0% found this document useful (0 votes)
58 views

Social Engineering: How Yoong Han TP038203 UC2F1704IT (ISS) Ethical Hacking and Incident Response

Social engineering tricks users into revealing sensitive information by gaining their trust. It can be performed using tools like the open-source Social-Engineer Toolkit, which is designed for penetration testing and uses techniques like phishing to acquire information from victims. Organizations can help prevent social engineering by protecting confidential data, conducting security assessments, implementing security policies, and encouraging users to verify information sources.

Uploaded by

yoonghan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
58 views

Social Engineering: How Yoong Han TP038203 UC2F1704IT (ISS) Ethical Hacking and Incident Response

Social engineering tricks users into revealing sensitive information by gaining their trust. It can be performed using tools like the open-source Social-Engineer Toolkit, which is designed for penetration testing and uses techniques like phishing to acquire information from victims. Organizations can help prevent social engineering by protecting confidential data, conducting security assessments, implementing security policies, and encouraging users to verify information sources.

Uploaded by

yoonghan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Social Engineering

How Yoong Han


TP038203
UC2F1704IT(ISS)
Ethical Hacking and Incident Response
Introduction

Malicious attack tricking users into giving away


important information
Identify security protocols
Gain victim’s trust in order to gain sensitive
information
Engage their curiosity and engineer them to open
email
SOCIAL ENGINEERING TOOLKIT

Open-source Python
Social-Engineer toolkit(SET) is designed to
perform attacks using an exploitation toolkit.
Used to attack organisations or person during
penetration testing
Designed to protect one of the toughest attacks
in the internet world
Phishing

Acquire information in a way to create curiosity


in within victims
Usually in a form of email or text message
Users will input sensitive information
Attackers attains information
Malware installed once linked is clicked
Prevention

Protecting confidential data


Cyber security assessments from time to
time
Implement a security policy
Double check source

You might also like