SlideShare una empresa de Scribd logo
1 de 70
Social Engineering: “The Cyber-Con” Stephen Schell ISDS 418 Dr. Sherif Cal-State Fullerton Spring 2006
Overview ,[object Object],[object Object],[object Object],[object Object]
Define Social Engineering
Define Social Engineering ,[object Object],[object Object],[object Object]
Define Social Engineering ,[object Object],[object Object],[object Object]
Define Social Engineering ,[object Object],[object Object],[object Object],[object Object]
Define Social Engineering ,[object Object],[object Object],[object Object],[object Object]
Define Social Engineering ,[object Object],[object Object],[object Object],[object Object]
Popular Methods of Attack
Popular Methods of Attack ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Popular Methods of Attack ,[object Object],[object Object],[object Object],[object Object]
Popular Methods of Attack ,[object Object],[object Object],[object Object],[object Object]
Popular Methods of Attack ,[object Object],[object Object],[object Object]
Popular Methods of Attack ,[object Object],[object Object],[object Object]
Popular Methods of Attack ,[object Object]
Popular Methods of Attack ,[object Object],[object Object],[object Object]
Popular Methods of Attack ,[object Object],[object Object],[object Object]
Popular Methods of Attack ,[object Object],[object Object]
Popular Methods of Attack ,[object Object],[object Object],[object Object]
Popular Methods of Attack ,[object Object]
Popular Methods of Attack ,[object Object]
Popular Methods of Attack ,[object Object],[object Object],[object Object],[object Object]
Popular Methods of Attack ,[object Object],[object Object],[object Object],[object Object],[object Object]
Popular Methods of Attack ,[object Object],[object Object],[object Object],[object Object]
Popular Methods of Attack ,[object Object],[object Object],[object Object]
Popular Methods of Attack ,[object Object],[object Object],[object Object],[object Object]
Popular Methods of Attack ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Popular Methods of Attack ,[object Object],[object Object],[object Object],[object Object]
Popular Methods of Attack ,[object Object],[object Object],[object Object]
Popular Methods of Attack ,[object Object],[object Object],[object Object]
Severity and Success Rates
Severity and Success Rates ,[object Object],[object Object],[object Object]
Severity and Success Rates ,[object Object],[object Object],*“The Art of Deception” by Kevin Mitnick, Chapter 1 ,[object Object]
Severity and Success Rates ,[object Object],*March 2005 report #2005-20-042 ,[object Object]
Severity and Success Rates ,[object Object],[object Object],[object Object]
Severity and Success Rates ,[object Object],[object Object],[object Object],[object Object]
Severity and Success Rates
Severity and Success Rates ,[object Object],[object Object],[object Object],[object Object]
Methods to Counter Attacks
Methods to Counter Attacks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Methods to Counter Attacks Secure Collection Bins Secure Transport Complete Document Shredding Materials Recycling ,[object Object],Recall Document Management Services at Recall.com
Methods to Counter Attacks ,[object Object],[object Object],[object Object],[object Object],[object Object]
Methods to Counter Attacks ,[object Object]
Methods to Counter Attacks ,[object Object],[object Object],[object Object]
Methods to Counter Attacks ,[object Object],[object Object],[object Object]
Methods to Counter Attacks ,[object Object]
Methods to Counter Attacks ,[object Object],[object Object],[object Object],[object Object]
Methods to Counter Attacks ,[object Object],[object Object],[object Object]
Methods to Counter Attacks ,[object Object],[object Object],[object Object],[object Object]
Methods to Counter Attacks ,[object Object],[object Object],[object Object],[object Object],[object Object]
Methods to Counter Attacks ,[object Object],[object Object]
Methods to Counter Attacks ,[object Object],[object Object],[object Object],[object Object]
Methods to Counter Attacks ,[object Object],[object Object],[object Object],[object Object],[object Object]
Methods to Counter Attacks ,[object Object]
Methods to Counter Attacks ,[object Object],[object Object],[object Object],[object Object]
Methods to Counter Attacks ,[object Object]
Methods to Counter Attacks ,[object Object],[object Object],[object Object],[object Object],[object Object]
Methods to Counter Attacks ,[object Object],[object Object],[object Object]
Methods to Counter Attacks ,[object Object],[object Object],[object Object],[object Object],[object Object]
Methods to Counter Attacks ,[object Object],[object Object],[object Object],[object Object]
Methods to Counter Attacks ,[object Object],[object Object],[object Object],[object Object]
Conclusion
Conclusion ,[object Object],[object Object]
Conclusion ,[object Object],[object Object]
Conclusion ,[object Object],[object Object],[object Object]
Questions from the Audience
References ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
References ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
References ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
References ,[object Object],[object Object]

Más contenido relacionado

La actualidad más candente

Social engineering
Social engineeringSocial engineering
Social engineeringMaulik Kotak
 
