The Art of Deception - Controlling Human Element of Security - Shohei Hagiwara November 17th, 2009.

Slides:



Advertisements
Similar presentations
Operational Risks Task 13. What is CNP? CNP stands for Card Not Present and is when you order or pay for something online as you are not in front of the.
Advertisements

A Gift of Fire, 2edChapter 7: Computer Crime1 Computer Crime.
Social Engineering And You Steve Otto. Social Engineering n Social Engineering - Getting people to do things they ordinarily wouldn’t do for a stranger.
COMPUTER CRIMES CREDIT CARD FRAUD “A BILLION DOLLAR PROBLEM”
Kelly Corning Julie Sharp.  Human-based techniques: impersonation  Computer-based techniques: malware and scams.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Protecting Your Identity: What to Know, What to Do.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
1 Identity Theft and Phishing: What You Need to Know.
The Art of Social Hacking
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Information Security Awareness Training
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
Social Engineering – Threats & Concerns Avisek Ghosh, CISA CISSP Sr. Manager – Corporate Security Cognizant Technology Solutions.
Social Engineering J Nivethan. Social Engineering The process of deceiving people into giving away access or confidential information Onlinne Phone Offline.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Social Engineering Networks Reid Chapman Ciaran Hannigan.
Presented by: Casey Mullins Social Engineering - Persuasion -
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Social Engineering PA Turnpike Commission. “Social Engineering is the practice of obtaining confidential information by manipulation of legitimate users”
Factors to be taken into account when designing ICT Security Policies
Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!
[your name, organization] Protecting Your IdentityProtecting Your Identity: What to Know, What to Do.
MONEY MANAGEMENT II Billing Errors/Disputes & Identity Theft.
Program Objective Security Basics
Social Engineering UTHSC Information Security Team.
Security+ All-In-One Edition Chapter 2 – Organizational Security Brian E. Brzezicki.
Website on Computer Security By: Brittany Freeman.
Chapter 4.  Can technology alone provide the best security for your organization?
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
What does “secure” mean? Protecting Valuables
Slides by Kent Seamons and Tim van der Horst Last Updated: Nov 30, 2011.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
CIS Computer Security Kasturi Pore Ravi Vyas.
Slides by Kent Seamons and Tim van der Horst Last Updated: Nov 30, 2011.
Crimes of Negligence or Incompetence Presented By: Lisa R. Williams.
Social Engineering Euphemism for cons –Confidence schemes - note the word confidence Why technologically based security protection that ignores the human.
SOCIAL ENGINEERING PART IA: HOW SCAMMERS MANIPULATE EMPLOYEES TO GAIN INFORMATION.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
Computer Security By Duncan Hall.
Lesson 4-General Security Concepts. The Role of People in Security  This presentation discusses: – The human element and the role that people play in.
JMU GenCyber Boot Camp Summer, Introduction to Reconnaissance Information gathering – Social engineering – Physical break-in – Dumpster diving Scanning.
The Art of Deception: Controlling the Human Element of Security by Kevin D. Mitnick, William L. Simon, Steve Wozniak Kevin D. MitnickWilliam L. SimonSteve.
Social Engineering By: Pete Guhl and Kurt Murrell.
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
December 10, 2002 Bob Cowles, Computer Security Officer
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Designed By: Jennifer Gohn.  “Getting people to do things they wouldn’t ordinarily do for a stranger” –Kevin Mitnick  There are several different.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
Social Engineering as a Means of Exploitation Carrie Estes.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
JANELL LAYSER Training Manual. AWARENESS! Social Engineers are out there, and everyone should be prepared to deal with them! They can contact you by phone,
Social Engineering: The Human Element of Computer Security
Social Engineering Dr. X.
Survival Guide to Help avoid being Conned!
What Is Social Engineering?
Social Engineering Charniece Craven COSC 316.
Social Engineering: The Art of Manipulation
Tax Identity Theft Presenter Date
Cybersecurity Awareness
Robert Leonard Information Security Manager Hamilton
Protecting Your Identity:
The Art of Deception.
Social Engineering No class today! Dr. X.
CS 465 Social Engineering Last Updated: Dec 14, 2017.
Presented by Elizabeth Kunkel Member Service Trainer
What is Phishing? Pronounced “Fishing”
Presentation transcript:

The Art of Deception - Controlling Human Element of Security - Shohei Hagiwara November 17th, 2009

Topic: Infromation Security Technologies Encryption, wirewall, anti-virus software, password Focus: human... Outline: Social engineering? A couple of examples of how attackers get access to information

The book... Title: The Art of Deception Year: 2002 Authors: Kevin Mitnick, William Simon Kevin Mitnick: ex-world-famous hacker, consultant First crime: free bus ride when 12 years old William Simon: writer/editor

What is Social Engineering? ”uses influence and persuasion to deceive people by convincing them that the social engineer is someone he [or she] is not, or by manipulation. As a result, the social engineer is able to take advantage of people to obtain information with or without the use of technology.”(from the book) Pretend, deceive/manipulate, get information

Human Factor of Security Human Factor → the weakest link Emotion, mistakes, misjudgement, tiredness ”Only two things are infinite, the universe and human stupidity, and I'm not sure about the former.” Albert Einstein

6 Basic Tendencies of Human Nature Suggested by Robert B. Cialdini 1. Authority 2. Liking 3. Reciprocation 4. Consistency 5. Social Validation 6. Scarcity

Other Factors National Characters Love thy neighbors Organizational Innocence Sharing information, trust, little/no security → this is changing...

When Innocent Information Isn't... Information that is valuable Credit card number, PIN number, Password, etc We won't give them away because we know they are valuable What about Date of Birth, Pet's name, Student ID, Unit#

Continued... Seemingly useless information can be used to impersonate Step to next more valuable information

An example Banks and CheCredit First Call to Bank: ”I am writing a book. What do you give CheCredit to get credit record?” Second Call to Bank: ”I am calling from Checredit. I am doing a survey to improve service.” ”hours of operation, how many employees, how often call, what is Merchant ID, how long with the bank, suggestions?”

Another example Video shop First call to a shop: ”I had a great experience with the shop and want to send a letter to the manager. And also, I want to send a letter to the company headquarter. What is your brunch number?” Now you have manager's name and brunch number. Continue...

How to prevent 1. Classify information → what is and is not okay to be shared 2. Verify. Don't rely lingo and feelings. Get caller's name and phone number.

Building Trust Appearance, voice, talking, personality Frequent contacts (ex) Video Shop Call to another shop: pretend to be the manager of shop Small requests, chats Continue...

Can you help me? People like helping others

Example of video shop Another call to shop: ”system is down. Can you check a customer for me? Credit card number?”

How to prevent Verify verify verify! Call listed number But you want employees to be helpful to each other at workplace.

Dumpster Diving Low risk and high return Password, receipt, list, etc Shredder may not work... Puzzle → whole list of company systems and passwords

How to Prevent Dumpster Diving Lock the dumpster Cross shredd Mutilevel approach to information of different sensitivity Background check on custodian

Attack on Entry Level Employee An easy target They don't know value of information They don't know the structure of company Likely to obey authority

What is the best countermeasure? Anti-virus? Firewall? Encryption? Code Names? no. Have trained, aware, concsioutious employees

Train Employees Not web page or panphlet Not a one-day seminar → ongoing Raise awareness!!! Procedures are not enough. There are threats Part of job to protect information against threats Reward, encouragement Awareness → specific techniques

Question... Questions?