Social Engineering: The Human Element How Does Social Engineering Work and to What Purpose? Chuck McGann.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Social Engineering Training. Training Goals Increase Laboratory Awareness. Provide the tools required to identify, avoid and report advanced Social Engineering.
Kelly Corning Julie Sharp.  Human-based techniques: impersonation  Computer-based techniques: malware and scams.
Social Network Security Issues: Social Engineering and Phishing Attacks Jeffrey Allen, Leon Gomez, Marlon Green, Phillip Ricciardi, Christian Sanabria.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
The Art of Social Hacking
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Facebook Security and Privacy Issues Brian Allen Network Security Analyst Washington University December 2, 2010 Alumni House.
UT Wing Civil Air Patrol. Objective Identify network and cyber vulnerabilities and mitigations Social Media/Metadata/Exfil data MITM Attacks Malware Social.
AVG- Protecting those who are vulnerable.  Free Anti-Virus Software ◦ J.R. Smith President of AVG oversees a lineup of antivirus products used by 110.
Social Engineering J Nivethan. Social Engineering The process of deceiving people into giving away access or confidential information Onlinne Phone Offline.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Internet Phishing Not the kind of Fishing you are used to.
Malicious Attacks By Chris Berg-Jones, Ethan Ungchusri, and Angela Wang.
Internet Security Awareness Presenter: Royce Wilkerson.
Cyber X-Force-SMS alert system for threats.
1 I ntegrated S ite S ecurity for G rids © Members of the ISSeG Collaboration, 2008 See: ISS e G Computer Security: Advice for computer.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Social Engineering PA Turnpike Commission. “Social Engineering is the practice of obtaining confidential information by manipulation of legitimate users”
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Social Engineering UTHSC Information Security Team.
Social Engineering Training. Why Social Engineering Training? The Department of Energy (DOE) authorized the Red Team to perform vulnerability assessments.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
BUSINESS B1 Information Security.
Staying Safe Online Keep your Information Secure.
IT security By Tilly Gerlack.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
CIS Computer Security Kasturi Pore Ravi Vyas.
Information Security Awareness Training. Why Information Security? Information is a valuable asset for all kinds of business More and more information.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Topic 5: Basic Security.
 Carla Bates Technology and Education ED 505.  Social Media Sites are interactive webpages, blogs, and other user created sites that all others to create,
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
INTRODUCTION & QUESTIONS.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Cybersecurity Test Review Introduction to Digital Technology.
PHISHING PRESENTED BY: ARQAM PASHA. AGENDA What is Phishing? Phishing Statistics Phishing Techniques Recent Examples Damages Caused by Phishing How to.
Outline of this module By the end of this module, you will be able to: Identify the benefits of using social networking to communicate with family and.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
Digital Citizenship Project Justin Lann. Netiquette Netiquette on Social Media Sites – A set of social conventions that facilitate interactions over networks.
Important Information Provided by Information Technology Center
Cyber Security and Computer Safety
Social Engineering: The Human Element of Computer Security
Social Engineering Dr. X.
IT Security  .
Social Engineering Charniece Craven COSC 316.
I S P S loss Prevention.
Information Security 101 Richard Davis, Rob Laltrello.
Phishing is a form of social engineering that attempts to steal sensitive information.
Cybersecurity Awareness
Robert Leonard Information Security Manager Hamilton
Social Engineering No class today! Dr. X.
HOW DO I KEEP MY COMPUTER SAFE?
Spear Phishing Awareness
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Cybersecurity Simplified: Phishing
Presentation transcript:

Social Engineering: The Human Element How Does Social Engineering Work and to What Purpose? Chuck McGann

Objective: A discussion on types of “social engineering” and how it can be both damaging to your business and to home environments. [We may touch on the dangers of Social Media if there is time.]