Social engineering hacking attack
Social engineering hacking attackSocial engineering hacking attack
Social engineering hacking attackPankaj Dubey
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber CrimesDINESH KAMBLE
 
Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?JamRivera1
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingDaniel P Wallace
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
Social Engineering Basics
Social Engineering BasicsSocial Engineering Basics
Social Engineering BasicsLuke Rusten
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorJames Krusic
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptxANIKETKUMARSHARMA3
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awarenessJason Murray
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsNetLockSmith
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical HackingBugRaptors
 
Phishing simulation exercises
Phishing simulation exercisesPhishing simulation exercises
Phishing simulation exercisesJisc
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 

La actualidad más candente (20)

Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Social engineering hacking attack
Social engineering hacking attackSocial engineering hacking attack
Social engineering hacking attack
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Social Engineering Basics
Social Engineering BasicsSocial Engineering Basics
Social Engineering Basics
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human Behavior
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptx
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Phishing simulation exercises
Phishing simulation exercisesPhishing simulation exercises
Phishing simulation exercises
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Types of Hacker
 Types of Hacker Types of Hacker
Types of Hacker
 

Destacado

Ceh v5 module 09 social engineering
Ceh v5 module 09 social engineeringCeh v5 module 09 social engineering
Ceh v5 module 09 social engineeringVi Tính Hoàng Nam
 
Module 3 social engineering-b
Module 3   social engineering-bModule 3   social engineering-b
Module 3 social engineering-bBbAOC
 
Osint overview 26 mar 2015
Osint overview  26 mar 2015Osint overview  26 mar 2015
Osint overview 26 mar 2015Mats Björe
 
Social engineering tales
Social engineering tales Social engineering tales
Social engineering tales Ahmed Musaad
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.Pratum
 
Cehv8 - Module 09: Social Engineering.
Cehv8 - Module 09: Social Engineering.Cehv8 - Module 09: Social Engineering.
Cehv8 - Module 09: Social Engineering.Vuz Dở Hơi
 
OSINT 2.0 - Past, present and future
OSINT 2.0  - Past, present and futureOSINT 2.0  - Past, present and future
OSINT 2.0 - Past, present and futureChristian Martorella
 
Social Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessSocial Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessCBIZ, Inc.
 
Social engineering with in for kanban
Social engineering with in for kanbanSocial engineering with in for kanban
Social engineering with in for kanbanDavid Anderson
 
TH3 Professional Developper CEH social engineering
TH3 Professional Developper CEH social engineeringTH3 Professional Developper CEH social engineering
TH3 Professional Developper CEH social engineeringth3prodevelopper
 
20070317 Osint Presentation
20070317 Osint Presentation20070317 Osint Presentation
20070317 Osint PresentationMats Björe
 
ShadyRAT: Anatomy of targeted attack
ShadyRAT: Anatomy of targeted attackShadyRAT: Anatomy of targeted attack
ShadyRAT: Anatomy of targeted attackVladyslav Radetsky
 
Datasploit - An Open Source Intelligence Tool
Datasploit - An Open Source Intelligence ToolDatasploit - An Open Source Intelligence Tool
Datasploit - An Open Source Intelligence ToolShubham Mittal
 
Hacker tooltalk: Social Engineering Toolkit (SET)
Hacker tooltalk: Social Engineering Toolkit (SET)Hacker tooltalk: Social Engineering Toolkit (SET)
Hacker tooltalk: Social Engineering Toolkit (SET)Chris Hammond-Thrasher
 
Presentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human HackingPresentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human Hackingmsaksida
 
OSINT for Attack and Defense
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and DefenseAndrew McNicol
 
Social Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
Social Engineering: The Human Element of Sourcing and Recruiting | Glen CatheySocial Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
Social Engineering: The Human Element of Sourcing and Recruiting | Glen Catheynwrecruit
 

Destacado (20)

Ceh v5 module 09 social engineering
Ceh v5 module 09 social engineeringCeh v5 module 09 social engineering
Ceh v5 module 09 social engineering
 
Module 3 social engineering-b
Module 3   social engineering-bModule 3   social engineering-b
Module 3 social engineering-b
 
Osint overview 26 mar 2015
Osint overview  26 mar 2015Osint overview  26 mar 2015
Osint overview 26 mar 2015
 
Social engineering tales
Social engineering tales Social engineering tales
Social engineering tales
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.
 
Social Engineering 2.0
Social Engineering 2.0Social Engineering 2.0
Social Engineering 2.0
 
project cvs (1)
project cvs (1)project cvs (1)
project cvs (1)
 
Cehv8 - Module 09: Social Engineering.
Cehv8 - Module 09: Social Engineering.Cehv8 - Module 09: Social Engineering.
Cehv8 - Module 09: Social Engineering.
 
