1 / 7

Social Engineering

Social engineering exploits human psychology rather than technology to achieve a hacker’s goals. Analysts Matthew Dalton and Tom Conley highlight how emotional tension and distractions serve as catalysts for manipulation. This presentation discusses various social engineering strategies that have been characterized by different names, such as Trojan Horse and phishing. Real-life scenarios illustrate how perpetrators can pose as trusted individuals, like HR personnel or distressed parents, to gain sensitive information. Learn to recognize and guard against these psychological tactics.

jason
Télécharger la présentation

Social Engineering

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Social Engineering Loose lips sink ships Tom Conley, Senior Information Security Analyst Matthew Dalton, Director of Information Security Ohio University

  2. What is Social Engineering? • While other forms of hacking target the technology, social engineering attempts to exploit human psychology to achieve the hacker’s goals. • Emotional tension + path to resolution > Logic or Controls = social engineering • Emotional “Amplifiers” and Distractions are catalysts for this. • Social Engineering has been known by many names • Trojan Horse • Con Men • Snake Oil Sales • Phishing

  3. Psychology of Social Engineering

  4. Emotional “Amplifiers”

  5. Scenario #1 Matthew Tom Pretends to work in the HR department • Pretends to be from IT, trying to get a password into the HR system

  6. Scenario #2 Matthew Tom Pretends to work in the Registrar’s office • Ex-boyfriend pretends to be a distraught parent, trying to get a particular student’s class schedule.

  7. Scenario #3 Tom Matthew Pretends to pass by in Baker • Pretends to be a survey taker at the bottom of Baker Center

More Related