SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Social Engineering:
Exploiting the Human
Behavior
Author: James Krusic
IASC 1100
“You could spend a fortune purchasing technology and
services...and your network infrastructure could still remain
vulnerable to old-fashioned manipulation.”
                                        -Kevin Mitnick
What is Social Engineering?
• Is the technique used by attackers to gain the trust of
  employee’s, in efforts to get information.
• A companies greatest threat are themselves.
• Two categories of attacks
  • Technical
  • Non-Technical
Technical Attacks
• Are those that deceive the user into believing that the
  application in use is truly providing them with security.
  • Example would be logging into Facebook and a random pop-up
    window is wanting your credentials. Once you supply the pop-up
    window with your username/password, the attack has access to
    your Facebook account.
      • Once the attacker has your password, most of the time that same
        password is used for bank accounts, network access and more.
Technical Attacks cont.
• Examples of technical attacks:
  • Phishing
     • Usually sent via e-mail, indicating to the victim that something has
       happened. Once the victim opens the payload the attacker has
       access to the network.
  • Pop-up Window
  • Spam-Emails
     • This is a mass e-mail system. Which hundreds and thousands of e-
       mails are sent out to individuals. Tightly related with phishing
       attempts.
Non-Technical Attacks
• Are attacks that are purely perpetrated through the art of
  deception. (Peer-to-Peer interaction)
• Examples:
  •   Dumpster Diving
  •   Support Staff
  •   Hoaxing
  •   Authoritative Voice
Human Behavior Manipulations
• Curiosity

• Fear

• Thoughtlessness
Curiosity
Why would exploiting curiosity be such an effective method?
         - It is like saying, “Why do people go into the woods
when its dark?”
         - People always want to know what’s behind the door.
         - So when people receive an e-mail saying they won
$5,000 and all they need to do is follow the link, they more than
likely will.
Fear
• Fear is such a strong behavior, because once a person
  experiences it, they do not want that feeling again.
  • Example: Hoax’s are used to falsify information in-order to scare
    the victim.
Thoughtlessness
• Is a human behavior that is done without thought. To not
  think when doing.
• Example: Dumpster Diving
  • When a person throws old credit cards away without first cutting
    them up, or when they throw away bank account statements that
    have your social security number on them, or credit card
    information.
     • An attackers gold mine, is to find personal information such as;
       SSN, Account Number, Addresses and more.
How to help mitigate against
promising attacks of Social
Engineering
-   Educate the users/employee’s
-   Well-rounded policy
-   Audit and ensure compliance
-   Proper hardware mitigation
    - E-mail filters
     - Firewalls
User Education/Awareness
• User education is an important role to mitigate against social
  engineering tasks.
• Simple education such as:
  • Ensure employee’s check the person/s ID
  • Ensure employee’s verify they have appointment with
    management
  • Ensure employee’s do not divulge company secrets, personal
    information, and network information over the phone
Motivate the Users
• Self Interest- Most people tend to retain facts better when
  they can personally identify with or use that information
  personally
• Memory Persistence- Current news stories, or recent
  situations that effect the organization.
• Perceived Importance- Effectively communicate the need for
  stated security policies.
• Understanding- People are more inclined to follow procedures
  that they fully understand.
Well Rounded Security Policy
• Why do we need a good security policy?
  • It provides a framework for best practice
  • Helps turn employee’s into participants in the company’s efforts
    to secure its information assets.
  • Shows internally and externally that assets are important
Audits & Compliance
• Why does a company need to audit and ensure compliance of
  a security policy?
  • Companies need to audit the security policy to ensure that
    employee’s at all levels are following the policy
  • Top-Down approach is good when auditing
     • Most of the time upper management want more access to network
       resources than standard employee’s
        • This is a good place to start because if an attacker decides to do a spear
          phishing attack they usually start high, because they do not believe that
          they need to follow policy.
Hardware/Software Mitigation
• Employ multiple firewalls using different platforms
  • This is security by obscurity, meaning that multiple platforms or
    multiple setups ensures that by getting by one firewall doesn’t
    mean an attacker can get by the second, or third.
• Deploy E-mail Filters
  • Types of E-mail Filters:
      • Bayesian Spam Filters: Work by scanning the e-mail for tokens
        (usually words), and then calculating the probability that the e-mail
        is spam.
         • Very powerful, low false positives
      • Spam Assassin: Uses rule sets to scan body and header of e-mail
        messages. Can be very granular (extensive rules).
         • Can be ran for all e-mail or can be ran by individual users.
Additional Resources
• www.mattslifebytes.com
  • Can find a video about social engineering.
  • Can find a experiment on dumpster diving
     • Also can find images of servers that can help you understanding
       hardening Linux. From IT-Adventures.
• End User Security Awareness Presentation
  • http://www.slideshare.net/frostinel/end-user-security-
    awareness-presentation-presentation
• Policy Enforcement
  • http://www.sans.org/reading_room/whitepapers/policyissues/inf
    ormation-security-policy-development-guide-large-small-
    companies_1331

Weitere ähnliche Inhalte

Was ist angesagt?

Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacksRamiro Cid
 
Social engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekarSocial engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekarRaghunath G
 
Social Engineering Attacks & Principles
Social Engineering Attacks & PrinciplesSocial Engineering Attacks & Principles
Social Engineering Attacks & PrinciplesLearningwithRayYT
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
Social engineering
Social engineeringSocial engineering
Social engineeringVishal Kumar
 
Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?JamRivera1
 
Social Engineering
Social EngineeringSocial Engineering
Social EngineeringCyber Agency
 
Social Engineering Basics
Social Engineering BasicsSocial Engineering Basics
Social Engineering BasicsLuke Rusten
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessArjith K Raj
 
Social Engineering new.pptx
Social Engineering new.pptxSocial Engineering new.pptx
Social Engineering new.pptxSanthosh Prabhu
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N Gbensonoo
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanControlScan, Inc.
 

Was ist angesagt? (20)

Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Social engineering
Social engineering Social engineering
Social engineering
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
 
Social engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekarSocial engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekar
 
Social Engineering Attacks & Principles
Social Engineering Attacks & PrinciplesSocial Engineering Attacks & Principles
Social Engineering Attacks & Principles
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015
 
Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Social Engineering Basics
Social Engineering BasicsSocial Engineering Basics
Social Engineering Basics
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Social Engineering new.pptx
Social Engineering new.pptxSocial Engineering new.pptx
Social Engineering new.pptx
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 

Andere mochten auch

Social Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case StudiesSocial Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case StudiesPraetorian
 
Social engineering
Social engineeringSocial engineering
Social engineeringVishal Kumar
 
UW School of Medicine Social Engineering and Phishing Awareness
UW School of Medicine   Social Engineering and Phishing AwarenessUW School of Medicine   Social Engineering and Phishing Awareness
UW School of Medicine Social Engineering and Phishing AwarenessNicholas Davis
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering OWASP Foundation
 
Social Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
Social Engineering: The Human Element of Sourcing and Recruiting | Glen CatheySocial Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
Social Engineering: The Human Element of Sourcing and Recruiting | Glen Catheynwrecruit
 
Social Engineering, or hacking people
Social Engineering, or hacking peopleSocial Engineering, or hacking people
Social Engineering, or hacking peopleTudor Damian
 
Social Engineering
Social Engineering Social Engineering
Social Engineering Mirna Hanna
 
Skip the date quick start
Skip the date quick startSkip the date quick start
Skip the date quick startskipthedate
 
Verbal Judo: The Art of Using Words to Close More Deals
Verbal Judo: The Art of Using Words to Close More DealsVerbal Judo: The Art of Using Words to Close More Deals
Verbal Judo: The Art of Using Words to Close More DealsActiveRain
 
Social engineering: A Human Hacking Framework
Social engineering: A Human Hacking FrameworkSocial engineering: A Human Hacking Framework
Social engineering: A Human Hacking FrameworkJahangirnagar University
 
Web application security
Web application securityWeb application security
Web application securityJin Castor
 
2010년 상반기 보안 위협 동향과 주요 보안 위협
2010년 상반기 보안 위협 동향과 주요 보안 위협2010년 상반기 보안 위협 동향과 주요 보안 위협
2010년 상반기 보안 위협 동향과 주요 보안 위협Youngjun Chang
 
NTXISSACSC2 - Social Engineering 101 or The Art of How You Got Owned by That ...
NTXISSACSC2 - Social Engineering 101 or The Art of How You Got Owned by That ...NTXISSACSC2 - Social Engineering 101 or The Art of How You Got Owned by That ...
NTXISSACSC2 - Social Engineering 101 or The Art of How You Got Owned by That ...North Texas Chapter of the ISSA
 
Social Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageSocial Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageMarin Ivezic
 

Andere mochten auch (19)

Social Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case StudiesSocial Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case Studies
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
UW School of Medicine Social Engineering and Phishing Awareness
UW School of Medicine   Social Engineering and Phishing AwarenessUW School of Medicine   Social Engineering and Phishing Awareness
UW School of Medicine Social Engineering and Phishing Awareness
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering
 
Social Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
Social Engineering: The Human Element of Sourcing and Recruiting | Glen CatheySocial Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
Social Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
 
Social Engineering, or hacking people
Social Engineering, or hacking peopleSocial Engineering, or hacking people
Social Engineering, or hacking people
 
Social Engineering
Social Engineering Social Engineering
Social Engineering
 
The Reid Technique
The Reid TechniqueThe Reid Technique
The Reid Technique
 
Skip the date quick start
Skip the date quick startSkip the date quick start
Skip the date quick start
 
