SlideShare a Scribd company logo
SECURITY AND SOCIAL
SECURITY AND SOCIAL
ENGINEERING
ENGINEERING
US Department of Commerce
Office of Security
Updated 09/26/11
Security is Everyone's Responsibility – See Something, Say Something! 1
Objectives
Understand the principles of social
engineering
Define the goals of social engineering
Recognize the signs of social engineering
Identify ways to protect yourself from
social engineering
Security is Everyone's Responsibility – See Something, Say Something! 2
What is Social Engineering
1. At its core it is manipulating a person into
knowingly or unknowingly giving up
information; essentially 'hacking' into a
person to steal valuable information.
• Psychological manipulation
• Trickery or Deception for the purpose of information
gathering
Security is Everyone's Responsibility – See Something, Say Something! 3
What is Social Engineering
2. It is a way for criminals to gain access to
information systems. The purpose of social
engineering is usually to secretly install
spyware, other malicious software or to trick
persons into handing over passwords
and/or other sensitive financial or personal
information
Security is Everyone's Responsibility – See Something, Say Something! 4
What is Social Engineering
3. Social engineering is one of the most
effective routes to stealing confidential data
from organizations, according to Siemens
Enterprise Communications, based in
Germany. In a recent Siemens test, 85
percent of office workers were duped by
engineering.
“Most employees are utterly unaware that they are being
manipulated,” says Colin Greenlees, security and
counter-fraud consultant at Siemens.
Security is Everyone's Responsibility – See Something, Say Something! 5
What are they looking for
• Obtaining simple information such as your pet's name,
where you're from, the places you've visited;
information that you'd give out freely to your friends.
– Think of yourself as a walking computer, full of valuable
information about yourself. You've got a name, address, and
valuables. Now categorize those items like a business does.
Personally identifiable data, financial information, cardholder
data, health insurance data, credit reporting data, and so on…
Security is Everyone's Responsibility – See Something, Say Something! 6
What are they looking for
• Take a close look at some of the 'secure' sites you
log into. Some have a 'secret question' you have to
answer, if you cannot remember your username or
password. The questions seem pretty tough for an
outsider looking into trying to hack into your
account.
What's the name of your first pet?
What is your maiden name?
When was your mother/father born?
Where were you born?
Do these sound familiar?
Security is Everyone's Responsibility – See Something, Say Something! 7
Tactics
1. Pretexting – Creating a fake scenario
2. Phishing – Send out bait to fool victims into giving
away their information
3. Fake Websites – Molded to look like the real thing.
Log in with real credentials that are now compromised
4. Fake Pop-up – Pops up in front of real web site to
obtain user credentials
Security is Everyone's Responsibility – See Something, Say Something! 8
Protecting Yourself
A security aware culture can help employees identify and repel social engineering attacks
 Recognize inappropriate requests for information
 Take ownership for corporate security
 Understand risk and impact of security breeches
 Social engineering attacks are personal
 Password management
 Two factor authentication
 Physical security
 Understand what information you are putting on the Web for targeting at social
network sites
Google Twitter
MySpace Facebook
Personal Blogs LinkedIn
Security is Everyone's Responsibility – See Something, Say Something! 9
Protecting Yourself
1. Network defenses to repel virus
• Virus protection (McAfee, Norton, Symantec, etc…)
• Email attachment scanning
• Firewalls, etc…
2. Organizations must decide what information is sensitive
3. Security must be periodically tested
4. Contact your security office immediately if you have any concerns at
work
Security is Everyone's Responsibility – See Something, Say Something! 10
Security is Everyone's Responsibility – See Something, Say Something! 11

More Related Content

PPT
Ia 124 1621324160 ia_124_lecture_02
PDF
What is social engineering.pdf
PDF
- Social Engineering Unit- II Part- I.pdf
PPTX
Social engineering
PDF
White Paper: Social Engineering and Cyber Attacks: The Psychology of Deception
 
PDF
Customer information security awareness training
PPT
Social Engineering threats and concern.ppt
PDF
National Life IT Department's Cyber Security Awareness Presentation
Ia 124 1621324160 ia_124_lecture_02
What is social engineering.pdf
- Social Engineering Unit- II Part- I.pdf
Social engineering
White Paper: Social Engineering and Cyber Attacks: The Psychology of Deception
 
Customer information security awareness training
Social Engineering threats and concern.ppt
National Life IT Department's Cyber Security Awareness Presentation

Similar to security problems. social.engineering.harmfull.2025.ppt (20)

