0% found this document useful (0 votes)
35 views1 page

Final

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views1 page

Final

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Social engineering - A manipulation technique

Tisha BAJAJ¹, Vansh SABHANDASANI²


Computer Department, CO, VES Polytechnic, Chembur, Mumbai
1: [email protected] 2: [email protected]

Introduction Materials and Method Conclusion


Social engineering is a manipulation technique that exploits human error In conclusion, mitigating social engineering attacks requires a
and psychological manipulation to gain access to private information, Table 1:Common Social Engineering Techniques comprehensive understanding of the tactics and methods employed by
systems, or valuables. Unlike brute force attacks, social engineering relies attackers, as well as proactive measures to enhance security. By recognizing
Technique Description
on tricking individuals into voluntarily providing sensitive data or access, the goals and identifying the traits of these attacks, individuals and
often by posing as a trusted entity. Common methods include phishing, organizations can better protect themselves. Implementing robust
where attackers masquerade as reputable organizations to steal Email Spoofing Sending emails from a forged address to appear legitimate. preventative strategies, increasing awareness about the value of personal
information, and baiting, where enticing offers are used to lure victims into data, and securing networks and devices are crucial steps in safeguarding
exposing themselves to malware. Emotional manipulation plays a against social engineering threats. Through vigilance and education, we can
significant role in these attacks, leveraging emotions like fear, excitement, reduce vulnerability and build a more resilient defense against these
and curiosity to provoke irrational actions. Recognizing and understanding Phone Phishing Using phone calls to trick victims into revealing sensitive manipulative cyber threats.
these tactics are crucial for both individuals and organizations to protect information.
against such threats. Implementing strong security measures, such as multi-
factor authentication, using strong passwords, and maintaining safe
communication habits, can significantly reduce the risk of falling victim to Spear Phishing Targeted phishing attacks on specific individuals or
social engineering attacks. organizations.

Watering Hole Attack Compromising websites frequently visited by the target


group.

Objectives
The objectives of mitigating social engineering attacks include
Table 2:Impact of Social Engineering Attacks Refrences
understanding and defining social engineering, recognizing its goals
(sabotage and theft), and identifying common methods like phishing and Impact Description 1)References Links
baiting. It involves understanding the attack cycle (preparation, infiltration, https://tse1.mm.bing.net/th?id=OIP.FEw2gGW4AGRCuBdVPtd-
exploitation, and disengagement) and spotting attack traits. Key lAHaDt&pid=Api&P=0&h=180
preventative measures include safe communication practices, multi-factor
Financial Loss Direct monetary loss due to fraudulent transactions or theft
authentication, strong passwords, and secure networks. Improving of funds.
awareness of personal data value and cybersecurity threats, and enhancing
organizational security through guest Wi-Fi and device protection, are also
essential.
Data Breach Unauthorized access and exposure of sensitive or
confidential data.

Reputational Damage Loss of trust and credibility among customers and


stakeholders.

Operational Disruption Interruption of business processes and services

Acknowledgement
Hello From Tisha And Vansh.

RESEARCH POSTER PRESENTATION DESIGN © 2019

www.PosterPresentations.com

You might also like