Download presentation
Presentation is loading. Please wait.
Published byRosa Norman Modified over 9 years ago
1
Information Security Social Engineering
3
To make you more aware of threats regarding information security Give you examples of real life threats Show you a hacking scenario Let you know what you can do to prevent. Why are we here?
4
What is Social Media & Engineering? Social MediaSocial Engineering Process of using social skills to convince people to reveal access credentials or other valuable information to the attacker. Any method of social interaction where people create, share, or exchange ideas and information. Social media is a tool hackers use to build social engineering. We give them that.
5
Why care? Survey Results Primary use of internet is for social media and then school work Group is aware of cyber security and cyber attacks About 50% have answered personal questions online Group uses smartphones, tablets, and computers to access internet Hackers always find new ways and with advancement in technology it is becoming easier to exploit people STAY INFORMED!!!!
6
Misconception about Phone Security 57% of adult smartphone users are unaware that there are security solutions for smartphones 52% of users store sensitive files on their phones Last year, 38% of smartphone users were victims of cybercrime This number is expected to grow as the smartphone user base continues to grow Smartphones can become infected with many different variations of malware, just as computers can
7
Cell Phone Attacks NFC –Near Field Communication Radio-frequency identification Activate within 3 centimeters –Debuted in 2010 Samsung Nexus S –Used for Mobile Payments Device Pairing Data transfers Eavesdropping Antenna to intercept radio communication Steal/corrupt data being transmitted
8
Cell Phone Attacks Gyroscope –Detect devices orientation in space –Android Frequencies from 80Hz – 250Hz –iOS Frequencies 0Hz – 100Hz –Consequence Record human voices (80Hz – 250 Hz) No explicit permissions required No microphone necessary
9
Cell Phone Attacks Bluetooth –Ultra High Frequency Radio Waves –Short distance (~30ft) –Used for Data transfers Device communication –Bluesnarfing Connect without authentication CRUD data –i.e. Calendar or contacts data –Bluebugging Connect by posing as headset or previously authenticated device Listen to phone calls Interact with text messages
10
Social Engineering Scams 419 Fraud Employment Scam Lottery Scam Online sales and rentals Romance Scam Purchase Order Scam Scams retailers and universities Sends money overseas Uses victims from Romance Scam to facilitate money wiring
11
Local Scams “Peg” Romance Victim Used online dating Fell in love with an “antic dealer” Mike Perry Helped wire money for her “boyfriend” from “antic sales” Money laundering scheme Papageorgiu Also a victim of online dating “girlfriend” was a woman living in Albuquerque Sold his condo to help his “girlfriend”
12
Social Engineering Tactics Nontechnical Pretexting Diversion theft Tailgaiting Shoulder Surfing Techie Talk Neuro-linguistic programming Technical Phishing Baiting Social Networking Social Engineering in reverse
13
Social Network Scam Example Offender Creates fake facebook with full content (pictures, hobbies, etc.) Pretend to be someone you should know (transfer student, fellow employee, etc.) Sends friend request Victim Has security options enabled to only allow friends to see information Is that enough?
14
Art of BS How to invade personal space and gain credibility Use of same language/ slang Humor Build trust 3 layers of space http://youtu.be/1kkOKvPrdZ4?t=31m55s Demonstration
15
Prevention Never give out: Personal information Medical Information Financial Information Be aware of who is asking Doctor, Employer, friend? Should they already have the information? Do they need this information? Why do they need this?
16
Prevention Be aware what they ask via phone Ask for full name of caller Correct spelling A call back number Why they need information When in doubt, put caller on hold and see if they wait. Most scammers will not. Log the strange call Be aware what they ask via internet Watch out for any attachments in e-mail they want you to run Avoid any requests to enter account information if you don’t know the sender or site. When in doubt, you can contact sender or send a new email to address with same subject.
17
Short Video and Live Demo https://www.youtube.com/watch?v=1kkOKvPrdZ4 16:58 Live Demo of Hacking
18
Q&A Can you find a difference between the secured session and insecure session?
19
Q&A True True or false: Social Engineering scams need your trust to happen
20
Q&A False- there are more online and is increasing, but can happen in person or over the phone. True or false: Social attacks can only happen online
21
Q&A Three How many layers of protection are there?
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.