BURGISTEIN, Switzerland, September 1st 2016 - Dominique C. Brack, known as D#fu5e and VP of operations at social engineering engagement framework (SEEF), will release the first known social engineering icons, today.
The SEEF social engineering Icons are a powerful visual tool, allowing users to identify a message, without having to think. People recognize icons faster than words. Visual perception is one of the most productive ways through which people can obtain information and process it.
Until today, social engineering had no icons to describe social engineering attack vectors in a detailed and appealing way. The extensive collection of social engineering icons includes icons for: well-known attack vectors, like phishing, dumpster diving, tailgating, or eavesdropping, and for less known attack vectors like: befriending, reciprocation, shoulder surfing, or impersonation. In total, there about 38 icons.
Reviewing and summarization of university ranking system to.pptx
Press release social engineering engagement framework seef social engineering icons
1. www.seef.reputelligence.com
FOR IMMEDIATE RELEASE
Logo wars, the fight for attention and resources
BURGISTEIN, Switzerland, September 1st
2016 - Dominique C. Brack, known as D#fu5e and VP of operations at social
engineering engagement framework (SEEF), will release the first known social engineering icons, today.
The SEEF social engineering Icons are a powerful visual tool, allowing users to identify a message, without having to
think. People recognize icons faster than words. Visual perception is one of the most productive ways through which
people can obtain information and process it.
The SEEF social engineering icons can be used in many ways:
Risk assessments and documentation
Vulnerability reporting
Attack vector development
Information security briefings
Information security awareness trainings
The benefits of using SEEF social engineering icons:
People are visually-driven creatures;
Icons have a tendency to stick better;
Improving general comprehension;
Conveying a memorable message from c-level to technical experts.
Until today, social engineering had no icons to describe social engineering attack vectors in a detailed and appealing
way. The extensive collection of social engineering icons includes icons for: well-known attack vectors, like phishing,
dumpster diving, tailgating, or eavesdropping, and for less known attack vectors like: befriending, reciprocation,
shoulder surfing, or impersonation. In total, there about 38 icons.
The initiative for developing these icons came from the author, who often speaks at security conferences, has
authored a book about social engineering, and works as a senior security consultant for the top international
companies and governmental organizations. He quotes: “Social engineering is a very complex and abstract topic to
grasp. It is not so obvious like technical vulnerabilities in a system; it is about the vulnerabilities of the human mind. I
needed a visually-driven way to convey this message. For other vulnerabilities, there are logos available,
communicating in a memorable and appealing way the risk associated with such a vulnerability. But for social
engineering, as one of the top advanced persistent threats, there were none. So I had to develop the icons myself. So
far, the use of the icons was a full success. For my clients and briefings, I can now use a set comprehensive icons,
communicating in a powerful way the risks of social engineering attack vectors.”
Contact: Dominique C. BRACK
Reputelligence Publishing,
Muttlen 131, CH3664
Tel: +41798721995
Email: publishing@reputelligence.com
Website: seef.reputelligence.com
2. www.seef.reputelligence.com
As the author was quoted at one of his security conference speeches: “Using the social engineering icons will give you
10% more budget, and you will get the hero bonus too.”
They are now available for download. As a free version for using based on the respective license agreement and a paid
version which includes vector files.
Related Links:
http://selz.co/Ny-y91s5Z
https://seef.reputelligence.com
https://www.youtube.com/watch?v=NcpmhsSVzuM&feature=youtu.be
###