Social Engineering No class today! Dr. X.

Slides:



Advertisements
Similar presentations
Social Engineering Rick Carback 9/12/2005
Advertisements

Social Network Security Issues: Social Engineering and Phishing Attacks Jeffrey Allen, Leon Gomez, Marlon Green, Phillip Ricciardi, Christian Sanabria.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
SECURITY AND SOCIAL ENGINEERING US Department of Commerce Office of Security Updated 09/26/11 Security is Everyone's Responsibility – See Something, Say.
Social Engineering: The Human Element How Does Social Engineering Work and to What Purpose? Chuck McGann.
Computer Threats I can understand computer threats and how to protect myself from these threats.
CIT In this chapter you will learn how to:  Explain the threats to your computers and data  Describe key security concepts and technologies.
UT Wing Civil Air Patrol. Objective Identify network and cyber vulnerabilities and mitigations Social Media/Metadata/Exfil data MITM Attacks Malware Social.
Social Engineering – Threats & Concerns Avisek Ghosh, CISA CISSP Sr. Manager – Corporate Security Cognizant Technology Solutions.
Social Engineering J Nivethan. Social Engineering The process of deceiving people into giving away access or confidential information Onlinne Phone Offline.
Social Engineering Networks Reid Chapman Ciaran Hannigan.
Malicious Attacks By Chris Berg-Jones, Ethan Ungchusri, and Angela Wang.
The Art of Deception - Controlling Human Element of Security - Shohei Hagiwara November 17th, 2009.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Social Engineering PA Turnpike Commission. “Social Engineering is the practice of obtaining confidential information by manipulation of legitimate users”
Program Objective Security Basics
Social Engineering UTHSC Information Security Team.
Cory Bowers Harold Gray Brian Schneider Data Security.
Cosc 4765 Social Engineering. What is it? ● In the field of computer security, social engineering is the practice of conning people into revealing sensitive.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Chapter 4.  Can technology alone provide the best security for your organization?
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
BUSINESS B1 Information Security.
Slides by Kent Seamons and Tim van der Horst Last Updated: Nov 30, 2011.
CIS Computer Security Kasturi Pore Ravi Vyas.
Slides by Kent Seamons and Tim van der Horst Last Updated: Nov 30, 2011.
Topic 5: Basic Security.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
Computer Security By Duncan Hall.
Lesson 4-General Security Concepts. The Role of People in Security  This presentation discusses: – The human element and the role that people play in.
Designed By: Jennifer Gohn.  “Getting people to do things they wouldn’t ordinarily do for a stranger” –Kevin Mitnick  There are several different.
ARE YOU A CYBER SECURITY RISK?. Pass the Hat Al QaedaFARCHezbollahIRAHAMAS.
JANELL LAYSER Training Manual. AWARENESS! Social Engineers are out there, and everyone should be prepared to deal with them! They can contact you by phone,
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
PRESENTED BY: ASHLEY CLOUSER (CONNER) Identity Theft.
Social Engineering: The Human Element of Computer Security
Social Engineering Dr. X.
Seminar On Ethical Hacking Submitted To: Submitted By:
Add video notes to lecture
What Is Social Engineering?
Network Security Fundamentals
IT Security  .
Social Engineering Charniece Craven COSC 316.
Backdoor Attacks.
I S P S loss Prevention.
Social Engineering: The Art of Manipulation
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Social Engineering in Security
Information Security 101 Richard Davis, Rob Laltrello.
Phishing is a form of social engineering that attempts to steal sensitive information.
Computer Security for Businesses
Cybersecurity Awareness
Robert Leonard Information Security Manager Hamilton
Spear Phishing Ways to Minimize its Risks
The Art of Deception.
Network Security Best Practices
Lesson 2: Epic Security Considerations
Lesson 2: Epic Security Considerations
Lesson 2: Epic Security Considerations
How to keep the bad guys out and your data safe
Business Compromise and Cyber Threat
Chapter # 3 COMPUTER AND INTERNET CRIME
Spear Phishing Awareness
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Identity Theft By Omer Ersen.
Presentation transcript:

Social Engineering No class today! Dr. X

Outline Sigfree by Louis! Q&A buffer overflow homework SE framework SANS Securing the human, by William

What is Social Engineering?

A Quote from Kevin Mitnick “You could spend a fortune purchasing technology and services from every exhibitor, speaker and sponsor at the RSA Conference, and your network infrastructure could still remain vulnerable to old-fashioned manipulation.”

Types of “hackers” according to Kevin Mitnick Crackers (or vandals) Script kiddies Phone phreaks Social engineers

A Classic (and real) Example Stanley Mark Rifkin defrauded the Security Pacific National bank in LA in 1978 Managed to steal $10,200,000 in a single social engineering attack

Types of Attacks Phishing Impersonation on help desk calls Physical access (such as tailgating) Shoulder surfing Dumpster diving Stealing important documents Fake software Trojans

Phishing Use of deceptive mass mailing Can target specific entities (“spear phishing”) Prevention: Honeypot email addresses Education Awareness of network and website changes

Impersonation on help desk calls Calling the help desk pretending to be someone else Usually an employee or someone with authority Prevention: Assign pins for calling the help desk Don’t do anything on someone’s order Stick to the scope of the help desk

Physical access Tailgating Ultimately obtains unauthorize building access Prevention Require badges Employee training Security officers No exceptions!

Shoulder surfing Someone can watch the keys you press when entering your password Probably less common Prevention: Be aware of who’s around when entering your password

Dumpster diving Looking through the trash for sensitive information Doesn’t have to be dumpsters: any trashcan will do Prevention: Easy secure document destruction Lock dumpsters Erase magnetic media

Stealing important documents Can take documents off someone’s desk Prevention: Lock your office If you don’t have an office: lock your files securely Don’t leave important information in the open

Fake Software Fake login screens The user is aware of the software but thinks it’s trustworthy Prevention: Have a system for making real login screens obvious (personalized key, image, or phrase) Education Antivirus (probably won’t catch custom tailored attacks)

Trojans Appears to be useful and legitimate software before running Performs malicious actions in the background Does not require interaction after being run Prevention: Don‘t run programs on someone else’s computer Only open attachments you’re expecting Use an antivirus

Trust Model

Attack Model

Responding You’ve been attacked: now what? Have a place to report incidents People need to take responsibility Conduct audits

Other Thoughts What damage has been done? What damage can still be done? Has a crime actually taken place?

Sources Adopted slides by Caleb Leak and Smiti Bhatt Ch. 5: The basics of Hacking and Penetration Testing SE Framework: http://www.social-engineer.org/framework/general- discussion/

Comprehension questions What is social engineering and why should organizations be concerned about it? Why is social engineering so widely used amongst hackers? Why do so many people fall victim to social engineering attacks? When performing onsite social engineering engagements, what are some of the tactics you use that are most likely to result in a compromise? When performing remote social engineering engagements, what are some of the tactics you use that are most likely to result in a compromise?

Comprehension questions What are the top five things you suggest an organization do or implement to protect themselves from social engineering threats?  What is the most effective strategy an organization can use to educate employees on social engineering threats and are there any tools available to help?

Discussion Questions Can we prepare for zero day SE attacks? What would be the process? Think of SE attacks that are were not included in today’s lecture. Think of SE defenses that were not discussed. Can there be insider SE attacks?