OSINT 2.0 - Past, present and future
OSINT 2.0  - Past, present and futureOSINT 2.0  - Past, present and future
OSINT 2.0 - Past, present and future
 
Social Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessSocial Engineering Audit & Security Awareness
Social Engineering Audit & Security Awareness
 
Social engineering with in for kanban
Social engineering with in for kanbanSocial engineering with in for kanban
Social engineering with in for kanban
 
TH3 Professional Developper CEH social engineering
TH3 Professional Developper CEH social engineeringTH3 Professional Developper CEH social engineering
TH3 Professional Developper CEH social engineering
 
20070317 Osint Presentation
20070317 Osint Presentation20070317 Osint Presentation
20070317 Osint Presentation
 
ShadyRAT: Anatomy of targeted attack
ShadyRAT: Anatomy of targeted attackShadyRAT: Anatomy of targeted attack
ShadyRAT: Anatomy of targeted attack
 
Datasploit - An Open Source Intelligence Tool
Datasploit - An Open Source Intelligence ToolDatasploit - An Open Source Intelligence Tool
Datasploit - An Open Source Intelligence Tool
 
Osint ashish mistry
Osint ashish mistryOsint ashish mistry
Osint ashish mistry
 
Hacker tooltalk: Social Engineering Toolkit (SET)
Hacker tooltalk: Social Engineering Toolkit (SET)Hacker tooltalk: Social Engineering Toolkit (SET)
Hacker tooltalk: Social Engineering Toolkit (SET)
 
Presentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human HackingPresentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human Hacking
 
OSINT for Attack and Defense
OSINT for Attack and DefenseOSINT for Attack and Defense
OSINT for Attack and Defense
 
Social Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
Social Engineering: The Human Element of Sourcing and Recruiting | Glen CatheySocial Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
Social Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
 

Similar a Social Engineering: "The Cyber-Con"

Cyber security.docx
Cyber security.docxCyber security.docx
Cyber security.docxsaivarun91
 
Application security meetup data privacy_27052021
Application security meetup data privacy_27052021Application security meetup data privacy_27052021
Application security meetup data privacy_27052021lior mazor
 
- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdfRamya Nellutla
 
Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?CBIZ, Inc.
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyRussell Publishing
 
Facts About Social Engineering Services - Aardwolf Security
Facts About Social Engineering Services - Aardwolf SecurityFacts About Social Engineering Services - Aardwolf Security
Facts About Social Engineering Services - Aardwolf SecurityAardwolf Security
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxprosunghosh7
 
social engineering attacks.docx
social engineering attacks.docxsocial engineering attacks.docx
social engineering attacks.docxMehwishAnsari11
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptxTapan Khilar
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Shawon Raffi
 
Article1DISCUSSION_1Information security within an organi
Article1DISCUSSION_1Information security within an organiArticle1DISCUSSION_1Information security within an organi
Article1DISCUSSION_1Information security within an organimallisonshavon
 
The Inside Job: Detecting, Preventing and Investigating Data Theft
The Inside Job: Detecting, Preventing and Investigating Data TheftThe Inside Job: Detecting, Preventing and Investigating Data Theft
The Inside Job: Detecting, Preventing and Investigating Data TheftCase IQ
 
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSrausdeen anfas
 

Similar a Social Engineering: "The Cyber-Con" (20)

Cyber security.docx
Cyber security.docxCyber security.docx
Cyber security.docx
 
Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015
 
Information security threats
Information security threatsInformation security threats
Information security threats
 
Application security meetup data privacy_27052021
Application security meetup data privacy_27052021Application security meetup data privacy_27052021
Application security meetup data privacy_27052021
 
- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf
 
Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
Facts About Social Engineering Services - Aardwolf Security
Facts About Social Engineering Services - Aardwolf SecurityFacts About Social Engineering Services - Aardwolf Security
Facts About Social Engineering Services - Aardwolf Security
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
 
social engineering attacks.docx
social engineering attacks.docxsocial engineering attacks.docx
social engineering attacks.docx
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Article1DISCUSSION_1Information security within an organi
Article1DISCUSSION_1Information security within an organiArticle1DISCUSSION_1Information security within an organi
Article1DISCUSSION_1Information security within an organi
 
Infographic - What is Vishing?
Infographic - What is Vishing?Infographic - What is Vishing?
Infographic - What is Vishing?
 
The Inside Job: Detecting, Preventing and Investigating Data Theft
The Inside Job: Detecting, Preventing and Investigating Data TheftThe Inside Job: Detecting, Preventing and Investigating Data Theft
The Inside Job: Detecting, Preventing and Investigating Data Theft
 
Mobile security
Mobile securityMobile security
Mobile security
 
Cyber_security_.pdf
Cyber_security_.pdfCyber_security_.pdf
Cyber_security_.pdf
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Monitoring, Detecting And Preventing Insider Fraud And Abuse V2
Monitoring, Detecting And Preventing Insider Fraud And Abuse V2Monitoring, Detecting And Preventing Insider Fraud And Abuse V2
Monitoring, Detecting And Preventing Insider Fraud And Abuse V2
 
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
 

Social Engineering: "The Cyber-Con"