Social Engineering By: Pete Guhl and Kurt Murrell.

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

Social Engineering And You Steve Otto. Social Engineering n Social Engineering - Getting people to do things they ordinarily wouldn’t do for a stranger.
Kelly Corning Julie Sharp.  Human-based techniques: impersonation  Computer-based techniques: malware and scams.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Information Security Awareness Training
CIT In this chapter you will learn how to:  Explain the threats to your computers and data  Describe key security concepts and technologies.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Social Engineering Networks Reid Chapman Ciaran Hannigan.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
The Art of Deception - Controlling Human Element of Security - Shohei Hagiwara November 17th, 2009.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
1 Social Engineering Dr.Talal Alkharobi. 2 Social Engineering - Definition Webster — management of human beings in accordance with their place and function.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Social Engineering PA Turnpike Commission. “Social Engineering is the practice of obtaining confidential information by manipulation of legitimate users”
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Identity and Access Management Dustin Puryear Sr. Consultant, Puryear IT, LLC
The Impact of Physical Security on Network Security
Social Engineering: The Forgotten Information Assurance Risk.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Social Engineering Provide brief background about ourselves i.e. what were are going to school for Ask students what they think social engineering is before.
Intrusion Detection MIS ALTER 0A234 Lecture 11.
UNIT 4 ASSIGNMENT VIRUSES & DESTRUCTIVE PROGRAMS.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
Chapter 4.  Can technology alone provide the best security for your organization?
WORKING EFFECTIVELY IN AN INFORMATION TECHNOLOGY ENVIRONMENT
Slides by Kent Seamons and Tim van der Horst Last Updated: Nov 30, 2011.
Viruses & Destructive Programs
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Slides by Kent Seamons and Tim van der Horst Last Updated: Nov 30, 2011.
Social Engineering Euphemism for cons –Confidence schemes - note the word confidence Why technologically based security protection that ignores the human.
SOCIAL ENGINEERING PART IA: HOW SCAMMERS MANIPULATE EMPLOYEES TO GAIN INFORMATION.
TCOM Information Assurance Management Software Hacking.
Prevent Data Breaches and PII from Walking Out the Door Jim Farrell, Senior Vice President Products Archive Systems 9/18/2015.
INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.
Lesson 4-General Security Concepts. The Role of People in Security  This presentation discusses: – The human element and the role that people play in.
When John arrives, do you allow him to use your computer under your account? “I’m John Newbie - the latest hire in the company’s Tech Support. Director.
JMU GenCyber Boot Camp Summer, Introduction to Reconnaissance Information gathering – Social engineering – Physical break-in – Dumpster diving Scanning.
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
Physical security By Ola Abd el-latif Abbass Hassan.
Social Engineering Grifting in the 21 st century U of I Experiment Power Grid Security Spring 2003.
Cybersecurity Test Review Introduction to Digital Technology.
Designed By: Jennifer Gohn.  “Getting people to do things they wouldn’t ordinarily do for a stranger” –Kevin Mitnick  There are several different.
Access Control for Security Management BY: CONNOR TYGER.
FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    1 Overall Classification of this Briefing is UNCLASSIFIED//FOUO Phishing.
JANELL LAYSER Training Manual. AWARENESS! Social Engineers are out there, and everyone should be prepared to deal with them! They can contact you by phone,
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Identity Theft It’s a crime!
Add video notes to lecture
Network Security (the Internet Security)
Common Methods Used to Commit Computer Crimes
Social Engineering Charniece Craven COSC 316.
I S P S loss Prevention.
Information Security 101 Richard Davis, Rob Laltrello.
Chapter 3: IRS and FTC Data Security Rules
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
Robert Leonard Information Security Manager Hamilton
Information Security and Travel-related Security
Understand mechanisms to control organisational IT security
BACHELOR’S THESIS DEFENSE
CS 465 Social Engineering Last Updated: Dec 14, 2017.
Engineering Secure Software
6. Application Software Security
social Engineering and its importance during Security Audits
Presentation transcript:

Social Engineering By: Pete Guhl and Kurt Murrell

Techniques

Phases of Social Engineering - Very similar to how Intelligence Agencies infiltrate their targets - 3 Phased Approach Phase 1- Intelligence Gathering Phase 2- “Victim” Selection Phase 3 -The Attack - Usually a very methodical approach

Phase 1 -Intelligence Gathering - Phase 1 -Intelligence Gathering - Primarily Open Source Information Dumpster Diving Web Pages Ex-employees Contractors Vendors Strategic Partners - The foundation for the next phases

Phase 2 -”Victim” Selection Looking for weaknesses in the organization’s personnel Help Desk Tech Support Reception Admin. Support Etc.

- Phase 3 - The Attack - Commonly known as the “con” - Primarily based on “peripheral” routes to persuasion Authority Liking & Similarity Reciprocation - Uses emotionality as a form of distraction

3 General Types of Attack Ego Attacks Sympathy Attacks Intimidation Attacks

Intimidation Attack Attacker pretends to be someone influential (e.g., authority figure, law enforcement) Attempt to use their authority to coerce the victim into cooperation If there is resistance they use intimidation, and threats (e.g., job sanctions, criminal charges etc.) If they pretend to be Law Enforcement they will claim the investigation is hush hush and not to be discussed etc.

Sympathy Attacks Attacker pretends to be a fellow employee (new hire), contractor, or a vendor, etc. There is some urgency to complete some task or obtain some information Needs assistance or they will be in trouble or lose their job etc. Plays on the empathy & sympathy of the victim Attackers “shop around” until they find someone who will help Very successful attack

The Ego Attack Attacker appeals to the vanity, or ego of the victim Usually targets someone they sense is frustrated with their current job position The victim wants to prove how smart or knowledgeable they are and provides sensitive information or even access to the systems or data Attacker may pretend to be law enforcement, the victim feels honored to be helping Victim usually never realizes

More info on attacks Attacks can come from anywhere/anytime Social Engineering can circumvent current security practices - What good is a password if everyone has it? No one is immune - Everyone has information about the company

Preventing Social Engineering

Training Warn Users of Imminent Attack - Users that are forewarned are less free with information

Training Define Sensitive Information

Training Define Sensitive Information Passwords

Training Define Sensitive Information Passwords DOB

Training Define Sensitive Information Passwords DOB Maiden Names

Training Define Sensitive Information Passwords DOB Maiden Names Social Security Number

Training Define Sensitive Information Passwords DOB Maiden Names Social Security Number Account Numbers

Training Define Sensitive Information Passwords DOB Maiden Names Social Security Number Account Numbers Billing Amounts

Training Users Passwords, phone numbers, other data

Training Users Passwords, phone numbers, other data System Admins Tougher authentication protocol for password resets

Testing Users - Reveal seemingly innocuous data?

Testing Users - Reveal seemingly innocuous data? System Admins – Divulge network information?

Testing Users - Reveal seemingly innocuous data? System Admins – Divulge network information? Helpdesk personnel – Reset passwords on faulty authentication?

Removing the Weak Link Remove the user’s ability to divulge information - Remove all non essential phones - Restrict to internal communications - Remove Internet access - Disable removable drives - Make false information accessible

Removing the Weak Link Forced strong authentication - Use secure software requiring strong authentication for password resets - Require callback to user’s directory listed number

Removing the Weak Link Secure Protected Doors - Employ Guards - Use Revolving Door - Two Door Checkpoint - Deploy CCTV to remote facility