Presented by: Casey Mullins Social Engineering - Persuasion -

Slides:



Advertisements
Similar presentations
Ihr Logo Speaking to Persuade Chapter 7. p119~. Your Logo Opinion is ultimately determined by the feelings, not the intellect. (Herbert Spencer)
Advertisements

Influence, Empowerment, & Politics
Influence, Power, and Politics (An Organizational Survival Kit)
Social Engineering And You Steve Otto. Social Engineering n Social Engineering - Getting people to do things they ordinarily wouldn’t do for a stranger.
Kelly Corning Julie Sharp.  Human-based techniques: impersonation  Computer-based techniques: malware and scams.
Chapter 9: Social Influence: Changing Others’ Behavior
Propaganda and Persuasion Techniques people use to make you believe what they have to say.
Social Engineering Networks Reid Chapman Ciaran Hannigan.
Overview  How do we perceive people?  How do we form and change attitudes?  How are we attracted to others?  How do others influence our behavior?
Influence Tactics, Empowerment and Politics
The Art of Deception - Controlling Human Element of Security - Shohei Hagiwara November 17th, 2009.
Power and Politics Chapter 10
Social Engineering PA Turnpike Commission. “Social Engineering is the practice of obtaining confidential information by manipulation of legitimate users”
Desia Dunn Elaboration Likelihood Model (Chapter 5- Persuasion)
1 The Purpose of Written Communication “Think now; write later”. ● Before one can begin to plan the “How”, he or she has to understand the “Why” of business.
Chapter 9 Self-Presentation and Impression Management.
Chapter 13 BOH4M Business Leadership
Session Title: Managing by Influence Presenter Name: Thierry Roullier
Chapter 12 Power and Influence in the Workplace
Chapter 7 Power and Politics.
Social Influence Tactics. Constantly bombarded by attempts to influence us… Newspapers Magazines Television Internet Radio Outdoor signs Politics and.
No, this is not a guide on how to get a date..  Persuasion  Obedience  Group dynamics  Prejudice  Culture Formation  Stereotyping.
Copyright © Houghton Mifflin Company. All rights reserved Chapter 14 Group Dynamics and Teamwork.
Attribution Theory Attributing behavior of others to either internal disposition or external situations Dispositional Attribution Based on a person’s personality.
SOCIAL ENGINEERING PART IA: HOW SCAMMERS MANIPULATE EMPLOYEES TO GAIN INFORMATION.
Ethical Power and Politics Chapter 18. Introduction (1 of 2) Power is needed to reach objectives in all organizations  Power affects performance  The.
Influence, Power, and Politics in Organizations
© 2003 McGraw-Hill Ryerson Ltd. Power and Politics Chapter Ten.
Influence, Power, and Politics (An Organizational Survival Kit) Chapter Thirteen.
Influence, Power, and Politics (An Organizational Survival Kit) Chapter Thirteen.
Influence, Power, and Politics: An Organizational Survival Kit Chapter Thirteen Copyright © 2008 The McGraw-Hill Companies, Inc. All rights reserved.
1 Chapter 11 Interpersonal Influence Chapter 11 Interpersonal Influence Inter-Act, 13 th Edition Inter-Act, 13 th Edition.
MODULE 17 COMMUNICATION “Listening can be the key to understanding” What is communication and when is it effective? How can we improve communication with.
Making Decisions About Your Health Mr. Royer. Definitions Risk Behavior – Possibility that an action may cause injury or harm to you or others. Decision.
Social Thinking and Social Influence
Conformity and Obedience Copyright © 2008 by The McGraw-Hill Companies, Inc. Social Psychology by David G. Myers 9 th Edition Conformity and Obedience.
Messaging Workshop: Persuasion in Marketing Communications Persuasion Important element of marketing Attempt to guide people toward the acceptance of some.
December 10, 2002 Bob Cowles, Computer Security Officer
Cyber Bullying. Cyber Bullying is very serious it has resulted in death and suicide.
8-1 McGraw-Hill/Irwin ©2006 The McGraw-Hill Companies, Inc., All Rights Reserved CHAPTER EIGHT Influence.
1 Pertemuan 12 (Off-Class) Power and Influence Matakuliah: MPG / Leadership and Organisation Tahun: 2007 Versi: versi/revisi 1.
Decision Making and Influence: Presentation for Campus Environmental Sustainability Team (CEST) August 5, 2010.
Appropriate Online Behavior
Chapter 7: Learning and Decision Making Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
PERSUASION The deliberate attempt to influence the attitudes or behavior of another person in a situation in which that person has some freedom of choice.
SOCIAL INFLUENCE. People can influence the way other people think, feel, and act, even without specifically trying to do so. Norms: are learned, socially.
Chapter 14 Social Psychology. Copyright © 1999 by The McGraw-Hill Companies, Inc. 2 Social Cognition Social perception –judgement about the qualities.
Designed By: Jennifer Gohn.  “Getting people to do things they wouldn’t ordinarily do for a stranger” –Kevin Mitnick  There are several different.
A GUIDE TO WRITING WITH READINGS Chapter 13 Persuasion.
Chapter 6 Power and Influence. Chapter 6 Power and Influence.
POWER AND INFLUENCE.
Politics: Power in Action
Daniel Duric, Iaroslava Pozniak,Christopher Tombrink
Persuasive Essay to Promote Change
Social Norms.
Social Engineering: The Art of Manipulation
Resisting Peer Pressure
Required “Influence” Skills for Entrepreneurs
Compliance and conformity
Social Influence: - a fact of daily life. - each day, we are exposed too many different forms of social influence – efforts by others to change our attitudes,
Influencing and Negotiating Skills
Chapter 11: Influence and Persuasion
Social Behavior.
Chapter 11: Influence and Persuasion
Influence, Power, and Politics in Organizations
Methods of Compliance Compliance is a form of social influence that involves a direct request, often by a person in need, such as a friend or acquaintance.
Methods of Compliance Compliance is a form of social influence that involves a direct request, often by a person in need, such as a friend or acquaintance.
Methods of Compliance Compliance is a form of social influence that involves a direct request, often by a person in need, such as a friend or acquaintance.
Methods of Compliance Compliance is a form of social influence that involves a direct request, often by a person in need, such as a friend or acquaintance.
Organizational Behavior and Human Resource Management
Presentation transcript:

Presented by: Casey Mullins Social Engineering - Persuasion -

WHAT IS PERSUASION? The main objective is to convince the person disclosing the information that the social engineer is in fact a person that they can trust with that sensitive information.

METHODS OF PERSUASION Impersonation Ingratiation Conformity Diffusion of Responsibility Friendliness

IMPERSONATION Creating some sort of character and acting out the role. Hackers strike when the person they are impersonating is out of town and call on the phone using voice recorders. Attackers include: a repairman, IT support, a manager, or a company employee.

INGRATIATION To gain favor or favorable acceptance for by deliberate effort. Employees want to impress, so they will provide information to an authority figure.

CONFORMITY Group-based behavior, but can be used occasionally in the individual setting by convincing the user that everyone else has been giving the hacker the same information now requested, such as if the hacker is impersonating an IT manager.

DIFFUSION OF RESPONSIBILITY Convincing someone to reveal information by tricking them into thinking you’re the manager. Tell the employee that, you the manager, will take care of everything alleviating the stress on the employee thus convincing the employee to give you everything.

FRIENDLINESS This is the best way to obtain information using a social engineering attack. Flattery or flirtation will help soften up the potential victim. A experienced hacker must know when to pull back when too much information has been taken, just before they get suspicious.

FACTORS THAT INFLUENCE Authority – people are highly likely, in the right situation, to be highly responsive to assertions of authority, even when the person who purports to be in position of authority in not physically present. Scarcity – people are also highly responsive to indications that a particular item they may want in in short supply or available for only a limited period.

FACTORS THAT INFLUENCE Liking and Similarity – It is a truly human tendency to like people who are like us. We tend to regard him or her more favorably merely because of similarity. Reciprocation – a well-recognized rule of social interaction requires that if someone gives us something, we feel a strong urge to reciprocate by giving something back in return.

FACTORS THAT INFLUENCE Commitment and Consistency – if we promise to do something, and fail to carry out that promise, we are virtually certain to be considered untrustworthy or undesirable. Social Proof – In many social situations, one of the mental shortcuts on which we rely, in determining what course of action is most appropriate, is to look to see what other people in the vicinity are doing or saying. Prompts us to take actions that may be against our self-interest without taking the time to consider them more deeply.

REFERENCES Chuvakin, Anton. NLP-powered Social Engineering. 20 March Granger, Sarah. Social Engineering Fundamentals, Part I: Hacker Tactics. 18 Dec The “Social Engineering” of Internet Fraud.