What Is Social Engineering?

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Copyright, 1996 © Dale Carnegie & Associates, Inc. BANK ON IT Money Smart Course Indiana Department of Financial Institutions.
Social Engineering Rick Carback 9/12/2005
IT Arkitektur og Sikkerhed Social Engineering Architecture Patterns.
Ethics, Privacy and Information Security
Good morning - Matthias Vermeiren - Joachim Seminck Good morning.
Social Engineering And You Steve Otto. Social Engineering n Social Engineering - Getting people to do things they ordinarily wouldn’t do for a stranger.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
1 Identity Theft and Phishing: What You Need to Know.
The Dangers of Identity Theft By: Hannah Wolin 7 th Grade Marshall Middle School Anderson.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Identity Theft.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
Social Engineering J Nivethan. Social Engineering The process of deceiving people into giving away access or confidential information Onlinne Phone Offline.
Social Engineering Networks Reid Chapman Ciaran Hannigan.
The Art of Deception - Controlling Human Element of Security - Shohei Hagiwara November 17th, 2009.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
The ins and outs of By: Megan Tucker. What is identity theft? The stealing of a person’s information, especially credit cards and Social Security Number,
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Information Security Information Technology and Computing Services Information Technology and Computing Services
TRACs Security Awareness FY2009 Office of Information Technology Security 1.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Discussion Topics What is Identity Theft? Ways to Commit Identity Theft How Identity Thieves uses Victim’s Information Guarding your personal Information.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Chapter 4.  Can technology alone provide the best security for your organization?
Objectives  Explore ways to prevent identity theft.  Determine the differences between identity theft and consumer fraud.  Examine how media and technological.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Identity Theft The Dangers Involved and How It Affects You!
Topic 5: Basic Security.
By: Asfa Khan and Huda Mukhtar
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Computer Security By Duncan Hall.
When John arrives, do you allow him to use your computer under your account? “I’m John Newbie - the latest hire in the company’s Tech Support. Director.
Sources of Network Intrusion Security threats from network intruders can come from both internal and external sources.  External Threats - External threats.
Designed By: Jennifer Gohn.  “Getting people to do things they wouldn’t ordinarily do for a stranger” –Kevin Mitnick  There are several different.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
JANELL LAYSER Training Manual. AWARENESS! Social Engineers are out there, and everyone should be prepared to deal with them! They can contact you by phone,
1 NETWORKS Lecture Review – Last Lecture Computer Crimes Typical Vulnerabilities Typical Attack Protocols.
Information Systems Security
Social Networks and how to be safe
Social Engineering: The Human Element of Computer Security
Social Engineering Dr. X.
Outline The basic authentication problem
IT Security  .
Social Engineering Charniece Craven COSC 316.
Managing the Bowl for Kids’ Sake Committee
Hello? Using the telephone
#1 Consumer Fraud Complaint – 5th straight year!
Social Engineering: The Art of Manipulation
Computer Security for Businesses
yahoo mail technical support number
Robert Leonard Information Security Manager Hamilton
Social Engineering No class today! Dr. X.
Presented (insert date) By (insert organization’s name)
Presented (insert date) By (insert organization’s name)
Presented (insert date) By (insert organization’s name)
Tom Chothia Computer Security
Certificates An increasingly popular form of authentication
Protecting Your Identity
Don’t Let Work Be a Toxic Waste Zone
Protecting Your Credit Identity
Net301 LECTURE 11 11/23/2015 Lect13 NET301.
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Identity Theft By Omer Ersen.
Presentation transcript:

What Is Social Engineering?

Social Engineering Because there is no “patch” for human stupidity. “You could spend a fortune purchasing technology and services...and your network infrastructure could still remain vulnerable to old-fashioned manipulation.” -Kevin Mitnick

What is Social Engineering Uses Psychological Methods Exploits human tendency to trust Goals are the Same as Hacking

Social Engineering Approaches Carelessness Comfort Zone Helpfulness Fear

Careless Approach Victim is Careless Used for Reconnaissance Does not implement, use, or enforce proper countermeasures Used for Reconnaissance Looking for what is laying around Dumpster Diving/Trashing Building/Password Theft Shoulder Surfing Password Harvesting Impersonation Direct Theft Smoking Zone

Dumpster Diving/Trashing Huge amount of information in the trash Most of it does not seem to be a threat The who, what and where of an organization Knowledge of internal systems Materials for greater authenticity Intelligence Agencies have done this for years

Building/Password Theft Requires physical access Looking for passwords or other information left out in the open Little more information than dumpster diving

Password Harvesting Internet or mail-in sweepstakes Based on the belief that people don’t change their password over different accounts . Sadly, this is, for the most part true.

Impersonation Could be anyone Generally Two Goals Tech Support Co-Worker Boss CEO User Maintenance Staff Delivery Driver Generally Two Goals Asking for a password Building access - Careless Approach

Other Methods Shoulder Surfing Direct Theft Smoking Zone Outside workplace Wallet, id badge, or purse stolen Smoking Zone Attacker will sit out in the smoking area Piggy back into the office when users go back to work

Helpful Approach People generally try to help even if they do not know who they are helping Usually involves being in a position of obvious need Attacker generally does not even ask for the help they receive Piggybacking/Tailgating Troubled user

Piggybacking Attacker will trail an employee entering the building More Effective: Carry something large so they hold the door open for you Go in when a large group of employees are going in Crutches Pretend to be unable to find door key

Troubled user Calling organization numbers asking for help I’m new in IT and the boss is going to kill me. I don’t need your password, but can you provide your username/log in name so I can verify you have the right IP? Getting a username and asking to have a password reset Calls up IT and says, I am kind of new and did something really stupid, I lost my password. Can you reset it for me, my username is xxxx.

Fear Approach Usually draws from the other approaches Puts the user in a state of fear and anxiety Very aggressive Conformity Importance Time Frame

Conformity The user is the only one who has not helped out the attacker with this request in the past I talked to Jan last week and she had no problem providing the information, why do you have to be so difficult? Personal responsibility is diffused User gets justification for granting an attack.

Importance Classic boss or director needs routine password reset So would *you* like to explain to the vice president why *you* don’t think it would be a good idea to reset his password? I am absolutely sure he would be *thrilled* to hear just how important your job is. Showing up from a utility after a natural occurrence (thunderstorm, tornado, etc.) A semi-official looking “uniform” right after a small scale disaster can get you admittance anywhere. Check the back of the building for the phone carrier. Hi, I am from Verizon, we are still having some line difficulties after the hurricane and think we have traced the issue to a loop in your circuit. I need access to your telecom rack.

Time Frame Fictitious deadline Impersonates payroll bookkeeper, proposal coordinator Look, I have 15 minutes to get this taken care of or there will be no paychecks this week. Asks for password change

Advanced Attacks Offering a Service Reverse Social Engineering Attacker contacts the user Uses viruses, worms, or Trojans User could be approached at home or at work Once infected, attacker collects needed information Reverse Social Engineering Attacks puts themselves in a position of authority Users ask attacker for help and information Attacker takes information and asks for what they need while fixing the problem for the user