1 / 5

What is Social Engineering, It’s tactics and Prevention

Investing in your employees and yourself on raising the level of Cyber security Awareness will be beneficial all around! Companies and organizations should start focusing on improving the security of their human factor.VisitUs:- https://bit.ly/3BIO252

cerebra
Download Presentation

What is Social Engineering, It’s tactics and Prevention

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Social Engineering, It’s tactics and Prevention Social engineers have found numerous approaches to exploit victims of their personal information. With the continuous increase of new cyber threats, society should be constantly informed and educated on how to distinguish and prevent them. Due to the direct interaction with the human user, social engineering is one of the most powerful methods of network penetration.

  2. What is Social Engineering? Social Engineering is a type of psychological manipulation that’s used to lure people into giving away personal information or to do certain acts. These criminals conduct their attacks through SMS, phone calls, emails and social media. Social Engineering depends on human interaction, which means the success and failure of the attack relies on the intended victim.

  3. Stages of Social Engineering When a social engineer is set on a new victim, they begin to research about the person to find every detail that could be used to their advantage. Research After they gathered enough information, they start planning how to carry out their attack either by email, phone call, SMS or through social media. Planning

  4. Commonly Used Tactics This technique is when the attacker creates a narrative which is a series of lies to tell the victim. The story is created after the attacker accumulates information about the individual. Pretexting Is when the attacker is seeking entry to a restricted area, where access is unattended or controlled by electronic access control, they can simply walk in behind a person who has legitimate access. Tailgating

  5. Conclusion When receiving an email or a call, nothing is predictable. You will always be exposed to many kinds of attacks, but being aware of them will give you an upper hand. With social engineers, the best way to avoid being tricked by them is to able to distinguish their tactics. Cybersecurity threats will continue to evolve, but its users who should be a step ahead and take the necessary precautions. Contact us +966 112931501 Hala@cerebra.sa Riyadh, Saudi Arabia, King Fahad Road, Riyadh Gallery - 2nd Floor, Office 202 www.cerebra.sa

More Related