The Art of Social Engineering*

11
The Ultimate Heist Time Magazine: Monday November 20 th , 1978 Stanley Mark Rifkin
  • date post

    21-Oct-2014
  • Category

    Technology

  • view

    634
  • download

    4

description

Most organizations today consider themselves “security-conscious” and may spend significant budget dollars on technology to protect themselves and their networks from intrusion. However, technology alone cannot protect your systems from your biggest vulnerability – the people who work for you. “Social Engineering” is the practice of gaining information or access to protected systems by tricking insiders into providing it. Most people who fall victim to a social engineering attack are people who would never consciously reveal confidential data, but can provide a skilled hacker with the knowledge they need to destroy files or entire systems. In this presentation we will show you how to think like a hacker trying to infiltrate your organization so you can better protect yourself from social engineering attacks. *This presentation is influenced by the book “The Art of Deception: Controlling the Human Element of Security” by Kevin Mitnick, William Simon, and Steve Wozniak

Transcript of The Art of Social Engineering*

Page 1: The Art of Social Engineering*

The Ultimate HeistTime Magazine: Monday November

20th, 1978

Stanley Mark Rifkin

Page 2: The Art of Social Engineering*

Security: Fact or Fiction?

Page 3: The Art of Social Engineering*

Just Ask!

THE DIRECT ATTACK:

Page 4: The Art of Social Engineering*

PHONY SITES AND DANGEROUS ATTACHMENTS

www.paypai.com

www.paypal.com

www.paypa1.coma

Page 5: The Art of Social Engineering*
Page 6: The Art of Social Engineering*

SIX TENDENCIES SOCIAL ENGINEERS RELY ON

•Authority•Liking•Reciprocation•Consistency•Social validation•Scarcity

Page 7: The Art of Social Engineering*

SECURITY IS NOT A PRODUCT; IT IS A PROCESS

Page 8: The Art of Social Engineering*

The reminders must be as well

THE THREAT IS CONSTANT

Page 9: The Art of Social Engineering*

COMMON SOCIAL ENGINEERING METHODS• Posting as employee of vendor

• Posing as someone in authority

• Sending a virus in an email

• False pop-up Windows

Page 10: The Art of Social Engineering*

FACTORS THAT MAKE COMPANIES MORE VULNERABLE TO ATTACKS• Large number of employees

• Multiple facilities

• Information on employee whereabouts left in voice mail messages

• Phone extension information made available

• Lack of security training

• Lack of data classification system

• No incident reporting/response plan in place

Page 11: The Art of Social Engineering*

WARNING SIGNS OF AN ATTACK