Professional Documents
Culture Documents
2008 Batch-I
Module IX
Social Engineering
Scenario
Mary has cracked Janie’s password!!!!
She did not even use a system. All she did was social
engineering on Janie. That day in the afternoon Mary came to
know that Janie, her colleague had stored some important
client files in her mailbox. Mary wanted that client list as she
could easily meet the sales target with the help of that
information.
Mary and Janie were working as sales managers for almost 5
years in the organization and so knew each other well. Mary
asked Janie out to a restaurant that evening for an informal
chat session. Not knowing Mary’s intention, Janie agreed to
come.
At the restaurant Mary asked some personal questions that
could help her in cracking Janie’s password. And it really
helped. During the due course of their conversation, Janie
revealed her secret answer for her password to Mary.
Just think what Janie will face after Mary cracks into her
mailbox…..to make matters worse she may even have identity
crisis.
Module Objectives
Computer Based
Reverse Social Engineering
Social Engineering
• Pop-up Windows
• Websites/Sweepstakes
• Spam Mail
Reverse Social Engineering
Account Setup
Password Change Policy
Help Desk Procedures
Access Privileges
Violations
Employee Identification
Privacy Policy
Paper Documents
Modems
Physical Access Restrictions
Virus Control
Summary