PDF
Social Engineering Basics
PDF
Insiders Guide to Social Engineering - End-Users are the Weakest Link
PPTX
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
PPT
DNR-Security-Awareness-Training expert.ppt
PPTX
Social engineering presentation
PDF
Introduction to information security
PPTX
TheCyberThreatAndYou2_deck.pptx
PDF
Social Engineering.pdf
PDF
Social engineering attacks
PPT
Social Engineering | #ARMSec2015
PDF
Combating Phishing Attacks
PPT
3 Most Common Threats Of Information Security
PPTX
Social engineering-Attack of the Human Behavior
PPTX
7 social engineering and insider threats
PPTX
Cyber Security Awareness
PDF
What Are Social Engineering Attacks .pdf
PDF
Airport IT&T 2013 John McCarthy
PPSX
Social Engineering - Are You Protecting Your Data Enough?
PPTX
NENA 2017 Doxing and Social Engineering
PDF
Ethical Hacking and Cyber Security
Social Engineering Basics
Insiders Guide to Social Engineering - End-Users are the Weakest Link
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
DNR-Security-Awareness-Training expert.ppt
Social engineering presentation
Introduction to information security
TheCyberThreatAndYou2_deck.pptx
Social Engineering.pdf
Social engineering attacks
Social Engineering | #ARMSec2015
Combating Phishing Attacks
3 Most Common Threats Of Information Security
Social engineering-Attack of the Human Behavior
7 social engineering and insider threats
Cyber Security Awareness
What Are Social Engineering Attacks .pdf
Airport IT&T 2013 John McCarthy
Social Engineering - Are You Protecting Your Data Enough?
NENA 2017 Doxing and Social Engineering
Ethical Hacking and Cyber Security
Ad

More from halosidiq1 (18)

PPT
fundamental of computer security.2024.ppt
PPT
social.engineering.harmfull.computer security.2025.ppt
PPT
fundamental of security.is there any security problems..2024.ppt
PPT
networking point to point networking is the best .2024.ppt
PPT
netwoking from the start networking is the best .ppt
PPT
baisic.networking.2024 networking is the best.ppt
PPT
my net security and its models which are explained here
PPT
new.technique.column transposional CTi college.ppt
PPT
row.coliumn,transitio,.Polyetchnical.colleage.ppt
PPT
symet.crypto.hill.cipher.2023.ppt
PPTX
CTI.Vigenir Cipher.pptx
PPT
my lecture 21.network security.2023.ppt
PPT
My Project on Cryptograpghy.2023.ppt
PPTX
my.Light weight cryptography.2023.pptx
PPT
MyCryptography.2023.ppt
PPT
MyTutorialON Cryptography.ppt
PPT
new.deadlock.ppt
PPTX
CNF.Chap.5.pptx
fundamental of computer security.2024.ppt
social.engineering.harmfull.computer security.2025.ppt
fundamental of security.is there any security problems..2024.ppt
networking point to point networking is the best .2024.ppt
netwoking from the start networking is the best .ppt
baisic.networking.2024 networking is the best.ppt
my net security and its models which are explained here
new.technique.column transposional CTi college.ppt
row.coliumn,transitio,.Polyetchnical.colleage.ppt
symet.crypto.hill.cipher.2023.ppt
CTI.Vigenir Cipher.pptx
my lecture 21.network security.2023.ppt
My Project on Cryptograpghy.2023.ppt
my.Light weight cryptography.2023.pptx
MyCryptography.2023.ppt
MyTutorialON Cryptography.ppt
new.deadlock.ppt
CNF.Chap.5.pptx
Ad

Recently uploaded (20)

PPT
THE CELL THEORY AND ITS FUNDAMENTALS AND USE
PPTX
perinatal infections 2-171220190027.pptx
PDF
BET Eukaryotic signal Transduction BET Eukaryotic signal Transduction.pdf
PPTX
TORCH INFECTIONS in pregnancy with toxoplasma
PDF
The Land of Punt — A research by Dhani Irwanto
PPTX
Understanding the Circulatory System……..
PPTX
ap-psych-ch-1-introduction-to-psychology-presentation.pptx
PDF
Unit 5 Preparations, Reactions, Properties and Isomersim of Organic Compounds...
PPT
LEC Synthetic Biology and its application.ppt
PDF
Placing the Near-Earth Object Impact Probability in Context
PDF
Warm, water-depleted rocky exoplanets with surfaceionic liquids: A proposed c...
PPTX
Introcution to Microbes Burton's Biology for the Health
PPT
Presentation of a Romanian Institutee 2.
PPTX
Seminar Hypertension and Kidney diseases.pptx
PPTX
Fluid dynamics vivavoce presentation of prakash
PDF
Cosmic Outliers: Low-spin Halos Explain the Abundance, Compactness, and Redsh...
PPTX
A powerpoint on colorectal cancer with brief background
PDF
CHAPTER 3 Cell Structures and Their Functions Lecture Outline.pdf
PDF
Looking into the jet cone of the neutrino-associated very high-energy blazar ...
PPTX
Welcome-grrewfefweg-students-of-2024.pptx
THE CELL THEORY AND ITS FUNDAMENTALS AND USE
perinatal infections 2-171220190027.pptx
BET Eukaryotic signal Transduction BET Eukaryotic signal Transduction.pdf
TORCH INFECTIONS in pregnancy with toxoplasma
The Land of Punt — A research by Dhani Irwanto
Understanding the Circulatory System……..
ap-psych-ch-1-introduction-to-psychology-presentation.pptx
Unit 5 Preparations, Reactions, Properties and Isomersim of Organic Compounds...
LEC Synthetic Biology and its application.ppt
Placing the Near-Earth Object Impact Probability in Context
Warm, water-depleted rocky exoplanets with surfaceionic liquids: A proposed c...
Introcution to Microbes Burton's Biology for the Health
Presentation of a Romanian Institutee 2.
Seminar Hypertension and Kidney diseases.pptx
Fluid dynamics vivavoce presentation of prakash
Cosmic Outliers: Low-spin Halos Explain the Abundance, Compactness, and Redsh...
A powerpoint on colorectal cancer with brief background
CHAPTER 3 Cell Structures and Their Functions Lecture Outline.pdf
Looking into the jet cone of the neutrino-associated very high-energy blazar ...
Welcome-grrewfefweg-students-of-2024.pptx

