The Art of Deception.

Slides:



Advertisements
Similar presentations
Social Engineering And You Steve Otto. Social Engineering n Social Engineering - Getting people to do things they ordinarily wouldn’t do for a stranger.
Advertisements

The Art of Social Hacking
Aleksandra Kurbatova IVCM.  What is social engineering?  Types  Pretexting  …  Summary  Conclusion.
1 No Silver Bullet : Inherent Limitations of Computer Security Technologies Jeffrey W. Humphries Texas A&M University.
Biometrics Technology Charlie Ahrens Director, DigitalPersona December 12, 2002.
The Art of Deception - Controlling Human Element of Security - Shohei Hagiwara November 17th, 2009.
Social Engineering PA Turnpike Commission. “Social Engineering is the practice of obtaining confidential information by manipulation of legitimate users”
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Social Engineering UTHSC Information Security Team.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
CIS Computer Security Kasturi Pore Ravi Vyas.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Ethical Hacking and Network Defense NCTT Winter Workshop January 11, 2006.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
The Art of Deception: Controlling the Human Element of Security by Kevin D. Mitnick, William L. Simon, Steve Wozniak Kevin D. MitnickWilliam L. SimonSteve.
Ghost in the Wires Kevin Mitnick 2012 Heather Sliwoski CS
Chapter 1 Ethical Hacking Overview. Hands-On Ethical Hacking and Network Defense2  Describe the role of an ethical hacker  Describe what you can do.
Cybersecurity Test Review Introduction to Digital Technology.
Ethical Hacking and Network Defense. Contact Information Sam Bowne Sam Bowne Website: samsclass.info Website:
Designed By: Jennifer Gohn.  “Getting people to do things they wouldn’t ordinarily do for a stranger” –Kevin Mitnick  There are several different.
Tue Becher Jensen Lecture 2 – Real or perceived security.
Important Information Provided by Information Technology Center
Technical Implementation: Security Risks
The Art of Deception: Controlling the Human Element of Security
Social Engineering: The Human Element of Computer Security
Social Engineering Dr. X.
Computer Security Fundamentals
Seminar On Ethical Hacking Submitted To: Submitted By:
Presented by: Kevin Regaldo Phillip Dai
Survival Guide to Help avoid being Conned!
Taken from Hazim Almuhimedi presentation modified by Graciela Perera
Common Methods Used to Commit Computer Crimes
Social Engineering Charniece Craven COSC 316.
Protecting What’s Yours: Your Identity
How to use the internet safely and How to protect my personal data?
Associate Degree in Cyber security
How to use the internet safely and How to protect my personal data?
Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker
Network security threats
Chapter 11 crime and security in the networked economy
Answer the questions to reveal the blocks and guess the picture.
Phishing is a form of social engineering that attempts to steal sensitive information.
Year 10 ICT ECDL/ICDL IT Security.
Tool Server Workstation Router Universal
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Cybersecurity Awareness
Robert Leonard Information Security Manager Hamilton
Social Engineering No class today! Dr. X.
Cyber Security Experts
BCT 2.00 Analyze Technology Issues
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Network Security Best Practices
Securing your hack-free work environment
CSCD 303 Essential Computer Security
Social Engineering Attacks
Objectives Telecommunications and Network Physical and Personnel
Top Five Computer Related Crimes
Faculty of Science IT Department By Raz Dara MA.
Ethical Hacking.
CSCD 303 Essential Computer Security
CSCD 434 Network Security Spring 2019 Lecture 1 Course Overview.
Computer Security By: Muhammed Anwar.
What is Phishing? Pronounced “Fishing”
Financial (cyber) Security
Privacy, Security, and Ethics
CSCD 303 Essential Computer Security
social Engineering and its importance during Security Audits
Presentation transcript:

The Art of Deception

Kevin Mitnick Famous Social Engineer Hacker Went to prison for hacking Became ethical hacker "People are generally helpful, especially to someone who is nice, knowledgeable or insistent."

Kevin Mitnick Arrested and convicted on several counts of computer crime, including hacking and theft of intellectual property

Kevin Mitnick Arrested and convicted on several counts of computer crime, including hacking and theft of intellectual property Began at age 12 with faking punch cards for the bus system to gain free rides and continued on to phone phreaking.

Kevin Mitnick Arrested and convicted on several counts of computer crime, including hacking and theft of intellectual property Began at age 12 with faking punch cards for the bus system to gain free rides and continued on to phone phreaking. Used social engineering to steal passwords to company systems.

Kevin Mitnick Arrested and convicted on several counts of computer crime, including hacking and theft of intellectual property Began at age 12 with faking punch cards for the bus system to gain free rides and continued on to phone phreaking. Used social engineering to steal passwords to company systems He still believes this is far easier to do, even today, than hacking into a system.

