category-banner

Social Engineering In Cyber Security Training Ppt

Rating:
90%

You must be logged in to download this presentation.

Favourites
Loading...
Impress your
audience
100%
Editable
Save Hours
of Time

PowerPoint presentation slides

Presenting Social Engineering in Cyber Security. These slides are 100 percent made in PowerPoint and are compatible with all screen types and monitors. They also support Google Slides. Premium Customer Support available. Suitable for use by managers, employees, and organizations. These slides are easily customizable. You can edit the color, text, icon, and font size to suit your requirements.

People who downloaded this PowerPoint presentation also viewed the following :

Content of this Powerpoint Presentation

Slide 2

This slide gives an overview of social engineering cyber attacks. Social engineering is used to describe a wide range of malicious activities carried out through human interactions.

Slide 3

This slide depicts the social engineering lifecycle. The steps are as follows: Prepare, infiltrate, exploit the victim, and disengage.

Slide 4

This slide lists types of social engineering techniques. These are baiting, pretexting, scareware, phishing, watering hole attacks, and access tailgating.

Slide 5

This slide talks about baiting, a social engineering technique. Baiting attacks use a fake promise to pique a victim’s curiosity or greed. They trick users into falling for a trap that steals their confidential information or inflicts their devices with malware.

Slide 6

This slide discusses pretexting which is a social engineering technique. Pretexting uses a false identity as the “pretext” for building trust, such as directly impersonating a vendor or a facility employee.

Slide 7

This slide talks about scareware which is a social engineering technique. Scareware is a type of malware designed to scare you into taking action. This malicious malware sends warnings that report fake malware infections or claim that one of your accounts has been compromised.

Slide 8

This slide revisits phishing which can be considered as a social engineering technique. Phishing scams are email or text message campaigns devised to trick people into divulging sensitive or financial information about themselves.

Slide 9

This slide talks about watering hole attacks. These attacks target popular websites with malware to affect multiple users simultaneously.

Slide 10

This slide gives information about access tailgating which is a social engineering technique. Tailgating, also known as piggybacking, is following an authorized employee into an area with limited access.

Slide 11

This slide highlights two unusual techniques of social engineering. These are traditional mail malware distribution and fax-based phishing.

Slide 12

This slide talks about fax-based phishing to execute a social engineering attack. Cybercriminals sometimes use unusual methods such as fax instead of the usual email or internet routes to mislead people into revealing their private information.

Slide 13

This slide discusses traditional mail malware distribution as a type of social engineering technique. Cybercriminals once used a home-delivery service in Japan to distribute CDs infected with Trojan spyware.

Slide 14

This slide highlights questions to ask yourself if you suspect a social engineering attack.

Ratings and Reviews

90% of 100
Write a review
Most Relevant Reviews

2 Item(s)

per page:
  1. 80%

    by George Miller

    Very unique, user-friendly presentation interface.
  2. 100%

    by Darren Olson

    Very well designed and informative templates.

2 Item(s)

per page: