U.S. J-School Digital Security Sample Slides
�Questions? Suggestions? �Reach out:�https://freedom.press/contact/
Freedom of the Press Foundation (CC BY 4.0)
README: How might these slides be used?
https://freedom.press
README: Use or modify as needed
Freedom of the Press Foundation (CC BY 4.0)
https://freedom.press
Social engineering
https://freedom.press
Source: Watch a CNN reporter get hacked
https://freedom.press
Social engineering: Convincing well-meaning humans to give you access
https://freedom.press
Getting compliance through authority
People are more likely to defer to authority figures — which is why social engineers particularly like impersonating contextually-relevant authorities. For example…
https://freedom.press
Getting compliance through urgency
Social engineers often try to establish a sense of urgency, to get you to act before you’ve thought it through. For example…
https://freedom.press
Getting compliance through kindness
People often just want to be helpful, particularly to those who are nice to them. You guessed it—social engineers use this. E.g.,
https://freedom.press
The Attack Cycle. Credit: Imperva
https://freedom.press
Common tactics
https://freedom.press
Psychological principles of influence
Cialdini’s six principles of influence
https://freedom.press
Psychological principles of influence
https://freedom.press
What kind of psychological principles do you think are in play here?
Source: Sneakers (1992)
https://freedom.press
What kind of psychological principles do you think are in play here?
Source: Real Future (2016)
https://freedom.press
Social engineering software
https://freedom.press
Social engineering software
Relationship-mapping software (e.g., Maltego) helps attackers determine where weaknesses in a network might exist, and who the relevant actors are.
https://freedom.press
https://freedom.press
Activity: Thinking like a social engineer
Put yourself in the shoes of a social engineer. Let’s imagine they want your credit card number. If you were them, how would you get it?
Take 5 minutes and write down your social engineering strategy. Get as creative as you want, but try to keep it realistic.
https://freedom.press
How might you defend yourself against this kind of attack?
https://freedom.press
What can you do to defend yourself?
https://freedom.press
What can you do to defend yourself?
https://freedom.press