Vous êtes sur la page 1sur 12

Basic Computer Security

Social Engineering
Identity Theft
Group 1
Muhammad Fauzi Maulana

Febi Taufik Faturrahman

Indah Permata Sari

Basic
BESTComputer
FOR YouSecurity 2
O R G A N I C S C O M P A N Y
What is Social
Engineering?

Basic
BESTComputer
FOR YouSecurity 3
O R G A N I C S C O M P A N Y
My slide title
My subtitle
Types of Social Engineering

o Quid Pro Quo

o Phishing

o Baiting

o Pretexting

o Diversion Theft

Basic
BESTComputer
FOR YouSecurity 5
O R G A N I C S C O M P A N Y
Example of

Social

Engineering

Basic
BESTComputer
FOR YouSecurity 6
O R G A N I C S C O M P A N Y
Ways to prevent
Social Engineering

Basic
BESTComputer
FOR YouSecurity 7
O R G A N I C S C O M P A N Y
What is Identity theft?

Basic
BESTComputer
FOR YouSecurity 8
O R G A N I C S C O M P A N Y
Comparison

Company Name » Competitive Service

» Nulla a erat eget nunc hendrerit ultrices eu nec nulla. » Praesent venenatis quam tortor, viverra nunc rutrum.
Donec viverra leo aliquet, auctor quam id, convallis • Maecenas malesuada ultricies sapien sit amet pharetra.
orci. • Nunc tempus, risus sodales sodales hendrerit, arcu dolor
• Sed in molestie est. Cras ornare turpis at ligula posuere, sit commodo libero, a sollicitudin quam nulla quis lectus. In at
amet accumsan neque lobortis. porta mauris.
• Maecenas mattis risus ligula, sed ullamcorper nunc
efficitur sed.

BEST FOR You 9


O R G A N I C S C O M P A N Y
How do the

attackers Steal

Identity?

Basic
BESTComputer
FOR YouSecurity 10
O R G A N I C S C O M P A N Y
What do
Attackers do with
Stolen Identity?

Basic
BESTComputer
FOR YouSecurity 11
O R G A N I C S C O M P A N Y
Basic Computer Security

Thank You
Muhammad Fauzi Maulana
Febi Taufik Faturrahman
Indah Permata Sari

Vous aimerez peut-être aussi