What is Social Engineering, It’s tactics and Prevention - PowerPoint PPT Presentation

About This Presentation
Title:

What is Social Engineering, It’s tactics and Prevention

Description:

Investing in your employees and yourself on raising the level of Cyber security Awareness will be beneficial all around! Companies and organizations should start focusing on improving the security of their human factor.VisitUs:- – PowerPoint PPT presentation

Number of Views:52
Slides: 6
Provided by: cerebra
Category: Other

less

Transcript and Presenter's Notes

Title: What is Social Engineering, It’s tactics and Prevention


1
Social Engineering, Its tactics and Prevention
Social engineers have found numerous approaches
to exploit victims of their personal information.
With the continuous increase of new cyber
threats, society should be constantly informed
and educated on how to distinguish and prevent
them. Due to the direct interaction with the
human user, social engineering is one of the most
powerful methods of network penetration.
2
What is Social Engineering?
Social Engineering is a type of psychological
manipulation thats used to lure people into
giving away personal information or to do certain
acts. These criminals conduct their attacks
through SMS, phone calls, emails and social
media. Social Engineering depends on human
interaction, which means the success and failure
of the attack relies on the intended victim.
3
Stages of Social Engineering
When a social engineer is set on a new victim,
they begin to research about the person to find
every detail that could be used to their
advantage.
Research
After they gathered enough information, they
start planning how to carry out their attack
either by email, phone call, SMS or through
social media.
Planning
4
Commonly Used Tactics
This technique is when the attacker creates a
narrative which is a series of lies to tell the
victim. The story is created after the attacker
accumulates information about the individual.
Pretexting
Is when the attacker is seeking entry to a
restricted area, where access is unattended or
controlled by electronic access control, they can
simply walk in behind a person who has legitimate
access.
Tailgating
5
Conclusion
When receiving an email or a call, nothing is
predictable. You will always be exposed to many
kinds of attacks, but being aware of them will
give you an upper hand. With social engineers,
the best way to avoid being tricked by them is to
able to distinguish their tactics. Cybersecurity
threats will continue to evolve, but its users
who should be a step ahead and take the necessary
precautions.
Contact us
966 112931501
Hala_at_cerebra.sa
Riyadh, Saudi Arabia, King Fahad Road, Riyadh
Gallery - 2nd Floor, Office 202
www.cerebra.sa
Write a Comment
User Comments (0)
About PowerShow.com