Nutrition Networks Social Engineering: How to recognize and prevent it.

Slides:



Advertisements
Similar presentations
You may be a victim of. Are you anxious and worried about what will happen when you and your significant other are together? Apart? Are you the subject.
Advertisements

Mental Toughness Lesson Six: Mental Toughness Aim:
EMPLOYMENT DILEMMA GAME How would you handle these office conflicts and situations? MARJA LEE FREEMAN THE EMPLOYMENT LADY.
Customer Service – Dealing With Difficult Customers
The Philosophy of Exotischism The Essence of the Soul 341 You may have heard it said that it is a good thing that we all feel shame from time to time.
Lesson 10: Dealing with Criticism
Jobs for Montana's Graduates C15L2PP1. Ethics is defined as the specific moral choices made by an individual in his relationship with others. They are.
Internet Online Safety How to have FUN and Stay in Control.
Good morning - Matthias Vermeiren - Joachim Seminck Good morning.
How to optimize your internship experience
A Professional Development Plan for novice teachers.
Social Engineering And You Steve Otto. Social Engineering n Social Engineering - Getting people to do things they ordinarily wouldn’t do for a stranger.
PREVENT BULLYING NOW!!!!!!.
INTERNET SAFETY FOR STUDENTS
What is Bullying? Physical Bullying:
What do other people think dignity means ….?. Being with my family and feeling useful rather than a nuisance Ensuring we have the privacy you would want.
SAFEGUARDING DHS CLIENT DATA PART 2 SAFEGUARDING PHI AND HIPAA Safeguards must: Protect PHI from accidental or intentional unauthorized use/disclosure.
Tips for Scouts.
Minnesota Veterinary Medical Association Dog Bite Prevention Program.
What you don’t know CAN hurt you!
1. Never walk without a document in your hands People with documents in their hands look like hardworking employees heading for important meetings. People.
Loser’s Defenses To identify defensive behaviors individuals use to keep themselves from losing.
Razorblades for Breakfast What You Can Do About Mean, Sarcastic, Argumentative, Manipulating and Otherwise Difficult Co-Workers Presenter: Andrew Sanderbeck.
9/20/07 STLSecurity is Everyone's Responsibility 1 FHDA Technology Security Awareness.
Social Engineering Networks Reid Chapman Ciaran Hannigan.
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
Social Engineering PA Turnpike Commission. “Social Engineering is the practice of obtaining confidential information by manipulation of legitimate users”
Never share your passwords. Even with your significant other or your BFF! Yes, with parents. Especially if they ask. If someone in the lab was watching.
INTERNET SAFETY FOR STUDENTS
A Telephone Operator.
Science of Forecasting Waves GNM Surfing Etiquette Surfing Etiquette is the most important thing to learn before you set foot in the surf. These.
Our Story Who am I? What makes me qualified to talk about anti- bullying? My personal story.
PC Support & Repair Chapter 10 Communication Skills.
Information guide.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
Bullying… What you can do about it. Who is Involved? Who are the three people involved in bullying situations? Definition of Bullying – “Bullying is when.
Personal Safety Unit - Level 7. The Internet is not anonymous. Your address, screen name, and password serve as barriers between you and others.
10/4/2015 Makin’ It Work Lesson 6: Defining Problems Module III: Solving Problems Logically © 2008 by Steve Parese, Ed.D. Transitioning from Corrections.
Keeping Safe While Using the Internet. We live in a community. What are some safety rules we have in our community? Cyberspace is also a community. What.
PHYSICAL ITSECURITY scope. 1.What is password security?. 2.Why can't I tell anyone my password? 3.What about writing my password down 4.Social engineering.
JFK-103B1W9 and JFK-103B3W9 This program is going to be used to learn about:  Decision Making Skills  Communication Skills  Team Building Skills and.
Defense Mechanisms. Defense mechanisms are techniques people use to: 1. Cope with emotions they are uncomfortable expressing -or- 2. Avoid confronting.
What Does Love Mean? “ Love is what makes you smile when you’re tired.” “Love is a little old woman and a little old man who are still friends even after.
1. Never walk without a document in your hands People with documents in their hands look like hardworking employees heading for important meetings. People.
Lecture 19 Page 1 CS 236 Online 16. Account Monitoring and Control Why it’s important: –Inactive accounts are often attacker’s path into your system –Nobody’s.
Basic concept of customer service Basic communication skills of dealing with customers.
February Is Teen Dating Violence Awareness Month.
Data Base Systems Some Thoughts. Ethics Guide–Nobody Said I Shouldn’t Kelly make a backup copy of his company’s database on CD and took it home and installed.
Slide B-1 Case 1 You have just received surprising information that requires your group to take a new approach right away. You know the group members are.
MY ONLINE CODE In the last 2 years of digital literacy I have learned the proper ways to act and why to act that way online, I have also learned other.
INTERNAL CONTROLS What are they? Why should I care?
Healthy relationships and keeping safe. being healthy.
Customer Service – Dealing With Difficult Customers
© 2015 albert-learning.com How to talk to your boss How to talk to your boss!!
Relationship Situations Go to the corner with the corresponding number of the answer that most closely relates to you.
RELATIONSHIPS! The Relationship Trap! What’s healthy, and what is not!
YEAR 6’S GUIDE TO STAYING SAFE ON THE INTERNET. CHATTING When you are chatting to people online, try not to give out any personal information about yourself.
This presentation deals with any kind of information you put online. It relates to e- mails, texts, social networking and the sharing of pictures and.
ONLINE DATING SAFETY TIPS EVERY WOMAN SHOULD KNOW AND FOLLOW.
Bullying A Class discussion. Non-Obvious Bullying Is it possible for friends to bully their friends? How is this possible?
JANELL LAYSER Training Manual. AWARENESS! Social Engineers are out there, and everyone should be prepared to deal with them! They can contact you by phone,
Information Guide to Cyber Bullying. Cyber bullying is a relatively new form of bullying which has started happening a lot on social networking sites,
Gosbecks E-Safety Guide
Protecting Your Privacy Online
Answer the questions to reveal the blocks and guess the picture.
Chapter 3: IRS and FTC Data Security Rules
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
Anuj Dube Jimmy Lambert Michael McClendon
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Nutrition Networks Social Engineering: How to recognize and prevent it.