Verbal Judo: The Art of Using Words to Close More Deals
Verbal Judo: The Art of Using Words to Close More DealsVerbal Judo: The Art of Using Words to Close More Deals
Verbal Judo: The Art of Using Words to Close More Deals
 
Kevin Mitnick
Kevin Mitnick Kevin Mitnick
Kevin Mitnick
 
Kevin mitnick
Kevin mitnickKevin mitnick
Kevin mitnick
 
Social engineering: A Human Hacking Framework
Social engineering: A Human Hacking FrameworkSocial engineering: A Human Hacking Framework
Social engineering: A Human Hacking Framework
 
Web application security
Web application securityWeb application security
Web application security
 
Cos 432 web_security
Cos 432 web_securityCos 432 web_security
Cos 432 web_security
 
Web security
Web securityWeb security
Web security
 
2010년 상반기 보안 위협 동향과 주요 보안 위협
2010년 상반기 보안 위협 동향과 주요 보안 위협2010년 상반기 보안 위협 동향과 주요 보안 위협
2010년 상반기 보안 위협 동향과 주요 보안 위협
 
NTXISSACSC2 - Social Engineering 101 or The Art of How You Got Owned by That ...
NTXISSACSC2 - Social Engineering 101 or The Art of How You Got Owned by That ...NTXISSACSC2 - Social Engineering 101 or The Art of How You Got Owned by That ...
NTXISSACSC2 - Social Engineering 101 or The Art of How You Got Owned by That ...
 
Social Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageSocial Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionage
 

Ähnlich wie Social engineering-Attack of the Human Behavior

What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.Pratum
 
Topic 5.0 basic security part 1
Topic 5.0 basic security part 1Topic 5.0 basic security part 1
Topic 5.0 basic security part 1Atika Zaimi
 
securityawareness.pptx
securityawareness.pptxsecurityawareness.pptx
securityawareness.pptxbinowe
 
Securityawareness
SecurityawarenessSecurityawareness
SecurityawarenessJayfErika
 
securityawareness.pptx
securityawareness.pptxsecurityawareness.pptx
securityawareness.pptxreagan sapul
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureLourdes Paloma Gimenez
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxShubhamGupta833557
 
ethical hacking in motion MODULE - II.ppt
ethical hacking in motion MODULE - II.pptethical hacking in motion MODULE - II.ppt
ethical hacking in motion MODULE - II.pptShivaniSingha1
 
Introduction to Social engineering | Techniques of Social engineering
Introduction to Social engineering | Techniques of Social engineeringIntroduction to Social engineering | Techniques of Social engineering
Introduction to Social engineering | Techniques of Social engineeringPrem Lamsal
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxRoshni814224
 
Social Engineering: the Bad, Better, and Best Incident Response Plans
Social Engineering: the Bad, Better, and Best Incident Response PlansSocial Engineering: the Bad, Better, and Best Incident Response Plans
Social Engineering: the Bad, Better, and Best Incident Response PlansRob Ragan
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfMansoorAhmed57263
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptOoXair
 
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...Jason Hong
 

Ähnlich wie Social engineering-Attack of the Human Behavior (20)

Information security
Information securityInformation security
Information security
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.
 
Topic 5.0 basic security part 1
Topic 5.0 basic security part 1Topic 5.0 basic security part 1
Topic 5.0 basic security part 1
 
securityawareness.pptx
securityawareness.pptxsecurityawareness.pptx
securityawareness.pptx
 
Securityawareness
SecurityawarenessSecurityawareness
Securityawareness
 
securityawareness.pptx
securityawareness.pptxsecurityawareness.pptx
securityawareness.pptx
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptx
 
ethical hacking in motion MODULE - II.ppt
ethical hacking in motion MODULE - II.pptethical hacking in motion MODULE - II.ppt
ethical hacking in motion MODULE - II.ppt
 
Introduction to Social engineering | Techniques of Social engineering
Introduction to Social engineering | Techniques of Social engineeringIntroduction to Social engineering | Techniques of Social engineering
Introduction to Social engineering | Techniques of Social engineering
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
 
Social Engineering: the Bad, Better, and Best Incident Response Plans
Social Engineering: the Bad, Better, and Best Incident Response PlansSocial Engineering: the Bad, Better, and Best Incident Response Plans
Social Engineering: the Bad, Better, and Best Incident Response Plans
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
cyber-warfare.pptx
cyber-warfare.pptxcyber-warfare.pptx
cyber-warfare.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
PACE-IT, Security+3.3: Summary of Social Engineering AttacksPACE-IT, Security+3.3: Summary of Social Engineering Attacks
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
 

Kürzlich hochgeladen

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...KokoStevan
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 

