1 hour 31 minutes
episode to how to do a live identity hack there set up.
So what is identity theft and social engineering,
identity theft and identity fraud? A terms used to refer to all types of crime, in which someone wrongfully obtains and users another person's personal data in some way that involves fraud or deception. Typically for economic gang,
we now live in a world where we create 2.5 quintillion bytes of data every single day.
That's a two of five and then 17 zeros after it. Social engineering refers to the art of manipulating people to divulge confidential information.
Think of it this way.
If I were to meet you on the street for the very first time and I asked you some very basic questions like, Hey, what's your name? You might be prepared to provide that information to me.
I might ask you then, Well, hey, are you married or are you single again? You might divulge that information, especially if it's in a babysitting.
If I then start asking questions like What's your age? Or, alternatively, do you have any Children or where do you live or where do you work? This is where it starts to get really, really creepy.
When I was growing up, I was told by my parents, Never, ever talk to strangers. But we now live in a world off social media where it's almost a certainty that your divulge a lot of information online about yourself. Unknowingly. Have a look at your Facebook account.
How much information is on there that might be considered sensitive information. Do you have your address details on there? Do you have where you went to school or university? Do you have things like I'm your date of birth, et cetera? Do you have any embarrassing photos on their et cetera or normal fighters of you doing things?
These are all things that we and now sharing publicly. And that's just on one social media food. We've got others like Snapchat, instagram, twitter, et cetera. This information can be used against you,
so let's have a look at setting the scene. This part of the presentation is one I would deliver to an audience,
so we live in a connected reality
in 2005 at a papal speech. You can see in this particular photo here that we've got one person right down here that's recording the papal speech.
Fast forward. A mere eight years later, you can see now almost everybody is on their smart device recording the papal speech. We live in a connected world.
Almost everyone today has access to a smart device, whether it be a smart phone, a tablet, a watch or even a laptop. And all of these devices connect to the Internet
as the human race. We create 2.5 quintillion bytes of data every single day. That's a two of five and then 17 zeros after it. That's a lot of information, and in fact, we've created more doctor in the last two and 1/2 years that we have in the last 5000 years of human civilization
there. Plenty of studies out there that show just how often we touch our smart devices has now got to the point where we're starting to put up signs like this.
So I'll give you a chance to read it, but it might take you a little longer.
We've also got this funny sign here that I found in a building in New York.
So we live in this connected world.
What I want you to do in this particular slide, it's a wonder to focus on that. We are available almost 24 7 on the Internet. We now get to the point where we have our phone next. How our bed when we go to sleep,
it monitors are sleeping patterns, especially if you use so, for example, a smart watch.
Most people have social media rats, but they don't understand what information is being captured about them.
Some interesting facts and these are some things are like thio put into the source of presentations.
One American's touched their fines around 80 times per day, and when you get access to the slide deck, you can click on the link and I'll take you to this particular article.
90% of users do not turn off. Location service is on their smart devices. This means that not only is the smart phone tracking it, but any app that has turned on is also tracking that information as well. Things like
Facebook, Twitter, instagram stature, they know wherever you are in the world,
and that can be good, but it can also be used against you
next slide that are present
when we think about hacking.
We have a reality that is the gaming world,
the movie world and then reality itself.
And so when we have a look at it, this is the gaming world version of hacking.
Here we have the movie world of hacking,
but then we have the reality,
and I've put this picture up. This is my puppy dog, Archie, here in our room, any surfing, the Internet. And the reason why I've put this picture up here is because when I've taken a photograph and this will become a person it later on. But to
we pretend who we are as well,
we don't know who the other person is. On the other side. Off that keyboard,
I could pretend to be a 15 year old boy or a 15 year old girl. We don't really know who is on the other side.
So what are the Ki taek wise here?
The average person does not have a clue as to how easy it is to obtain sensitive information about them.
The last photo that I used is a picture, as I said of my puppy dog at home, and it has was called exit data exchangeable image file information.
The ex of Dada contains metadata off that photograph because it was taking us on a smartphone. It will capture information like
what type of phone was used, whether it was an android phone or an apple phone. What the operating system was, What? The version off the operating system. It waas the date the time If I'm using the front camera or the rear camera. What position did find was that as well? It was a horizontal. Was it vertical?
It also includes things like Did I use a flash A ll the way through to things like the GPS location.
So what this means is that anybody that has access to this photo will be up to know within three feet the exact location of where that photograph was taken
again. Some new interesting stats here for you. There's a new hacker attack every 39 seconds
and 43% of cyber attacks target small to medium. Business is one of the biggest misconceptions that most people work on is that there are nobody.
Why should a hack a target mate on a small business or arman individual? Why should that target mate?
You can't work on the basis of security through obscurity.
It is quite easy for me to grab that information and will be fire easier for May to steal person's identity in the first place. Then it will be for them to prove that their identity has been stolen.
So let's go through an assessment question here for you. So what is social engineering?
Is it a type of crime with someone? Uses another's personal information for deception, all fraud, the ability to manipulate people to divulge confidential information or an analysis of social media platforms.
The correct answer is the ability to manipulate people to divulge confidential information. The 1st 1
is talking about identity theft or identity fraud.
In this online course, you will learn how to craft the perfect phishing email to ...
2 CEU/CPE Hours Available
Certificate of Completion Offered
Certified Information Systems Security Professional (CISSP)
CISSP is the basis of advanced information assurance knowledge for IT professionals. Often referred to ...
19 CEU/CPE Hours Available
Certificate of Completion Offered