Clever manipulation Not all computer security problems are technological problems. Some are people problems. Just as talented hackers can use their programming skills to exploit applications, operating systems, and protocols to get inside your companys network, talented social engineers can breach your network by using their people skills and powers of observation to exploit your companys employees, partners, and others who have network access. Lets look at some of the tactics and techniques commonly used by these intruders.

STAFF IMPERSONATORS The ploy: You receive a phone call from someone who claims to be a member of the IT department and asks for your password. He mentions the name of your companys IT director and someone whos handled some of your help desk requests. He tells you theres a problem with your account and it could be disabled, leaving you without or access to needed network shares, unless you supply the information he needs for troubleshooting. What should you do? Ask for the persons name and number and tell him you will call him back. The reality: Good social engineers will do their homework and find out the names of real members of the IT department. They'll even find a way to place the call from inside the company or have a plausible excuse for why its coming from outside (for example, saying that they're troubleshooting the problem from your companys headquarters or its special central IT center"). The truth is, theres rarely any reason a real IT administrator would need to know your password. If they need to get into your account, they can simply use their administrative privileges to change the password to whatever they want and access the account that way. Never give out your password to someone claiming to be in your IT department unless you have an explicit policy and procedure to follow (such as a callback process) to verify the persons authenticity.

THE SYMPATHY CARD The ploy: Someone arrives and tells you hes from the phone company and needs the key to the server room. He says hes new on the job and is supposed to get back to the office in an hour– he got lost trying to find your office and now hes running way behind. He just needs to check out some wiring to follow up on a recent repair job. Hes afraid hell be in big trouble if he doesnt get back in time and he seems genuinely worried and upset. What should you do? The reality: Its possible that hes really on the up-and-up… but not likely. Throwing himself at your mercy is a textbook example of a sympathy ploy, no matter how good an actor he happens to be. Never allow anyone to have physical access to equipment or facilities without following your company procedures regarding such access. It may be tempting to help this person out, but thats what policies are for: to give you an ironclad reason to resist such temptation and ensure that no company assets are put at risk.

