Transcribed
Social Engineering
Phishing Practice of sending emails appearing to be from reputable sources with the goal of influencing or gaining personal information 01 WORD SIN BAK OWONO PROS T E FiSPDeORD PTR D A CML ONORD PIR ONTER Vishing 02 LEACAKDWOROYOSAX-SAY Practice of pretexting as another person with the goal of obtaining information or LEACOADNO PR PisiceCx AMIAX Practice of eliciting bctughcCALL e information or M EHORT Y attempting to influence action access to a person, company, or computer system via the telephone, may include such tools as "phone spoofing" Impersonation 03 B.. BB.
Social Engineering
shared by SocialEngineerInc on Apr 29
324
views
2
faves
0
comments
Research has been compiled from all of the latest reports and statistics available and put into a graphical format to help educate people on these threats.
As always, our motto is “Security Throu...
gh Education” and we wanted to make the infographic about that, so it is complete with three principles to help you, your families, and your companies stay protected from social engineering threats.
- See more at: http://www.social-engineer.org/social-engineering/social-engineering-infographic/#sthash.RePfY5g5.dpuf
Source
http://www.s...raphic.jpgCategory
TechnologyGet a Quote