Defining "Social Engineering"  Social Engineering is defined as the process of deceiving people into giving away access or confidential information by establishing a contrived relationship of trust.  Wikipedia defines it as: "is the act of manipulating people into performing actions or divulging confidential information. While similar to a confidence trick or simple fraud, the term typically applies to trickery or deception for the purpose of information gathering, fraud, or computer system access; in most cases the attacker never comes face-to-face with the victim." [1] [1]

Defining "Social Media"  Social media is the collective of online communications channels dedicated to community-based input, interaction, content-sharing and collaboration. Websites and applications dedicated to forums, microblogging, social networking, social bookmarking, social curation, and wikis are among the different types of social mediaforums,microbloggingsocial networkingsocial bookmarkingsocial curationwiki

Quick Video  Placeholder for the below video  hsCtaTracking=70edc2a8-64cf-47f8-9f d17e4660%7Cd07bcdc2-0e2c bc3d1e11d hsCtaTracking=70edc2a8-64cf-47f8-9f d17e4660%7Cd07bcdc2-0e2c bc3d1e11d

The Human Element of Trust  Trust is integral to the idea of social influence: it is easier to influence or persuade someone who is trusting. The notion of trust is increasingly adopted to predict acceptance of behaviors by others, institutions (e.g. government agencies) and objects such as machines…

Audience/Targets/Victims  Employees  Customers  Competitors  Hackers  Family  Friends

Targeted Organizations 9

By Industry 10

Real World Example  Fall of 2012, USPS was targeted by an external social engineering attack  Over 150 USPS users opened the phishing  80 recipients provided their User ID and Passwords  CIRT issued a requirement to reset all WebVPN user account passwords  Lost work hours

Research by Check Point Software Technologies  850 IT and Security professionals in North America, Australia, and New Zealand were surveyed  48% of large businesses have suffered from socially engineered attacks at least 25 times  Resulting in losses of between $25,000 and $100,00 per incident

Social Engineering  Types of Attacks  Phishing – Spear/Whale  Impersonation of Help Desk Agent  Fake software  Trojans  Watering Hole  Drive by download

Phishing  Use of deceptive mass ing  Can target specific entities (“Spear phishing and Whale phishing”)  Prevention:  Honeypot addresses  Education  Awareness of network and website changes  Awareness of links and format of actual address  Note -

Phishing Example  Forwarded message  From: Express Mail Service Sent: Friday, April 26, :13 AM Subject: Shipping Info   Delivery information, Your parcel can not be delivered by courier service. Status:Postal code is not specified. LOCATION OF YOUR ITEM:St.Louis STATUS OF YOUR ITEM: not delivered SERVICE: Local Pickup NUMBER OF YOUR PARCEL:U NU INSURANCE: No Print a label and show it at your post office. An additional information If the parcel is not received within 30 working days our company will have the right to claim compensation from you for it is keeping in the amount of $6.10 for each day of keeping of it. You can find the information about the procedure and conditions of parcels keeping in the nearest office. Thank you for attention. DHL Customer.

Impersonation on Help Desk Calls  Calling the Help Desk pretending to be someone else  Usually an employee or someone with authority with a need-to-know  Prevention:  Assign pins for calling the Help Desk  Don’t do anything on someone’s order  Stick to the scope of the Help Desk

Fake Software  Fake login screens  The user is aware of the software but thinks it’s trustworthy  Prevention:  Have a system for making real login screens obvious (personalized key, image, or phrase)  Education  Antivirus (will not be able to detect zero day exploits – new virus signatures)

Trojans  Appears to be useful and legitimate software before running  Performs malicious actions in the background  Does not require interaction after being run  Prevention:  Don‘t run programs on someone else’s computer  Only open attachments you’re expecting  Use an up-to-date antivirus program

Security Awareness Testing  Method, Tools, and Approach   will contain an URL which would be redirected to a data collection and metrics web site  Data Collection and Metrics Web Site  Redirect user to a webpage which will contain information for security awareness

What Can You Do?  Keep software and antivirus current  Strong security awareness program  Use “least privilege” for users  Periodic technology assessments  Assign the responsibility to someone

Places for Help  SANS – Securing the Human   Multi-State Information Sharing and Analysis Center (MSISAC)   Dept. of Health and Human Services (HHS.Gov)  ning.html ning.html  Stop Think Connect 

Weakest Link? No matter how strong your:  Firewalls  Intrusion Detection Systems  Cryptography  Anti-virus software "At the end of the day, people are a critical part of the security process as they can be misled by criminals and make mistakes that lead to malware infections or unintentional data loss“ – Oded Gonda (VP of Check Point) "The weakest link in the security chain is the human element" -Kevin Mitnick

Questions

Reference  (2013, September 11). Trust (Social Sciences). Retrieved: September 13, 2013, from   Schwartz, Mathew J. (2011, September 21). Social Engineering Attacks Cost Companies. Retrieved: September 13, 2013, from companie/ companie/