USING EMOTIONS The ploy: For the past couple of months, youve been dating a guy whos just starting his IT career as an entry-level net admin. He has a lot of questions about networking practices in general, and its been fun showing off your knowledge and helping him learn the ropes. But lately, hes begun asking fairly specific questions about your network infrastructure, and once or twice hes asked you to share some sensitive information. You figure hes just being curious, and you trust him, but it still seems like he should know better than to ask. What should you do? The reality: If the stakes are high enough, some social engineers will engage in elaborate, long-term schemes that include slowly becoming your friend or even developing a romantic relationship so that you eventually trust them enough to reveal confidential information they can use to break into your network or defeat security mechanisms. Another example of wooing involves persuading you that youve been wronged by your company or that its doing something illegal or unethical and deserves to be taken down by the social engineerwho just needs your help in the form of passwords or other access to bring about justice. Never reveal sensitive information to an unauthorized person, even if its someone you feel close to and think you can trust. If someone shows an interest in such information, it should send up a flag that something could be wrong.

INTIMIDATION TACTICS The ploy: You pick up your phone and an angry voice tells you that your top client has been unable to access critical files on your companys network. The person says shes a consultant working with the client and demands that you provide her with information that will allow her to log in and access the necessary files. She tells you that the client is THIS close to ditching its relationship with your company, and that failure to cooperate could result in legal action and most certainly the termination of your job. Although some of this sounds like idle threats, its hard not to think about what could happen if you dont play along. What should you do? The reality: Some social engineers take the intimidation route to try to elicit information from their victims. They may threaten you over the phone or come storming in, identifying themselves as a boss from headquarters, a major client, an inspector from the governmentsomeone with sufficient firepower to make you uneasy or downright scared. It takes a strong person to say no to the (supposed) boss, risk alienating an important client, get the company in trouble with the government, or stand up to the threat of being firedbut thats exactly what you should do. Never reveal sensitive information to an unauthorized person, regardless of how they represent themselves or what consequences they threaten you with. Tell them that company policy prohibits you from divulging the information theyre asking for. Nobody can second-guess you for adhering to company procedures.

SHOULDER SURFING The ploy: One of the vendors you work with has a habit of walking around behind you when youre at your computer and hanging around to chat while you type. At first it seemed innocent enough, although its fairly annoying. But youve noticed that sometimes, he appears to be scanning your inbox or studying your screen as he talks. In fact, once or twice hes asked you to bring up a particular document, which would require you to log onto the network or navigate to a company intranet page. What should you do? The reality: This situation is a little awkward, since you generally want to be polite to partners, clients, vendors, and coworkers who visit you at your workstation. On the other hand, reading over your shoulder is nosy at best and a possible security risk at worst. Never allow someone to stand behind you and read your screen or watch what you type, unless its someone who has the same privileges and permissions as you or theres absolutely nothing sensitive that could display on your screen. A better practice is to always ask anyone who tries to stand behind you to move. If theyre innocent, theyll be happy to comply; if theyre guilty of snooping, theyll have to comply to look innocent.

YOU SMELL FISH Even if you dont think youre a target of a scenario such as those weve looked at here, you should trust your powers of observation and your instincts. When something seems just a little out of kilter, it could be a clue that some social engineering is afoot. Here are some examples: Someone youre dealing with wont provide contact information Someone is in an extreme rush for something you arent sure they should have Someone seems intent on dropping a lot of names to establish credibility or authority Someone leans on you for information, making you feel uncomfortable or intimidated Someone seems to make lots of small mistakes, such as misspelling or mispronouncing names or asking weird questions (possibly about things they should know if theyre part of your organization) Someone requests confidential information

HELPFUL RESOURCES: SAFE & SECURE