Kürzlich hochgeladen (20)

Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 

Social engineering-Attack of the Human Behavior

  • 1. Social Engineering: Exploiting the Human Behavior Author: James Krusic IASC 1100
  • 2. “You could spend a fortune purchasing technology and services...and your network infrastructure could still remain vulnerable to old-fashioned manipulation.” -Kevin Mitnick
  • 3. What is Social Engineering? • Is the technique used by attackers to gain the trust of employee’s, in efforts to get information. • A companies greatest threat are themselves. • Two categories of attacks • Technical • Non-Technical
  • 4. Technical Attacks • Are those that deceive the user into believing that the application in use is truly providing them with security. • Example would be logging into Facebook and a random pop-up window is wanting your credentials. Once you supply the pop-up window with your username/password, the attack has access to your Facebook account. • Once the attacker has your password, most of the time that same password is used for bank accounts, network access and more.
  • 5. Technical Attacks cont. • Examples of technical attacks: • Phishing • Usually sent via e-mail, indicating to the victim that something has happened. Once the victim opens the payload the attacker has access to the network. • Pop-up Window • Spam-Emails • This is a mass e-mail system. Which hundreds and thousands of e- mails are sent out to individuals. Tightly related with phishing attempts.
  • 6. Non-Technical Attacks • Are attacks that are purely perpetrated through the art of deception. (Peer-to-Peer interaction) • Examples: • Dumpster Diving • Support Staff • Hoaxing • Authoritative Voice
  • 7. Human Behavior Manipulations • Curiosity • Fear • Thoughtlessness
  • 8. Curiosity Why would exploiting curiosity be such an effective method? - It is like saying, “Why do people go into the woods when its dark?” - People always want to know what’s behind the door. - So when people receive an e-mail saying they won $5,000 and all they need to do is follow the link, they more than likely will.
  • 9. Fear • Fear is such a strong behavior, because once a person experiences it, they do not want that feeling again. • Example: Hoax’s are used to falsify information in-order to scare the victim.
  • 10.
  • 11. Thoughtlessness • Is a human behavior that is done without thought. To not think when doing. • Example: Dumpster Diving • When a person throws old credit cards away without first cutting them up, or when they throw away bank account statements that have your social security number on them, or credit card information. • An attackers gold mine, is to find personal information such as; SSN, Account Number, Addresses and more.
  • 12.
  • 13. How to help mitigate against promising attacks of Social Engineering - Educate the users/employee’s - Well-rounded policy - Audit and ensure compliance - Proper hardware mitigation - E-mail filters - Firewalls
  • 14. User Education/Awareness • User education is an important role to mitigate against social engineering tasks. • Simple education such as: • Ensure employee’s check the person/s ID • Ensure employee’s verify they have appointment with management • Ensure employee’s do not divulge company secrets, personal information, and network information over the phone
  • 15. Motivate the Users • Self Interest- Most people tend to retain facts better when they can personally identify with or use that information personally • Memory Persistence- Current news stories, or recent situations that effect the organization. • Perceived Importance- Effectively communicate the need for stated security policies. • Understanding- People are more inclined to follow procedures that they fully understand.
  • 16. Well Rounded Security Policy • Why do we need a good security policy? • It provides a framework for best practice • Helps turn employee’s into participants in the company’s efforts to secure its information assets. • Shows internally and externally that assets are important
  • 17. Audits & Compliance • Why does a company need to audit and ensure compliance of a security policy? • Companies need to audit the security policy to ensure that employee’s at all levels are following the policy • Top-Down approach is good when auditing • Most of the time upper management want more access to network resources than standard employee’s • This is a good place to start because if an attacker decides to do a spear phishing attack they usually start high, because they do not believe that they need to follow policy.
  • 18. Hardware/Software Mitigation • Employ multiple firewalls using different platforms • This is security by obscurity, meaning that multiple platforms or multiple setups ensures that by getting by one firewall doesn’t mean an attacker can get by the second, or third. • Deploy E-mail Filters • Types of E-mail Filters: • Bayesian Spam Filters: Work by scanning the e-mail for tokens (usually words), and then calculating the probability that the e-mail is spam. • Very powerful, low false positives • Spam Assassin: Uses rule sets to scan body and header of e-mail messages. Can be very granular (extensive rules). • Can be ran for all e-mail or can be ran by individual users.
  • 19. Additional Resources • www.mattslifebytes.com • Can find a video about social engineering. • Can find a experiment on dumpster diving • Also can find images of servers that can help you understanding hardening Linux. From IT-Adventures. • End User Security Awareness Presentation • http://www.slideshare.net/frostinel/end-user-security- awareness-presentation-presentation • Policy Enforcement • http://www.sans.org/reading_room/whitepapers/policyissues/inf ormation-security-policy-development-guide-large-small- companies_1331