Download - The Art of Social Engineering*

Transcript
Page 1: The Art of Social Engineering*

The Ultimate HeistTime Magazine: Monday November

20th, 1978

Stanley Mark Rifkin

Page 2: The Art of Social Engineering*

Security: Fact or Fiction?

Page 3: The Art of Social Engineering*

Just Ask!

THE DIRECT ATTACK:

Page 4: The Art of Social Engineering*

PHONY SITES AND DANGEROUS ATTACHMENTS

www.paypai.com

www.paypal.com

www.paypa1.coma

Page 5: The Art of Social Engineering*
Page 6: The Art of Social Engineering*

SIX TENDENCIES SOCIAL ENGINEERS RELY ON

•Authority•Liking•Reciprocation•Consistency•Social validation•Scarcity

Page 7: The Art of Social Engineering*

SECURITY IS NOT A PRODUCT; IT IS A PROCESS

Page 8: The Art of Social Engineering*

The reminders must be as well

THE THREAT IS CONSTANT

Page 9: The Art of Social Engineering*

COMMON SOCIAL ENGINEERING METHODS• Posting as employee of vendor

• Posing as someone in authority

• Sending a virus in an email

• False pop-up Windows

Page 10: The Art of Social Engineering*

FACTORS THAT MAKE COMPANIES MORE VULNERABLE TO ATTACKS• Large number of employees

• Multiple facilities

• Information on employee whereabouts left in voice mail messages

• Phone extension information made available

• Lack of security training

• Lack of data classification system

• No incident reporting/response plan in place

Page 11: The Art of Social Engineering*

WARNING SIGNS OF AN ATTACK