28.08.2015 Views

Intrusion Detection

Social Engineering - OpenSecurityTraining.info

Social Engineering - OpenSecurityTraining.info

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Phishing<br />

In the field of computer security:<br />

• ―Phishing is the criminally fraudulent process of<br />

attempting to acquire sensitive information such as<br />

usernames, passwords and credit card details by<br />

masquerading as a trustworthy entity in an<br />

electronic communication".<br />

• Examples:<br />

– URL and Email Manipulation<br />

• A URL like (http://www.company.com) looks almost identical to<br />

(http://www.cornpany.com)<br />

– Spear Phishing<br />

– Penetration Testers and Social Engineers<br />

16

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!