Social Engineering Training. Why Social Engineering Training? The Department of Energy (DOE) authorized the Red Team to perform vulnerability assessments.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Social Engineering Training. Training Goals Increase Laboratory Awareness. Provide the tools required to identify, avoid and report advanced Social Engineering.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
SOCIAL ENGINEERING ATTACKS GOWTHAM RAM RAJARAM VIGNESH SELVAKUMAR SELLAMUTHU.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
The Art of Social Hacking
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
What is identity theft, and how can you protect yourself from it?
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
Social Engineering PA Turnpike Commission. “Social Engineering is the practice of obtaining confidential information by manipulation of legitimate users”
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Quiz Review.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Security Chapter What Should I Ask Santa Claus For? spoofing: fraudulent activity in which the sender address and other parts of the.
Safe Internet Use Mark Wheatley CSI Onsite
What is Social Engineering. Pretexting Pretexting is the act of creating and using an invented scenario called the Pretext to persuade a target to release.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
CIS Computer Security Kasturi Pore Ravi Vyas.
Types of Electronic Infection
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Information Security Sharon Welna Information Security Officer.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Topic 5: Basic Security.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
What is Spam? d min.
Social Engineering © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
U.S. Businesses Targeted Randy Wolverton Brian J. Koechner.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Sources of Network Intrusion Security threats from network intruders can come from both internal and external sources.  External Threats - External threats.
Do you know who you’re dealing with? Social Engineering: Minimise the risk of becoming a victim.
FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    1 Overall Classification of this Briefing is UNCLASSIFIED//FOUO Phishing.
Outline of this module By the end of this module, you will be able to: Identify the benefits of using social networking to communicate with family and.
Fraud, scams and commercial exploitation. The dangers Children are still generally quite trusting and uncritical about what they read online They are.
JANELL LAYSER Training Manual. AWARENESS! Social Engineers are out there, and everyone should be prepared to deal with them! They can contact you by phone,
Objectives Define phishing and identify various types of phishing scams Recognize common baiting tactics used in phishing scams Examine real phishing messages.
Done by… Hanoof Al-Khaldi Information Assurance
Learn how to protect yourself against common attacks
Social Engineering Brock’s Cyber Security Awareness Committee
Social Engineering Charniece Craven COSC 316.
ISYM 540 Current Topics in Information System Management
Baiting By Conan, Amy and Sarah.
I S P S loss Prevention.
Phishing, what you should know
Information Security 101 Richard Davis, Rob Laltrello.
Phishing is a form of social engineering that attempts to steal sensitive information.
Protect Your Computer Against Harmful Attacks!
Staying Austin College
Social Engineering Brock’s Cyber Security Awareness Committee
Cybersecurity Awareness
Practice Safe Computing
Robert Leonard Information Security Manager Hamilton
HOW DO I KEEP MY COMPUTER SAFE?
9 ways to avoid viruses and spyware
What is Phishing? Pronounced “Fishing”
Presentation transcript:

Social Engineering Training

Why Social Engineering Training? The Department of Energy (DOE) authorized the Red Team to perform vulnerability assessments of DOE laboratories. The Red Team used Social Engineering tactics to attempt to infiltrate the laboratories in Spring They were successful in gaining access and maneuvering without detection at two DOE laboratories and one Site Office. This training class was developed to provide the tools required to identify, detect and deter advanced Social Engineering attempts.

Definition What is social engineering? Art of manipulating people into performing actions or divulging confidential information. Using trickery to gather information or computer system access. In most cases the attacker never comes face-to- face with the victim.

What motivates social engineering? Obtaining personal information for profit. Gaining unauthorized access to an organization. Circumventing established procedures. Just because they can.

Techniques Pretexting Phishing 1 Trojan Horse 1 Baiting 1,2 1 The DOE Red Team used these techniques in their latest successful attacks on two DOE laboratories and one site office. 2 The DOE Red Team was successful using these methods to infiltrate DOE laboratories in the past.

Pretexting Description Create and use an invented scenario (the pretext) to persuade a targeted victim to release information or perform an action, typically over the telephone. Phone Calls Claim a need to perform a service. Ask for information about organization (i.e. reporters, prospective students). Claim to be calling for a friend or family members need access to something. Prevention Be polite. Ask for a number to call *them* back; may allow tracing later. Ask a question for which the answer is not publicly available.

Phishing Description The attacker sends an that appears to come from a legitimate business (bank, credit card company) requesting “verification” of information and warning of some dire consequence if it is not provided. The usually contains a link to a fraudulent web page that seems legitimate and may include company logos and content. Types of Standard Viagra, off-shore lottery, etc…spam. Easy to spot and avoid. claiming to be from DOE, ISU or a bank requiring a quick response and personal information. Unsolicited CVs, requests for feedback on proposals, requests *for* proposals.

Phishing Prevention Examine headers analysis.html Verify sender prior to opening attachments or clicking on web links. Call sender. Contact an associate or representative of sender, if known. Instead of clicking on web links, copy and paste them into a browser. Forward suspicious to for verification.

Phishing – Links

Phishing - Headers

Trojan Horse Description The “ virus” arrives as an attachment promising anything from a “cool” screen saver, an important anti-virus or system upgrade, or the latest gossip about a celebrity.

Baiting Description Attacker leaves a malware infected CD ROM or USB flash drive in a location sure to be found (bathroom, elevator, sidewalk, parking lot), gives it a legitimate looking and curiosity-piquing label, and simply waits for the victim to use the device. Attacker sends the infected device via “Snail”-mail

Baiting Types of mail Unsolicited CDs/DVDs. Claim to provide training, information but really installs malware. Unsolicited thumb drives. “Lost” CDs, thumb drives, other media. Prevention Verify unexpected mailings with sender. Never put anything into your computer if you don’t know where it’s been. Bring “lost” items to IS for examination. If unsure, ask the IS office.

Tools used by Social Engineers Any publicly available information Postings on public web pages. Phone book information. Professional information. Personal and professional relationships Association with ISU. Association with DOE. Conferences and collaborations in field of expertise.

Quick Tests Which of these s in legitimate? Which is fake?

Quick Tests Can you think of ways the information on Ames Laboratory’s public web page could be exploited to execute a social engineering attack? Can you think of an unsolicited , phone call, or snail-mail attack which would be impossible to verify or handle safely?

How to avoid Social Engineering tactics Be suspicious of unsolicited phone calls, visits or messages from individuals asking about employees or other internal information. If an unknown individual claims to be from a legitimate organization, try to verify his or her identity directly with the company. Be certain of a person’s authority to have the information before providing personal information or information about your organization, including its structure or networks.

How to avoid Social Engineering Tactics (Cont) Never reveal personal or financial information in or respond to solicitations for this information. This includes following links sent in an . Check a website’s security before sending sensitive information over the internet. Pay attention to the URL of a web site. Malicious web sites may look identical to a legitimate site, but the URL may use a variation in spelling or a different domain (e.g.,.com vs..net).

How to avoid Social Engineering Tactics (Cont) If you are unsure whether an request is legitimate, try to verify it by contacting the company or person directly. Check previous statements for contact information rather than using contact information provided on a web site connected to the request or in an sent to you. Install and maintain anti-virus software, firewalls, and filters to reduce unwanted traffic.

How to report Social Engineering If Social Engineering techniques are attempted while at work… If you believe you might have revealed sensitive information about the Ames Laboratory… Report it to the IS office at: Phone: This will alert us to any suspicious or unusual activity.

Certificate of Completion This certifies the individual listed below has successfully completed the course entitled Social Engineering Training Prepared by the Ames Laboratory Information Systems Office Employee Name Employee # Date