Social Engineering ???

Social Engineering ???

???? ?????? ?????? ???? ?????? ????? ?????? ????? (????) ??? ???? ???? ???? ????

??? 07 ?? 2016(????? ???) ????? ???? ????? ?????? (??? ????) ???? ?????? ??? ???? ??? ???? ????? ??????? ?????? ???? ???? ??? ??? ????? ?????? ??? ???? ???????? ????? ???? ??????? ??? ?????? (???? ??? ??? ????? ???????) ?????? ?????? ????

??? ???? ??? ?????? ????? ???? ?? ??? ????? ?? ??????? ????? ????? ????? ????? ?????? ?????? ????? ???? ?????? ?????? ?? ????? ?? ?? ??? ???? ??? ?????? ????? ???????

????? ???? ?? ??? ?????? ??????? ???? ?????? ????? ??? ?????

" https://*cuttt.*lyy/" ????? ???? ???? ???? ????

???? ???? (?????) ???? ?? ???? (????) ??????? ?????? ??????? ?????? ???? ??? ?? ?????? ??? ?????? ?????? ????????

????? ?????? ????? ?"https://*cuttt.*lyy/.." ????? ????? ??? ?????? ???? ??? ???? ?? ???? ?? ?? ??? ????? ???? ????? ???? ?????? ????? ?? ????? ?????? ???? ?? ??????? ????

__

??? ??'?'????

??????? ?????? ??? ??? ??? ?????? ???? ???

Telegram ? https://t.me/menaharia_fm

Facebook ? https://www.facebook.com/profile.php?id=100092573198517&mibextid=ZbWKwL

Website ? www.menahriaradio.com

????? ???? ???? ???? ????? ? https://stream.zeno.fm/yw8poig9iwtuv? ???

https://worldradiomap.com/et/play/menaharia


Social Engineering

in context of information Security :- use of deception to manipulate individual into divulging confidential or personal information that may be used for fraudulent purposes.

:-use of centralized planning in a attempt to manage social change an regulate the entire development and behavior of a society.

:- is a method used by cybercriminals to manipulate and deceive individuals into providing sensitive information or performing actions that may compromise their security or security of an organization

Involves exploiting human psychology and trust to gain unauthorized access to systems, networks or personal information.

Goals of social engineering :- to exploits human vulnerabilities, rather than technical weaknesses ,making it a significant threat to cybersecurity.

Types of social engineering attacks

Baiting- an attacker leaves a malware-infected physical device

Phishing- malicious party sends a fraudulent email disguised as a legitimate email

Spear phishing - attack is tailored for a specific individual or organization.

Vishing- This includes the use of social engineering over the phone

Whaling- This attack targets high-profile employees, such as the CFO OR CEO

Pretexting -to gain the access to sensitive data, a party lies to another

Scareware- Involves tricking the victim to thinking their computer is infected with malware.

Social engineering threats are very dangerous and growing day by day. Also it now becomes one of the major cyber threats for businesses of all sizes. To prevent these attacks, you should equip your business with proper defense measures.

Be cautious when sharing personal information ,verifying the authenticity of communication and regularly updating security measures.

#[email protected]

要查看或添加评论,请登录

Yeabsira Endalkachew的更多文章

社区洞察

其他会员也浏览了