0% found this document useful (0 votes)
71 views12 pages

Social Engineering Identity Theft

Social engineering involves manipulating people into performing actions or revealing confidential information. Identity theft occurs when someone steals and uses another person's personal data. Attackers steal identities by obtaining personal information through hacking or social engineering and use stolen identities to open credit cards or bank accounts in the victim's name.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
71 views12 pages

Social Engineering Identity Theft

Social engineering involves manipulating people into performing actions or revealing confidential information. Identity theft occurs when someone steals and uses another person's personal data. Attackers steal identities by obtaining personal information through hacking or social engineering and use stolen identities to open credit cards or bank accounts in the victim's name.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12

Basic Computer Security

Social Engineering
Identity Theft
Group 1
Muhammad Fauzi Maulana

Febi Taufik Faturrahman

Indah Permata Sari

Basic
BESTComputer
FOR YouSecurity 2
O R G A N I C S C O M P A N Y
What is Social
Engineering?

Basic
BESTComputer
FOR YouSecurity 3
O R G A N I C S C O M P A N Y
My slide title
My subtitle
Types of Social Engineering

o Quid Pro Quo

o Phishing

o Baiting

o Pretexting

o Diversion Theft

Basic
BESTComputer
FOR YouSecurity 5
O R G A N I C S C O M P A N Y
Example of

Social

Engineering

Basic
BESTComputer
FOR YouSecurity 6
O R G A N I C S C O M P A N Y
Ways to prevent
Social Engineering

Basic
BESTComputer
FOR YouSecurity 7
O R G A N I C S C O M P A N Y
What is Identity theft?

Basic
BESTComputer
FOR YouSecurity 8
O R G A N I C S C O M P A N Y
Comparison

Company Name » Competitive Service

» Nulla a erat eget nunc hendrerit ultrices eu nec nulla. » Praesent venenatis quam tortor, viverra nunc rutrum.
Donec viverra leo aliquet, auctor quam id, convallis • Maecenas malesuada ultricies sapien sit amet pharetra.
orci. • Nunc tempus, risus sodales sodales hendrerit, arcu dolor
• Sed in molestie est. Cras ornare turpis at ligula posuere, sit commodo libero, a sollicitudin quam nulla quis lectus. In at
amet accumsan neque lobortis. porta mauris.
• Maecenas mattis risus ligula, sed ullamcorper nunc
efficitur sed.

BEST FOR You 9


O R G A N I C S C O M P A N Y
How do the

attackers Steal

Identity?

Basic
BESTComputer
FOR YouSecurity 10
O R G A N I C S C O M P A N Y
What do
Attackers do with
Stolen Identity?

Basic
BESTComputer
FOR YouSecurity 11
O R G A N I C S C O M P A N Y
Basic Computer Security

Thank You
Muhammad Fauzi Maulana
Febi Taufik Faturrahman
Indah Permata Sari

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy