Hacker’s tricks for online users to reveal their sensitive information such as credit card, bank...

5
Social Engineering Online By Mansour Alotaibi Dr. Dalal Al-Arayed

Transcript of Hacker’s tricks for online users to reveal their sensitive information such as credit card, bank...

Page 1: Hacker’s tricks for online users to reveal their sensitive information such as credit card, bank account, and social security. Phishing emails are designed.

Social Engineering OnlineBy Mansour Alotaibi Dr. Dalal Al-Arayed

Page 2: Hacker’s tricks for online users to reveal their sensitive information such as credit card, bank account, and social security. Phishing emails are designed.

Hacker’s tricks for online users to reveal their sensitive information such as credit card, bank account, and social security.

Phishing emails are designed to look like they are official.

Phishing emails also request immediate visit to update personal details .

Phishing

Page 3: Hacker’s tricks for online users to reveal their sensitive information such as credit card, bank account, and social security. Phishing emails are designed.

Spear phishing are highly specialized attacks that are targeted to small groups in collecting information to have access to many systems.

Social networks may be effected by spam or malware links that are added in apps or compromised accounts.

Spear Phishing

Page 4: Hacker’s tricks for online users to reveal their sensitive information such as credit card, bank account, and social security. Phishing emails are designed.

An electronic equivalent of junk, bulk, unwanted, or unsolicited email.

Ensuring the filtered junk mail is a way to check the needed emails from the unwanted ones.

Limiting viewers accessibility to the email profile blocks unnecessary online presence of people.

Spam

Page 5: Hacker’s tricks for online users to reveal their sensitive information such as credit card, bank account, and social security. Phishing emails are designed.

Creating TCP/IP packets to use someone’s else’s IP address to hide the original IP like chatting on-line, sending emails, and surfing the web.

Man-in-the-middle, routing redirect, source routing, blind spoofing, and flooding are examples of spoofing.

Spoofing