Professional Documents
Culture Documents
Presentation Social Engineering
Presentation Social Engineering
Presentation Social Engineering
1. Confidential information
2.Access details
3. Authorization details
h y s o c i a l
W s
n e e r i n g i
engi
effec t i v e ?
a r d w a re for
s o ft w a r e or h
is n o s p e cific n e e r in g.
• 1.Th e r e o c ial e n g i
at t a c k o f s
e fe n d i n g t h e
t r o n g a s t h e re
d e s a re as s
r i t y po l i c i o st
• 2 . S e c u re th e m
n d h u m a ns a
nk a
weakest li
t i b l e fa c tor. n g in e e ring
sus c e p c t s ocia l e
o d e t e
I t i s d if f i cul t t
• 3.
e m p t s . u r e c o m p l et e
att t h o d t o en s
e i s no m e t t a c ks .
• 4. T h e r i nee r i n g a
o c i a l e n g
c u r i ty f r o ms
se
Common targets of Social engineering
1 2 3 4 5
STEP STEP STEP STEP STEP
User and clients Receptionists and Technical Support Vendors of the target System
Help desk Executives. organization. administrators.
personnel.
Impacts of Social
Engineering
1. Loss of Privacy.
2. Economic losses.
3. Dangers of Terrorism.
4. Damage of goodwill.