Copyright © 2011 IsecT Ltd. Securing people Security awareness seminar for IT professionals Information Security Awareness September 2011
2 Copyright © 2011 IsecT Ltd. Introduction Do you use Facebook, MySpace, Flickr, Linked In, Blogger or Twitter? Do your colleagues, friends or family use them? Do you tend to trust the people you know? Are you human?
3 Copyright © 2011 IsecT Ltd. The risks
4 Copyright © 2011 IsecT Ltd. Low-end risk
5 Copyright © 2011 IsecT Ltd. High-end risk? Personal information on as many as 35 million users of a South Korean social network site may have been exposed as the result of what has been described as the country's biggest ever hack attack … Names, phone numbers, addresses, and other details may have been exposed through the Cyworld hack, which follows previous attacks against South Korean government sites and financial service firms. North Korea has been implicated in some of these hacks. … The RegisterThe Register 28 th July 2011
6 Copyright © 2011 IsecT Ltd. Leveraging information
7 Copyright © 2011 IsecT Ltd. Social engineering
8 Copyright © 2011 IsecT Ltd. Social engineering
9 Copyright © 2011 IsecT Ltd. Social engineering
10 Copyright © 2011 IsecT Ltd. D elay A uthenticate R esist T ransfer Dealing with social engineers General employees Front-line employees
11 Copyright © 2011 IsecT Ltd. Other controls
12 Copyright © 2011 IsecT Ltd. Conclusion You may believe you are immune to the kinds of attacks we have discussed … but are your colleagues, friends, bosses, family members, suppliers …? Please help us raise awareness: knowing that we might be attacked, what forms attacks may take, and how to respond (remember DART) are important controls
13 Copyright © 2011 IsecT Ltd. Further information Speak to colleagues Visit the intranet Security Zone Contact the Information Security Manager Read these books …