Social engineering is a popular technique amongst hackers because it is often easier to exploit users' weaknesses than it is to find a network or software vulnerability. View the presentation and happy learning!
2. What is social engineering
Social engineering attacks have two motives or goals, and
every attacker intends to achieve at least one of these.
Sabotage: Disrupting or corrupting data to cause
inconvenience.
Theft: Stealing information or money.
2
3. Scenario of Social engineering
◉ Individual social engineering
The hacker connects with a person via email, text or call. The message often uses urgent, last
chance, update payment details.
◉ Organizational social engineering
The style of social engineering is like the one where the individual is targeted, however the
intent is different. The attacker sends malicious information to an individual hoping that they’ll
share their vital info, giving the hacker access to their company’s data, files, and customer
information.
3
4. Types of social engineering
4
Phishing Baiting Pretexting
Insider threats
5. How AI is used to detect social engineering
5
Deepfake detection
•Technology can now determine when
an image or video is counterfeit.
•It learns the real entity’s facial
mannerisms and uses this knowledge
to analyze an image or video in
question for a match.
Fake review detection
•AI is also being used to scrub out the
fake reviews in a dataset. The validity
of reviews has great consequences for
e-commerce buyers.
•AI can have a huge impact to help
filter out these misleading reviews.
7. Tips to Anticipate a Social Engineering Attack
◉ Think first, act later – Always analyze the message and confirm if the sender is genuine.
◉ Research the link – Hovering over links in email will reveal the actual URL at the bottom.
◉ Research the facts – By researching the context of the email, you’ll avoid falling in the trap
of malicious actors.
◉ Don’t download from untrusted sources – Don’t go downloading anything you find on the
internet.
7
8. Need of ethical hacking
• Ethical hacking is used to secure important data from enemies. It works as a safeguard of
your computer from blackmail by the people who want to exploit the vulnerability.
• Using ethical hacking, a company or organization can find out security vulnerability and
risks.
• Hackers can think from an attacker's perspective and find the potential entry point and fix
them before any attacks.
• Ethical hacking helps us learn new skills used in many roles like software developer, risk
management, quality assurance tester, and network defender.
8