We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byHaley Barrett
Modified over 4 years ago
Copyright © 2011 IsecT Ltd. Social engineering Spot it and stop it September 2011 Security awareness seminar
Copyright © 2011 IsecT Ltd. Slide 2 Introduction Social engineering is a way of tricking people into doing things they shouldnt do, such as disclosing secrets
Copyright © 2011 IsecT Ltd. Slide 3 Blending-in
Copyright © 2011 IsecT Ltd. Slide 4 Who are social engineers? Kids, partners, friends Sales reps Hackers, virus writers Journalists Jilted lovers Industrial spies & unethical competitors Private investigators Spies Former, current or prospective employees Visitors, phone callers, emailers, chatters, gift givers, friends …
Copyright © 2011 IsecT Ltd. Slide 5 New tricks Fake survey or prize draw Discarded USB stick, CD, cellphone … Note on the windshield, FAX, letter … Fake maintenance worker, courier, cleaner, auditor, customer, supplier, manager, executive assistant … Lottery win, inheritance or tax refund … Stuck in a hotel, wallet stolen, in a fix Friend or friend of a friend Check out this cool video … Fake job ad and interview
Copyright © 2011 IsecT Ltd. Slide 6 How they do it
Copyright © 2011 IsecT Ltd. Slide 7 Clues to watch out for Have you ever been pestered by a persistent, pushy sales rep, trying hard to sell you something you really dont want? Parents of 7 year olds will probably appreciate their ability to manipulate us into doing what they want
Copyright © 2011 IsecT Ltd. Slide 8 Warning signs Unexpected callers or visitors probing your for information or acting suspiciously Unusual requests, FAXes, emails, text messages, Tweets or phone calls Probing, pushy or threatening behavior Name-dropping or using company slang out of context Evasive, defensive or aggressive reaction when asked to verify their identity Nervousness and other nonspecific clues
Copyright © 2011 IsecT Ltd. Slide 9 DART them! D elay A uthenticate R esist T ransfer
Copyright © 2011 IsecT Ltd. Slide 10 Front-line defenses I just need to confirm your voicemail : could you reset your PIN code to 1234 please? Mmmm, sounds fishy … Id better refer this call to IT
Copyright © 2011 IsecT Ltd. Slide 11 Other aspects
Copyright © 2011 IsecT Ltd. Slide 12 Conclusion Be alert for the signs that someone might be socially engineering you, and DART ( D elay, A uthenticate, R esist and T ransfer) them! Report possible social engineering incidents, suspicious calls and near misses to IT Help/Service Desk Help us create a stronger security culture
Copyright © 2011 IsecT Ltd. Slide 13 Further information Speak to your manager, call the IT Help/Service desk or contact Information Security. Discuss social engineering with your work colleagues and family. Visit the intranet Security Zone.
Building our security culture
Building A List Every website needs to be focused on building a list Every website needs to be focused on building a list Have a sign up form on every.
Copyright © 2011 IsecT Ltd. Securing people Security awareness seminar for IT professionals Information Security Awareness September 2011.
1 RXQ Customer Drop Submitted by Supplier Process Flow Diagram Customer Supplier Distribution Company Supplier sends Drop Request to Distribution.
Presented by Thabo Letopa
Telephone Techniques Chapter 9 Chapter 9 Telephone Techniques
1 Sales and Persuasive Messages Mary Ellen Guffey, Business Communication: Process and Product, 4e Copyright © 2003.
1 Hands Off My $$! Preventing & Reporting Financial Abuse Presented by Office of Clients Rights Advocacy.
A note for you We have created this presentation for you, the outstanding employee who has IT security on the brain. We want to help you spread the word.
Fraud Protection. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
Social Engineering Training. Training Goals Increase Laboratory Awareness. Provide the tools required to identify, avoid and report advanced Social Engineering.
1 Online Self-Defense: Avoiding Scams Chau Mai December 5, 2013.
COMPUTER CRIMES CREDIT CARD FRAUD “A BILLION DOLLAR PROBLEM”
Today’s Agenda… Knowledge Check What is Cyber Crime? Identity Theft Phishing Common Scams inc. online and mobile phone scams Prevention Methods.
Kelly Corning Julie Sharp. Human-based techniques: impersonation Computer-based techniques: malware and scams.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
Friday June 6, 2014 OBJ: SWBAT understand what identity theft is, what the consequences are, and how to prevent it. Drill: What statement is this cartoon.
What is identity theft, and how can you protect yourself from it?
What you don’t know CAN hurt you!
© 2018 SlidePlayer.com Inc. All rights reserved.