The Art of Deception: Controlling the Human Element of Security by Kevin D. Mitnick, William L. Simon, Steve Wozniak Kevin D. MitnickWilliam L. SimonSteve.

Slides:



Advertisements
Similar presentations
Ethics, Privacy and Information Security
Advertisements

Topic Outline — Information security? — Security Why? — Security approach — Vocabulary — The weakest link — Real life security sample.
Information Security Awareness Training
PEOPLE’S REPUBLIC OF HACKING By: Lani N, Ashley R, Michael R, Gregory R.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
COMPUTER CRIME An Overview Agenda u Background and History u Potential Criminals u Ethics Survey u Criminal Activity u Preventative Measures u Background.
Social Engineering – Threats & Concerns Avisek Ghosh, CISA CISSP Sr. Manager – Corporate Security Cognizant Technology Solutions.
Author,Kevin Mitnick and William L. Simon Published by Back Bay Books (2012) Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker Presented.
Hands-On Ethical Hacking and Network Defense
Creating a Security Verified Label Standard Patricia Joseph Joseph Consulting LLC.
Note1 (Intr1) Security Problems in Computing. Overview of Computer Security2 Outline Characteristics of computer intrusions –Terminology, Types Security.
1 An Overview of Computer Security computer security.
How to Prepare for the Fall Exam COM380/CIT304 Harry Erwin, PhD University of Sunderland.
The Art of Deception - Controlling Human Element of Security - Shohei Hagiwara November 17th, 2009.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
A Network Security Overview Thomas Kernes November 1, 2000.
The 10 Deadly Sins of Information Security Management
Spring 2003, IEOR Experience and Interface Design For Engineers A New Engineering Direction Mohsen Ashraf Alice ChenJake Gessin Milan Lee Angela.
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
Cracking down on international cyberterrorism
SEC835 Database and Web application security Information Security Architecture.
SWAMI Threats, vulnerabilities & safeguards in a World of Ambient Intelligence David Wright Trilateral Research & Consulting 21 March 2006.
Phish your victims in 5 quick steps. Phish yourself today In less than 5 minutes What is Phish5? Phish5 is a Security Awareness service With Phish5, a.
Course ILT Course Code CSN 208 Network Security. Course ILT Course Description This course provides an in-depth study of network security issues, standards,
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Website on Computer Security By: Brittany Freeman.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
Negotiations for Technology Transfers Getting access to new technology.
Chapter 1 Ethical Hacking Overview. Objectives After reading this chapter and completing the exercises, you will be able to: Describe the role of an ethical.
Aksana Chornenkaya, Sherin Hassan, & Meagan Moore.
Topic 5: Basic Security.
What Can Go Wrong During a Pen-test? Effectively Engaging and Managing a Pen-test.
McGraw-Hill/Irwin © 2013 The McGraw-Hill Companies, Inc., All Rights Reserved. Chapter 11 Computer Crime and Information Technology Security.
CS 4001Mary Jean Harrold1 Class 25 ŸComputer crime ŸAssign ŸTerm paper—due 11/20.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
1 Figure 11-7: Mobilizing Users User Training  Security Awareness  Accountability Training  Self-Defense Training Social engineering threats and correct.
Ghost in the Wires Kevin Mitnick 2012 Heather Sliwoski CS
Chapter 1 Ethical Hacking Overview. Hands-On Ethical Hacking and Network Defense2  Describe the role of an ethical hacker  Describe what you can do.
December 10, 2002 Bob Cowles, Computer Security Officer
Sources of Network Intrusion Security threats from network intruders can come from both internal and external sources.  External Threats - External threats.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
Designed By: Jennifer Gohn.  “Getting people to do things they wouldn’t ordinarily do for a stranger” –Kevin Mitnick  There are several different.
Social Engineering as a Means of Exploitation Carrie Estes.
Law Firm Data Security: What In-house Counsel Need to Know
The Art of Deception: Controlling the Human Element of Security
Social Engineering Dr. X.
Presented by: Kevin Regaldo Phillip Dai
3.6 Fundamentals of cyber security
Developing Software Security Industry Tools
Unit 32 – Networked Systems Security
Responding to Intrusions
Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker
Recommending a Security Strategy
Chapter 11 crime and security in the networked economy
Answer the questions to reveal the blocks and guess the picture.
Little work is accurate
The Art of Deception.
Social Engineering No class today! Dr. X.
Intrusion detection Lewis Knight.
Security Essentials for Small Businesses
Unit 3 Information Systems
12 STEPS TO A GDPR AWARE NETWORK
Firewalls and Security
Cybersecurity: Tried and True Tactics for Assessing and Managing Risks, Employee Training and Program Testing Brian Rubin, Partner, Sutherland Tee Meeks,
Ethical Hacking ‘Ethical hacking’ is the branch of computer science that involves cybersecurity and preventing cyberattacks. Ethical hackers are not malicious.
social Engineering and its importance during Security Audits
Presentation transcript:

The Art of Deception: Controlling the Human Element of Security by Kevin D. Mitnick, William L. Simon, Steve Wozniak Kevin D. MitnickWilliam L. SimonSteve Wozniak Presented by- Dipti Singhal Janish Jindal

About the author - Kevin Mitnick Controversial American computer security consultant, author and hacker. Best sellers – The Art of Invisibility, Ghost in the Wires, The Art of Intrusion and The Art of Deception. Infamous due to his high-profile 1995 arrest and later five years in prison for various computer and communication-related crimes. Now runs a firm named Mitnick Security Consulting, LLC that helps test a company’s security strengths, weaknesses, and potential loopholes.

“I went to prison for my hacking. Now people hire me to do the same things I went to prison for, but in a legal and beneficial way.” – Kevin D. Mitnick

Overview of the book Focuses on the human factors involved with information security and social engineering. The book is divided into four parts- Part 1: Reveals security’s weakest links vulnerable to social engineering attacks. Part 2 and 3: Introduces social engineering threats ranging from simple individual attacks to high level organisational attacks. Part 4: Outlines recommended corporate information security policies, and an associated training program on information security awareness. “It takes a thief to catch a thief”

Positives of the book Introduces a whole new perspective of viewing hacking by exploiting human gullibility in comparison to other hacking related books mainly focussing only on technicalities. Uses a number of real world examples to explain the potential threats and their preventive measures. Covers readers from non-technical background also, as every technical aspect if used is well explained.

Negatives of the book Elimination of the redundant matter from the book would have benefitted the readers. A few impractical security advises are given. Eg. A) Don't write passwords down B) Don't use simple passwords C) Change passwords monthly

Why one should read this book? To protect oneself from the potential social engineering attacks