Heads of Security What is Social Engineering?


Scareware? What is Scareware?


Download 2.94 Mb.
bet3/5
Sana16.11.2023
Hajmi2.94 Mb.
#1778093
1   2   3   4   5
Bog'liq
Social Engineering

Scareware?

What is Scareware?


Malicious computer programs designed to trick a user into buying and downloading unnecessary and potentially dangerous software, such as fake antivirus protection.

How Does Scareware Work?


Commonly generates pop-ups that imitate Windows system messages often pretending to be antivirus software. The message usually states that infected files have been found on the users computer.
An offer to obtain downloadable software to fix the problem is made or the user is advised to call a telephone number displayed in the message for technical support.
The user obtains/downloads the software which is effectively useless or allows the attacker that the user called to connect to their computer remotely to install malware.
The users money is lost if payment was made, and their computer will most likely become unstable due to the newly installed malware.

What is Ransomware?


Malicious software (malware) that prevents users from accessing their system or personal files and demands a ransom payment from the user in order to regain access.

Ransomware - WannaCry

Scramble Engineering


Class Activity 2

Dumpster Diving


An attacker digs through trash looking for personal or confidential information that can be used to carry out an attack on a person or business.

Shoulder Surfing


Shoulder surfing involves looking over a person's shoulder to gather personal information while the victim is unaware. This is especially effective in crowded places where a person uses a computer, smartphone or ATM.

Defend Against Pretexting!


How to Avoid Pretexting Scams
    • Never give out private information about yourself or anybody else over the phone or internet unless you initiated the contact.
    • Legitimate organizations will never contact you via phone requesting personal information.
    • If you are approached by somebody you don’t know who is requesting personal information about you or somebody you know, end the conversation immediately. Let the individual know you want to contact their organization and verify their identity and motive first.

Download 2.94 Mb.

Do'stlaringiz bilan baham:
1   2   3   4   5




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling