Presentation Social Engineering

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 8

Social Engineering

Submitted by: Submitted to:


Shad Bin Akhtar Md. Rajib Mia
183-35-387 Lecturer
Dept. of SWE Dept. of SWE
What is
Social
Engineering

• psychological manipulation of people into


performing actions
What are they looking for?

1. Confidential information
2.Access details
3. Authorization details
h y s o c i a l
W s
n e e r i n g i
engi
effec t i v e ?

a r d w a re for
s o ft w a r e or h
is n o s p e cific n e e r in g.
• 1.Th e r e o c ial e n g i
at t a c k o f s
e fe n d i n g t h e
t r o n g a s t h e re
d e s a re as s
r i t y po l i c i o st
• 2 . S e c u re th e m
n d h u m a ns a
nk a
weakest li
t i b l e fa c tor. n g in e e ring
sus c e p c t s ocia l e
o d e t e
I t i s d if f i cul t t
• 3.
e m p t s . u r e c o m p l et e
att t h o d t o en s
e i s no m e t t a c ks .
• 4. T h e r i nee r i n g a
o c i a l e n g
c u r i ty f r o ms
se
Common targets of Social engineering

1 2 3 4 5
STEP STEP STEP STEP STEP
User and clients Receptionists and Technical Support Vendors of the target System
Help desk Executives. organization. administrators.
personnel.
Impacts of Social
Engineering

1. Loss of Privacy.
2. Economic losses.

3. Dangers of Terrorism.

4. Damage of goodwill.

5. Temporary or Permanent closure.

6. Lawsuits and Arbitrations.


Protecting from Social
engineering

A security aware culture can help a employee to identify and repel


social engineering attacks.
1. Recognize inappropriate requests for information.
2. Take ownership for corporate security.
3. Understand risk and impact of security breeches.
4. Social engineering attacks are personal.
5. Password management.
6. Two-factor authentication.
7. Physical security.
Thank You!

You might also like