Kevin Mitnick Arrested and convicted on several counts of computer crime, including hacking and theft of intellectual property Began at age 12 with faking punch cards for the bus system to gain free rides and continued on to phone phreaking. Used social engineering to steal passwords to company systems He still believes this is far easier to do, even today, than hacking into a system. Since his release from prison, Kevin has started his own computer security company and gives talks around the country about social engineering and other security topics.

What is Social Engineering?

What is Social Engineering? Attacker uses human interaction to obtain or compromise information

What is Social Engineering? Attacker uses human interaction to obtain or compromise information Attacker my appear unassuming or respectable Pretend to be a new employee, repair man, etc. May even offer credentials

What is Social Engineering? Attacker uses human interaction to obtain or compromise information Attacker my appear unassuming or respectable Pretend to be a new employee, repair man, etc. May even offer credentials By asking questions, the attacker may piece enough information together to infiltrate a companies network May attempt to get information from many sources

Kevin Mitnick - Art of Deception:

Kevin Mitnick - Art of Deception: "People inherently want to be helpful and therefore are easily duped"

Kevin Mitnick - Art of Deception: "People inherently want to be helpful and therefore are easily duped" "They assume a level of trust in order to avoid conflict"

Kevin Mitnick - Art of Deception: "People inherently want to be helpful and therefore are easily duped" "They assume a level of trust in order to avoid conflict" "It's all about gaining access to information that people think is innocuous when it isn't"

Kevin Mitnick - Art of Deception: "People inherently want to be helpful and therefore are easily duped" "They assume a level of trust in order to avoid conflict" "It's all about gaining access to information that people think is innocuous when it isn't" Here a nice voice on the phone, we want to be helpful

Kevin Mitnick - Art of Deception: "People inherently want to be helpful and therefore are easily duped" "They assume a level of trust in order to avoid conflict" "It's all about gaining access to information that people think is innocuous when it isn't" Here a nice voice on the phone, we want to be helpful Social engineering cannot be blocked by technology alone

Examples of Social Engineering

Examples of Social Engineering Kevin Mitnick talks his way into central Telco office

Examples of Social Engineering Kevin Mitnick talks his way into central Telco office Tells guard he will get a new badge

Examples of Social Engineering Kevin Mitnick talks his way into central Telco office Tells guard he will get a new badge Pretend to work there, give manager name from another branch

Examples of Social Engineering Kevin Mitnick talks his way into central Telco office Tells guard he will get a new badge Pretend to work there, give manager name from another branch Fakes a phone conversation when caught

Examples of Social Engineering Kevin Mitnick talks his way into central Telco office Tells guard he will get a new badge Pretend to work there, give manager name from another branch Fakes a phone conversation when caught Free food at McDonalds

Examples of Social Engineering Kevin Mitnick talks his way into central Telco office Tells guard he will get a new badge Pretend to work there, give manager name from another branch Fakes a phone conversation when caught Free food at McDonalds

Live Example

Live Example Convinced friend that I would help fix their computer

Live Example Convinced friend that I would help fix their computer People inherently want to trust and will believe someone when they want to be helpful

Live Example Convinced friend that I would help fix their computer People inherently want to trust and will believe someone when they want to be helpful Fixed minor problems on the computer and secretly installed remote control software 

Live Example Convinced friend that I would help fix their computer People inherently want to trust and will believe someone when they want to be helpful Fixed minor problems on the computer and secretly installed remote control software  Now I  have total access to their computer through ultravnc viewer

Weakest Link?

Weakest Link? No matter how strong your: Firewalls Intrusion Detection Systems Cryptography Anti-virus software

Weakest Link? You are the weakest link in computer security! No matter how strong your: Firewalls Intrusion Detection Systems Cryptography Anti-virus software You are the weakest link in computer security!  People are more vulnerable than computers  

Weakest Link? You are the weakest link in computer security! No matter how strong your: Firewalls Intrusion Detection Systems Cryptography Anti-virus software You are the weakest link in computer security!  People are more vulnerable than computers   "The weakest link in the security chain is the human element" -Kevin Mitnick

Conclusion Social Engineering will always exist, and it is extremely difficult to defend against, but the success of such attacks can be decreased substantially with proper policy and personnel training

Policy from a Social Engineer “The Art of Deception” – K. Mitnick

Policy from a Social Engineer “The Art of Deception” – K. Mitnick Kevin Mitnick outlines an excellent security policy at the end of the book with detailed reasoning at every level to defend against Social Engineering Attacks.

Policy from a Social Engineer “The Art of Deception” – K. Mitnick Kevin Mitnick outlines an excellent security policy at the end of the book with detailed reasoning at every level to defend against Social Engineering Attacks. This book teaches you the tricks of deception so that you can learn how to protect against them.

Policy from a Social Engineer “The Art of Deception” – K. Mitnick Kevin Mitnick outlines an excellent security policy at the end of the book with detailed reasoning at every level to defend against Social Engineering Attacks. This book teaches you the tricks of deception so that you can learn how to protect against them. This is a must read for all security professionals.

Questions?