0% found this document useful (0 votes)
135 views8 pages

Presentation Social Engineering

Social engineering involves psychologically manipulating people into performing actions or divulging confidential information. Attackers use social engineering to obtain sensitive data like login credentials and authorization details. It is effective because security is only as strong as its weakest link - humans. While it is difficult to detect social engineering attempts, organizations can protect themselves by fostering a security-aware culture where employees are educated to identify inappropriate requests and use strong password protection and two-factor authentication.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
135 views8 pages

Presentation Social Engineering

Social engineering involves psychologically manipulating people into performing actions or divulging confidential information. Attackers use social engineering to obtain sensitive data like login credentials and authorization details. It is effective because security is only as strong as its weakest link - humans. While it is difficult to detect social engineering attempts, organizations can protect themselves by fostering a security-aware culture where employees are educated to identify inappropriate requests and use strong password protection and two-factor authentication.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Social Engineering

Submitted by: Submitted to:


Shad Bin Akhtar Md. Rajib Mia
183-35-387 Lecturer
Dept. of SWE Dept. of SWE
What is
Social
Engineering

• psychological manipulation of people into


performing actions
What are they looking for?

1. Confidential information
2.Access details
3. Authorization details
h y s o c i a l
W s
n e e r i n g i
engi
effec t i v e ?

a r d w a re for
s o ft w a r e or h
is n o s p e cific n e e r in g.
• 1.Th e r e o c ial e n g i
at t a c k o f s
e fe n d i n g t h e
t r o n g a s t h e re
d e s a re as s
r i t y po l i c i o st
• 2 . S e c u re th e m
n d h u m a ns a
nk a
weakest li
t i b l e fa c tor. n g in e e ring
sus c e p c t s ocia l e
o d e t e
I t i s d if f i cul t t
• 3.
e m p t s . u r e c o m p l et e
att t h o d t o en s
e i s no m e t t a c ks .
• 4. T h e r i nee r i n g a
o c i a l e n g
c u r i ty f r o ms
se
Common targets of Social engineering

1 2 3 4 5
STEP STEP STEP STEP STEP
User and clients Receptionists and Technical Support Vendors of the target System
Help desk Executives. organization. administrators.
personnel.
Impacts of Social
Engineering

1. Loss of Privacy.
2. Economic losses.

3. Dangers of Terrorism.

4. Damage of goodwill.

5. Temporary or Permanent closure.

6. Lawsuits and Arbitrations.


Protecting from Social
engineering

A security aware culture can help a employee to identify and repel


social engineering attacks.
1. Recognize inappropriate requests for information.
2. Take ownership for corporate security.
3. Understand risk and impact of security breeches.
4. Social engineering attacks are personal.
5. Password management.
6. Two-factor authentication.
7. Physical security.
Thank You!

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy