321 Phishing Vishing SMiShing Social Engineering Techniques.
-
Upload
letitia-hoover -
Category
Documents
-
view
217 -
download
3
Transcript of 321 Phishing Vishing SMiShing Social Engineering Techniques.
![Page 1: 321 Phishing Vishing SMiShing Social Engineering Techniques.](https://reader036.fdocuments.us/reader036/viewer/2022082713/5697bff91a28abf838cbfb2b/html5/thumbnails/1.jpg)
![Page 2: 321 Phishing Vishing SMiShing Social Engineering Techniques.](https://reader036.fdocuments.us/reader036/viewer/2022082713/5697bff91a28abf838cbfb2b/html5/thumbnails/2.jpg)
Socia
l En
gin
eeri
ng
Kevin Mitnick defines it as “the act of gaining sensitive information or unauthorized access privileges by building inappropriate trust relationships with insiders.”In most cases the hacker never comes face-to-face with the victim.
![Page 3: 321 Phishing Vishing SMiShing Social Engineering Techniques.](https://reader036.fdocuments.us/reader036/viewer/2022082713/5697bff91a28abf838cbfb2b/html5/thumbnails/3.jpg)
3
2
1Phishing
Vishing
SMiShing
Social
Engineering
Techniques
![Page 4: 321 Phishing Vishing SMiShing Social Engineering Techniques.](https://reader036.fdocuments.us/reader036/viewer/2022082713/5697bff91a28abf838cbfb2b/html5/thumbnails/4.jpg)
Identity information
![Page 5: 321 Phishing Vishing SMiShing Social Engineering Techniques.](https://reader036.fdocuments.us/reader036/viewer/2022082713/5697bff91a28abf838cbfb2b/html5/thumbnails/5.jpg)
Ph
ish
ing •Usually done by creating fake e-
mail, instant messaging and websites to lure unsuspecting people to enter in their personel information such as usernames, password, and credit card information
•Anytime someone asks you for any personel information without you initiating the contact, you should question the validity of that request
•They represent themselves as trustworthy entities that you know of such as popular social websites, auction sites, online payment processors or even IT administrators
![Page 6: 321 Phishing Vishing SMiShing Social Engineering Techniques.](https://reader036.fdocuments.us/reader036/viewer/2022082713/5697bff91a28abf838cbfb2b/html5/thumbnails/6.jpg)
I’m senior manager. I need your password authorize a transaction for a client. It’s urgent. The client is waiting, I will hold.
I’m senior manager. I need your password authorize a transaction for a client. It’s urgent. The client is waiting, I will hold.
Hacker pretending to be Senior Manager
Victim
My password is p@ssw0rd
![Page 7: 321 Phishing Vishing SMiShing Social Engineering Techniques.](https://reader036.fdocuments.us/reader036/viewer/2022082713/5697bff91a28abf838cbfb2b/html5/thumbnails/7.jpg)
Vis
hin
g •A combination of voice and phishing• Software engineers use a telephone system that uses a Voice over IP (VoIP)•Vishing is used for financial gain to steal credit card number or other personal information used in identity thief schemes from around the world.
![Page 8: 321 Phishing Vishing SMiShing Social Engineering Techniques.](https://reader036.fdocuments.us/reader036/viewer/2022082713/5697bff91a28abf838cbfb2b/html5/thumbnails/8.jpg)
![Page 9: 321 Phishing Vishing SMiShing Social Engineering Techniques.](https://reader036.fdocuments.us/reader036/viewer/2022082713/5697bff91a28abf838cbfb2b/html5/thumbnails/9.jpg)
SM
iSh
ing •A combination of SMs and
phiSHING• Scammers are targeting mobile devices to get you to reveal your personal information.•Send text messages to you and ask to validate or respond to the request. •Once responded, scammer just got you and launched a worm or a malware on your mobile device.•Once downloaded on your mobile devices, spyware can eavesdrop on all your conversations gathering information about you.
![Page 10: 321 Phishing Vishing SMiShing Social Engineering Techniques.](https://reader036.fdocuments.us/reader036/viewer/2022082713/5697bff91a28abf838cbfb2b/html5/thumbnails/10.jpg)
![Page 11: 321 Phishing Vishing SMiShing Social Engineering Techniques.](https://reader036.fdocuments.us/reader036/viewer/2022082713/5697bff91a28abf838cbfb2b/html5/thumbnails/11.jpg)
Socia
l En
gin
eeri
ng
![Page 12: 321 Phishing Vishing SMiShing Social Engineering Techniques.](https://reader036.fdocuments.us/reader036/viewer/2022082713/5697bff91a28abf838cbfb2b/html5/thumbnails/12.jpg)