Security awareness training aid to overcome social engineering cracks

Page 1

Security Awareness Training Aid to Overcome Social Engineering Cracks The term cracking forum is actually used to describe a approach of attack, where a person makes use of persuasion, often mistreating the trust of naivety or Person to obtain information that can be used to gain unauthorized gain access to to computers or information. Exactly what examples can always be cited on this method of attack? The first couple of examples show cases where they used e-mail. The last example shows a panic attack carried out by telephone. Example 1: You receive an e-mail where the particular sender and the manager or even someone on account of the support department of your bank. In the message he admits that that the Internet Banking service is presenting a challenge and that this issue will be corrected if you run the software attached to this message. Your implementation of this application presents a screen similar the one particular you use to access bank account, waiting for you to type your password. In fact, this application is prepared to steal your password to access the financial institution account and sends it to the attacker. Illustration 2: You receive an electronic-mail saying that will your computer is infected by a computer virus. The message suggests that you install a application available on an Internet site, to eliminate the virus through your computer. The real function of this tool and does not eliminate a virus, nevertheless I give someone access to your computer and all data stored on it. Example 3: a stranger cell phone calls your house and says it is the tech support team of your ISP. In this connection he states that his relationship to the Internet is presenting a challenge and then, ask your password to fix it. If you give your password, this sonamed technical can perform multitude of malicious activities, utilizing your access account Internet and therefore such routines relating to its name. These cases show attacks to social engineering forum, because the speeches and toasts presented in the examples they try to persuade the Consumer to perform a task and the success of the attack will depend on solely on deciding of the User to provide sensitive details or execute programs


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.