manipulation of legitimate users”
BTT12OI. Do you know someone who has been scammed? What happened? Been tricked into sending someone else money (not who they thought they were)
What is identity theft, and how can you protect yourself from it?
Scams & Schemes Common Sense Media. Vocabulary Scam Identity Theft – an attempt to trick someone, usually with the intention of stealing money or.
Linked-In Basics and Networking Tool Finding your way into the right connection.
1 Hands Off My $$! Preventing & Reporting Financial Abuse Presented by Office of Clients Rights Advocacy.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
that keeping money and personal information safe is very important That losing money or having personal information stolen can be distressing.
5. MAKING REQUESTS BUSINESS ENGLISH CONVERSATION & LISTENING Instructor: Hsin-Hsin Cindy Lee, PhD.
THE NIGERIAN SCAM Also known as the 419 scam- because this is the code section in the Nigerian Criminal Code that makes this activity illegal.
JANELL LAYSER Training Manual. AWARENESS! Social Engineers are out there, and everyone should be prepared to deal with them! They can contact you by phone,
As some of you may know its not that safe to go online. So we the student council are here to teach you how to be safe online. This is all you need to.
What you don’t know CAN hurt you! SMART Surfing. Be SMART when socializing, shopping, working or playing online: You are responsible for the quality of.
Consumer Rights & Responsibilities Senior Advisory May/June, 2013 Information created from “Managing Your Personal Finances” by Joan Ryan.
Staying safe at home Your home should be a safe place. Most callers to your home will be people you know. But you need to be careful when people you don’t.
How to Act Safely: Tips and Tricks! Corporate Security.
Identity Theft and You Presented to Delta Kappa Gamma February 4, 2006 – Beeville, Texas By: Brian T. Burris The Burris Law Firm.
Choose two areas and write the language you can remember!! LANGUAGE TO HELP YOU I can remember.... We studied about... We did... We had a lesson on...
Designed By: Jennifer Gohn. “Getting people to do things they wouldn’t ordinarily do for a stranger” –Kevin Mitnick There are several different.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
SCAMS & SCHEMES PROTECTING YOUR IDENTITY. SCAMS WHAT IS A SCAM? ATTEMPT TO TRICK SOMEONE, USUALLY WITH THE INTENTION OF STEALING MONEY OR PRIVATE INFORMATION.
Safer Internet Day. What do you use the Internet for? watching TV shows watching online videos playing gamestalking to friends homeworkfinding out things.
© 2017 SlidePlayer.com Inc. All rights reserved.