Social Engineering In Cyber Security Training Ppt
This set of PPT slides covers social engineering that uses psychological manipulation to mislead users into making security mistakes or giving away sensitive personal information. It includes its life cycle and techniques that hackers deploy to carry out such attacks.
You must be logged in to download this presentation.
audience
Editable
of Time
PowerPoint presentation slides
Presenting Social Engineering in Cyber Security. These slides are 100 percent made in PowerPoint and are compatible with all screen types and monitors. They also support Google Slides. Premium Customer Support available. Suitable for use by managers, employees, and organizations. These slides are easily customizable. You can edit the color, text, icon, and font size to suit your requirements.
People who downloaded this PowerPoint presentation also viewed the following :
Content of this Powerpoint Presentation
Slide 2
This slide gives an overview of social engineering cyber attacks. Social engineering is used to describe a wide range of malicious activities carried out through human interactions.
Slide 3
This slide depicts the social engineering lifecycle. The steps are as follows: Prepare, infiltrate, exploit the victim, and disengage.
Slide 4
This slide lists types of social engineering techniques. These are baiting, pretexting, scareware, phishing, watering hole attacks, and access tailgating.
Slide 5
This slide talks about baiting, a social engineering technique. Baiting attacks use a fake promise to pique a victim’s curiosity or greed. They trick users into falling for a trap that steals their confidential information or inflicts their devices with malware.
Slide 6
This slide discusses pretexting which is a social engineering technique. Pretexting uses a false identity as the “pretext” for building trust, such as directly impersonating a vendor or a facility employee.
Slide 7
This slide talks about scareware which is a social engineering technique. Scareware is a type of malware designed to scare you into taking action. This malicious malware sends warnings that report fake malware infections or claim that one of your accounts has been compromised.
Slide 8
This slide revisits phishing which can be considered as a social engineering technique. Phishing scams are email or text message campaigns devised to trick people into divulging sensitive or financial information about themselves.
Slide 9
This slide talks about watering hole attacks. These attacks target popular websites with malware to affect multiple users simultaneously.
Slide 10
This slide gives information about access tailgating which is a social engineering technique. Tailgating, also known as piggybacking, is following an authorized employee into an area with limited access.
Slide 11
This slide highlights two unusual techniques of social engineering. These are traditional mail malware distribution and fax-based phishing.
Slide 12
This slide talks about fax-based phishing to execute a social engineering attack. Cybercriminals sometimes use unusual methods such as fax instead of the usual email or internet routes to mislead people into revealing their private information.
Slide 13
This slide discusses traditional mail malware distribution as a type of social engineering technique. Cybercriminals once used a home-delivery service in Japan to distribute CDs infected with Trojan spyware.
Slide 14
This slide highlights questions to ask yourself if you suspect a social engineering attack.
Social Engineering In Cyber Security Training Ppt with all 34 slides:
Use our Social Engineering In Cyber Security Training Ppt to effectively help you save your valuable time. They are readymade to fit into any presentation structure.
-
Very unique, user-friendly presentation interface.
-
Very well designed and informative templates.