Social Engineering Euphemism for cons –Confidence schemes - note the word confidence Why technologically based security protection that ignores the human.

Slides:



Advertisements
Similar presentations
Social Engineering And You Steve Otto. Social Engineering n Social Engineering - Getting people to do things they ordinarily wouldn’t do for a stranger.
Advertisements

Kelly Corning Julie Sharp.  Human-based techniques: impersonation  Computer-based techniques: malware and scams.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Privacy (or Data) Breaches - Examples South Carolina Department of Revenue Hackers got into the SCDOR’s computers, and stole information on up to 3.2 Million.
Kimberly Castner-Scott. What is Identity Theft I Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully.
1 Identity Theft and Phishing: What You Need to Know.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Fraud and Identity Theft Test Review. Who should you contact if you are a victim of identity theft?
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
©1999 Addison Wesley Longman Slide 13.1 Information System Security and Control 13.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
The Art of Deception - Controlling Human Element of Security - Shohei Hagiwara November 17th, 2009.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
1 Social Engineering Dr.Talal Alkharobi. 2 Social Engineering - Definition Webster — management of human beings in accordance with their place and function.
Engineering Secure Software. Lottery Story A Threat We Can’t Ignore  Documented incidents are prevalent Carnegie Melon’s SEI has studied over 700 cybercrimes.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
October 27,  According to the Federal Trade Commission, identity theft is the fastest growing white collar crime in the United States  Increasing.
TRACs Security Awareness FY2009 Office of Information Technology Security 1.
General Awareness Training
Texas House of Representatives Committee on Criminal Jurisprudence Testimony of Randall S. James Banking Commissioner Texas Department of Banking August.
Cyber Crimes.
National Energy Research Scientific Computing Center (NERSC) Computer Security – The New Threats Stephen Lau NERSC Center Division, LBNL June 24, 2004.
Slides by Kent Seamons and Tim van der Horst Last Updated: Nov 30, 2011.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Welcome to the world of Identity Theft and Identity Fraud. Will YOU be the next victim? “Once considered primarily an economic crime or a juvenile pastime,
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
Hacking and International Investigations Presented By: Nenette Day Harvard University Extension School.
Slides by Kent Seamons and Tim van der Horst Last Updated: Nov 30, 2011.
Information Security Awareness Training. Why Information Security? Information is a valuable asset for all kinds of business More and more information.
Eng. Hector M Lugo-Cordero, MS CIS4361 Department of Electrical Engineering and Computer Science February, 2012 University of Central Florida.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
SOCIAL ENGINEERING PART IA: HOW SCAMMERS MANIPULATE EMPLOYEES TO GAIN INFORMATION.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Identity Theft. Inform Police and Postal Inspector Contact bank and ask to have account flagged Call credit card fraud units – Register a Fraud Alert/Victim.
Sample only Order at Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the.
Topic 5: Basic Security.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
U.S. Businesses Targeted Randy Wolverton Brian J. Koechner.
Social Engineering By: Pete Guhl and Kurt Murrell.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Social Engineering Grifting in the 21 st century U of I Experiment Power Grid Security Spring 2003.
December 10, 2002 Bob Cowles, Computer Security Officer
Government Agency’s Name April Identity Theft is when someone steals your personal information and uses it as their own, usually for some financial.
REACTION AND ACTION RESPONDING TO FRAUD 1. THE VICTIMS THE CON IS TAILORED TO THE PROSPECTIVE VICTIMS. 2.
3.04 HIPAA Compliant Employee Sanctions: A Fair and Objective Approach Frank Ruelas, MBA Director, Corporate Compliance Gila River Health Care Corporation.
Sources of Network Intrusion Security threats from network intruders can come from both internal and external sources.  External Threats - External threats.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Identity Theft. What Is Identity Theft? – Acquiring someone’s identifying information and impersonating them for gain.
The Wolf in Sheep’s Clothing: Identity Theft Professional Development Institute Truman State University.
JANELL LAYSER Training Manual. AWARENESS! Social Engineers are out there, and everyone should be prepared to deal with them! They can contact you by phone,
Payment Card Industry (PCI) Rules and Standards
Identity Theft It’s a crime!
Social Engineering Charniece Craven COSC 316.
Tax Identity Theft Presenter Date
CSI Survey 2007 Tiffany Gorman
Cybersecurity Awareness
Robert Leonard Information Security Manager Hamilton
Red Flags Rule An Introduction County College of Morris
Identity Theft Prevention Program Training
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
CS 465 Social Engineering Last Updated: Dec 14, 2017.
Engineering Secure Software
Protecting Yourself from Fraud including Identity Theft
Presentation transcript:

Social Engineering Euphemism for cons –Confidence schemes - note the word confidence Why technologically based security protection that ignores the human factor won’t work

Some examples Some dinosaur cons – Count Lustig The OTB wire Identity theft Industrial espionage A disgruntled employee

Relationship to Industrial Espionage Fortune 1000 firms reported trade secret losses in 1999 of $45B, estimates for 2003 are $100B Insiders commit 85% of industrial espionage crimes Kites – expendable contractors that provide access and plausible deniability

The Problem of False Credentials Minimal cost to purchase university degrees and transcripts – They may be back dated Extent of resume fraud – recent research found that 11% of resumes that were checked misrepresented their qualifications

The Social Engineering Attack Cycle Research Developing rapport and trust Exploiting trust Utilizing information Covering tracks

How Attackers Take Advantage Use of authority Being likable Creating a situation where reciprocation is expected Eliciting a public commitment then requesting an action that seems to be consistent with the commitment Creating the belief that others have validated the action Creating the illusion of scarcity

Common Social Engineering Methods Posing as a fellow employee, vendor employee, law enforcement Posing as someone in authority Posing as a new employee requesting help Offering help if a problem occurs then making the problem occur Sending software or a patch for a victim to install Using insider lingo to gain trust Capturing victim keystrokes through different ruses Modifying a fax machine to make appear internal Getting a receptionist to receive and the forward faxes Asking for a file to be transferred to what appears to be an internal location Pretending to be from a remote office and asking for local access Getting a voice mailbox set up so callbacks perceive attacker as internal

Common Targets of Attacks Target Type 1)Unaware of value of information 2)Special privileges 3)Manufacturer/vendor 4)Specific departments Examples 1)Receptionists, telephone operators, administrative assistants, security guards 2)Help desk, technical support, system administrators, computer operators, telephone system administrators 3)Computer hardware, software manufacturers, voice mail sellers 4)Accounting, HR

Seven Deadly Sins Gullibility Curiosity Courtesy Greed Diffidence Thoughtlessness Apathy

Factors that Heighten Companies’ Vulnerability Large number of employees Multiple facilities Information on employee whereabouts left on voice mail Phone extension information made available Lack of security training and awareness No data classification system No incident reporting/response plan in place

Verification and Data Classification in Response to Requests Verification of identity Verification of employee status Procedure to determine need to know Criteria for verifying non-employees Data classification