security problems. social.engineering.harmfull.2025.ppt

  • 1. SECURITY AND SOCIAL SECURITY AND SOCIAL ENGINEERING ENGINEERING US Department of Commerce Office of Security Updated 09/26/11 Security is Everyone's Responsibility – See Something, Say Something! 1
  • 2. Objectives Understand the principles of social engineering Define the goals of social engineering Recognize the signs of social engineering Identify ways to protect yourself from social engineering Security is Everyone's Responsibility – See Something, Say Something! 2
  • 3. What is Social Engineering 1. At its core it is manipulating a person into knowingly or unknowingly giving up information; essentially 'hacking' into a person to steal valuable information. • Psychological manipulation • Trickery or Deception for the purpose of information gathering Security is Everyone's Responsibility – See Something, Say Something! 3
  • 4. What is Social Engineering 2. It is a way for criminals to gain access to information systems. The purpose of social engineering is usually to secretly install spyware, other malicious software or to trick persons into handing over passwords and/or other sensitive financial or personal information Security is Everyone's Responsibility – See Something, Say Something! 4
  • 5. What is Social Engineering 3. Social engineering is one of the most effective routes to stealing confidential data from organizations, according to Siemens Enterprise Communications, based in Germany. In a recent Siemens test, 85 percent of office workers were duped by engineering. “Most employees are utterly unaware that they are being manipulated,” says Colin Greenlees, security and counter-fraud consultant at Siemens. Security is Everyone's Responsibility – See Something, Say Something! 5
  • 6. What are they looking for • Obtaining simple information such as your pet's name, where you're from, the places you've visited; information that you'd give out freely to your friends. – Think of yourself as a walking computer, full of valuable information about yourself. You've got a name, address, and valuables. Now categorize those items like a business does. Personally identifiable data, financial information, cardholder data, health insurance data, credit reporting data, and so on… Security is Everyone's Responsibility – See Something, Say Something! 6
  • 7. What are they looking for • Take a close look at some of the 'secure' sites you log into. Some have a 'secret question' you have to answer, if you cannot remember your username or password. The questions seem pretty tough for an outsider looking into trying to hack into your account. What's the name of your first pet? What is your maiden name? When was your mother/father born? Where were you born? Do these sound familiar? Security is Everyone's Responsibility – See Something, Say Something! 7
  • 8. Tactics 1. Pretexting – Creating a fake scenario 2. Phishing – Send out bait to fool victims into giving away their information 3. Fake Websites – Molded to look like the real thing. Log in with real credentials that are now compromised 4. Fake Pop-up – Pops up in front of real web site to obtain user credentials Security is Everyone's Responsibility – See Something, Say Something! 8
  • 9. Protecting Yourself A security aware culture can help employees identify and repel social engineering attacks  Recognize inappropriate requests for information  Take ownership for corporate security  Understand risk and impact of security breeches  Social engineering attacks are personal  Password management  Two factor authentication  Physical security  Understand what information you are putting on the Web for targeting at social network sites Google Twitter MySpace Facebook Personal Blogs LinkedIn Security is Everyone's Responsibility – See Something, Say Something! 9
  • 10. Protecting Yourself 1. Network defenses to repel virus • Virus protection (McAfee, Norton, Symantec, etc…) • Email attachment scanning • Firewalls, etc… 2. Organizations must decide what information is sensitive 3. Security must be periodically tested 4. Contact your security office immediately if you have any concerns at work Security is Everyone's Responsibility – See Something, Say Something! 10
  • 11. Security is Everyone's Responsibility – See Something, Say Something! 11