Social Engineering

Social Engineering
  Copy


More Options: Make a Folding Card




Storyboard Description

This storyboard does not have a description.

Storyboard Text

  • How Social Engineering Attacks Happen
  • I've heard the head of IT for the data broker Equalfax is incompetent. He could probably be convinced to install a trojan that gives me full access to the company database. But first I need to get on his schedule for a phone call
  • Time to do some social engineering.
  • Hello, this is Mary, executive assistant to Pointus Hairus, the head of IT for Equalfax
  • I need to be charming and get on that schedule. I'll use the identity of their new employee.
  • Hello. This is Dave. I'm coming in tomorrow but I need to talk to the boss right now. Could you transfer me over to him?
  • Well I don't know Dave. His nearest appointment is in 30 minutes, are you fine with that?
  • Yes, that's great. I really need to ask him a couple of very important questions for the project.
  • Okay, you are in for the 1:00 p.m. appointment. Call back then
  • Thank you.
  • Well, now I can call Pointus Hairus, should be easy to convince him to install a trojan, and once I get that installed I have full access to millions of identities to steal.
  • What should have happened
  • He hung up. I'll need to get a recording of him.
  • What project are you working on?
  • *CLICK*
Explore Our Articles and Examples

Try Our Other Websites!

Photos for Class – Search for School-Safe, Creative Commons Photos (It Even Cites for You!)
Quick Rubric – Easily Make and Share Great-Looking Rubrics
abcBABYart – Create Custom Nursery Art