What is Social Engineering? An illustrated presentation.

23
What is “Social Engineering”? WHAT IS SOCIAL ENGINEERING? Copyright 2016 Integrity Technology Systems, Inc. All rights reserved. The information contained herein is subject to change without notice.

Transcript of What is Social Engineering? An illustrated presentation.

Page 1: What is Social Engineering?    An illustrated presentation.

What is “Social Engineering”?WHAT IS

SOCIAL ENGINEERING?

Copyright 2016 Integrity Technology Systems, Inc. All rights reserved. The information contained herein is subject to change without notice.

Page 2: What is Social Engineering?    An illustrated presentation.

Social Engineering

Using knowledge of human behavior to elicit a defined response.

The hacking of humans

Page 3: What is Social Engineering?    An illustrated presentation.

Sociology and Psychology• Study of human behavior, interaction and societal norms.• Actions can be predicted quite accurately.• Actions can also be influenced quite easily.

Page 4: What is Social Engineering?    An illustrated presentation.

Simple Human Behavior

• Two Types of Responses– Natural– Learned

Hackers will craft a scenario for you to enter, in order to elicit a response which they believe will give them the result they are looking for.

Page 5: What is Social Engineering?    An illustrated presentation.

Types of Attacks & Real World Examples

Page 6: What is Social Engineering?    An illustrated presentation.

Why talk about social engineering?Social engineering is a component of the attack in nearly 1 of 3 successful data breaches, and it’s on the rise.

Source: 2016 Verizon Data Breach Investigation Report

Page 7: What is Social Engineering?    An illustrated presentation.

5 Common Attack Methods

DUMPSTER DIVING

PRETEXTING

PHISHING

PHYSICAL ENTRY

ENTICEMENT

Page 8: What is Social Engineering?    An illustrated presentation.

Dumpster DivingIf not properly discarded, sensitiveinformation may be discovered by hackersin waste receptacles and dumpsters.

– Printed emails, expense reports, credit card receipts, etc.

– Network or application diagrams, device inventory with IP addressing, etc.

– Notebooks, binders or other work papers containing sensitive information

Page 9: What is Social Engineering?    An illustrated presentation.

Pretexting • Fraudulent phone calls• Used to extract information• Also used to setup other attacks such as

facility entry or phishing

Page 10: What is Social Engineering?    An illustrated presentation.

PhishingPhishing is the process of crafting emails that appear to be from a trusted source and typically invite the recipient to either supply confidential information or click on a malicious link or attachment.

Page 11: What is Social Engineering?    An illustrated presentation.

Phishing…Tips For Identifying Phishing Attempts

– The email asks you to update account information

– There are unfamiliar layouts/designs with no verification images

– The email provides unfamiliar hyperlinks

Page 12: What is Social Engineering?    An illustrated presentation.

Common Bait• “Sweet Deals”

– Free Stuff– Limited Time Offers– Package Delivery

• Help Me, Help You!– Tech Support

• You Gotta’ See This!

Page 13: What is Social Engineering?    An illustrated presentation.

Facility AccessHackers may rely on a physical approach to complement their technical attacks.

Page 14: What is Social Engineering?    An illustrated presentation.

Facility Access - Example

• Piggy backing: A hacker’s method of entering a facility with a group of employees or maintenance workers– Identifying unsecure areas: Hackers search for loading docks,

maintenance entrances, designated smoking areas or other locations that may not be well secured.

Act like you belong. If you believe it, so will everyone else.

Page 15: What is Social Engineering?    An illustrated presentation.

Enticement - Example

A folder with enticing title/label left on ground outside an employee entrance with a USB thumb drive taped inside.

• USB, CD or DVDs left in conspicuous spaces

• May be accompanied by fake paper files

• Curiosity beats caution

Year-End Bonuses

Page 16: What is Social Engineering?    An illustrated presentation.

Best Defenses

Page 17: What is Social Engineering?    An illustrated presentation.

Putting It All Together• Targeted attacks will always use

some form of social engineering

• Just like in military operations, intel makes or breaks a mission

• Hackers may never even need to use sophisticated technical attacks if you provide the information willingly

Page 18: What is Social Engineering?    An illustrated presentation.

Don’t Fall for The Long Con

• Social engineering is nothing more than a con-game.• The old “Long Con” has been ported to the digital world.• Good cons are hard to spot.

Page 19: What is Social Engineering?    An illustrated presentation.

Helpful Tips

• Enforce a strong paper destruction process• Limit facility ingress/egress points• Challenge unknown people in secure areas• Implement technology to screen email and websites for

attacks

Page 20: What is Social Engineering?    An illustrated presentation.

Employee Training

• Prepare for different learning styles (audio, visual, hands-on)• Engage the employee; make a personal plea• Use gamification to enhance learning• Awareness is not training, and training is not awareness

Page 21: What is Social Engineering?    An illustrated presentation.

Program Validation

• Social engineering testing engagements provide assessments of how well your people, process, and technology are functioning.

Page 22: What is Social Engineering?    An illustrated presentation.

Summary

• Social engineering is here to stay and it’s growing• Your organization will suffer a data breach due to social

engineering• The study of human behavior has been used by criminals

for centuries, cybercriminals are no different• Employees must be trained to spot social engineering and

how to react

Page 23: What is Social Engineering?    An illustrated presentation.

For more information, connect with us online or with a phone call.

www.integritysrc.com/blog@IntegritySRC515-965-3756

Copyright 2016 Integrity Technology Systems, Inc. All rights reserved. The information contained herein is subject to change without notice.