Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
2Activity
0 of .
Results for:
No results containing your search query
P. 1
Social Engineering Ueber Gefahren Psychologischer Verwirrung

Social Engineering Ueber Gefahren Psychologischer Verwirrung

Ratings: (0)|Views: 32|Likes:
Published by Research Guy

More info:

Published by: Research Guy on Feb 24, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as DOC, PDF, TXT or read online from Scribd
See more
See less

11/04/2012

pdf

text

original

 
 
Seminar Datensicherheit
Verwaltungsinformatik
Vortragsreihe der Studenten
Prof. Dr. Thomas WaasAlfons-Goppel-Platz 195028 Hof/SaaleRaum:FB 131Sprechstunde: Wintersemester 2005Tel.: 09281/409-
489
Donnerstag:10
00
Uhr – 11
00
Uhr Fax: 09281/409-400Email:thomas.waas@fh-hof.de
 
Social Engineering
über die Gefahren der psychologischen Verwirrungbei der Informationsbeschaffungund die Sicherheitskultur
Abbildung 1: Was versteht man unter Sicherheitskultur 
©Christian GrafeWS 06 / 07Seminararbeit
 
Inhaltsverzeichnis
Social Engineering ........................................................................................................ 2Inhaltsverzeichnis .......................................................................................................... 3Grundlagen zum Social Engineering ............................................................................ 4Versuch einer Definition ................................................................................................ 4Warum hat Social Engineering Erfolg ........................................................................... 4Motivation von Social Engineers ................................................................................... 4Unterschiedliche Arten von Social Engineering ............................................................ 4Computer Based Social Engineering ............................................................................ 5Human Based Social Engineering ................................................................................ 5Reverse Social Engineering .......................................................................................... 6Konkretes Vorgehen bei einem Angriff ......................................................................... 6Informationsbeschaffung ............................................................................................... 7Aufbauen von Kontakten / Identität fälschen ................................................................ 7Informationen über das Ziel erarbeiten ......................................................................... 7Mit den Informationen ................................................................................................... 7Informationen logisch zusammensetzen ...................................................................... 8Schutzmaßnahmen ....................................................................................................... 8Grundlegende Schutzmaßnahmen ............................................................................... 8Secure Awareness ........................................................................................................ 9Anhang .......................................................................................................................... 9Literaturverzeichnis:...................................................................................................... 9Abbildungsverzeichnis .................................................................................................10Definitionsverzeichnis .................................................................................................10

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->