SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Social engineering


           Servers and network
                   2012 Autumn

                   Morten Bo Nielsen
                   Mon@eal.dk
Old school

                                    It's all about the
                                    money
                                    ●   Hustling
                                    ●   Scams


                                        Example


Networks and servers - Mon@eal.dk                        2
Psychology of scams
“cognitive and motivational
processes”
 ●   trust and authority
 ●   visceral triggers
     ●   human desires and
         needs
     ●   greed, fear, avoidance of
         physical pain, or the
         desire to be liked


Networks and servers - Mon@eal.dk                            3
                                    Go here for full story
Inducing judgement errors
                              ●     Scarcity cues
                                    ●   Unique opportunity
                              ●     Induction of behavioural
                                    commitment
                                    ●   Start small and get them rolling
                              ●     Extreme cost/benefit
                              ●     Lack of emotional control
                                    ●   A psychological trait of victims


Networks and servers - Mon@eal.dk                                          4
Examples
Who needs spam, when we have this link
http://www.urbanmillionaires.com/


Question:
 ●   Is it true? Is it trustworthy?
 ●   Puts words on it from the previous slides.
     ●   Still think it is trust worthy?


Networks and servers - Mon@eal.dk                 5
Examples
Emotional distress
steal a womans hand bag


Question:
 ●   Is this possible?
 ●   Is she gullible?



Networks and servers - Mon@eal.dk        6
Still old school
 ●   Gaining access to places you are not allowed
     ●   http://www.youtube.com/watch?v=kOEWd_M5m44


 ●   The secret:
         Look as if you belong.




Networks and servers - Mon@eal.dk                     7
Relation to security
                                    ●   No security with
                                        physical access
                                    ●   Why go through the
                                        firewall, if you may
                                        walk past?




Networks and servers - Mon@eal.dk                              8
People on the move


                    Steal the laptop (covertly)
                       laptops in airports




Networks and servers - Mon@eal.dk                 9
People on the move
Use their telephones against them
 ●   for profit
 ●   reading the calendar, mails, SMS
 ●   As a bug




Networks and servers - Mon@eal.dk       10
People on the move


                                          ●    Mobile IT
                                               ●   A security nightmare
                                               ●   Too many variables
                          Is this ok to use?
                          Could it be fake?




Networks and servers - Mon@eal.dk                                         11
People at the office
 ●   Make them tell you their passwords.
     ●   Teachers recurring story – this time with an external
         reference....
     ●   from the BBC


Question:
 ●   Is this realistic? In Denmark?



Networks and servers - Mon@eal.dk                           12
People at the office
 ●   Spam
     ●   Check your mailbox




Networks and servers - Mon@eal.dk         13
People at the office
                                    ●   Receptionists are a
                                        crucial part of security
                                    ●   Educate people
                                        ●   Like this?




Networks and servers - Mon@eal.dk                             14
Closing word


                          Which on to use?
                         Technical vs. social

                              Answer: Both

                                    To read more, see this



Networks and servers - Mon@eal.dk                            15

Weitere ähnliche Inhalte

Andere mochten auch

Itt2 its pki and certificates
Itt2 its pki and certificatesItt2 its pki and certificates
Itt2 its pki and certificatesMorten Nielsen
 
peranan guru pendidikan islam
peranan guru pendidikan islam  peranan guru pendidikan islam
peranan guru pendidikan islam Mohd Kamal Jusoh
 
14.04.04 exegesis lent 4
14.04.04 exegesis   lent 414.04.04 exegesis   lent 4
14.04.04 exegesis lent 4morrisenglish
 
14.04.04 exegesis lent 5
14.04.04 exegesis   lent 514.04.04 exegesis   lent 5
14.04.04 exegesis lent 5morrisenglish
 
Itet2 its social engineering
Itet2 its social engineeringItet2 its social engineering
Itet2 its social engineeringMorten Nielsen
 
Social Engineering
Social EngineeringSocial Engineering
Social EngineeringLance Howell
 
Social engineering
Social engineering Social engineering
Social engineering amirzand2002
 
Eng.09.Sem.02.Assignments
Eng.09.Sem.02.AssignmentsEng.09.Sem.02.Assignments
Eng.09.Sem.02.Assignmentsmorrisenglish
 
paradigma baru pendidikan islam
 paradigma baru pendidikan islam  paradigma baru pendidikan islam
paradigma baru pendidikan islam Mohd Kamal Jusoh
 
48 peranan guru pendidikan islam menerusi falsafah pendidikan islam
48 peranan guru pendidikan islam menerusi falsafah pendidikan islam 48 peranan guru pendidikan islam menerusi falsafah pendidikan islam
48 peranan guru pendidikan islam menerusi falsafah pendidikan islam Mohd Kamal Jusoh
 

Andere mochten auch (13)

Itt2 its introduction
Itt2 its introductionItt2 its introduction
Itt2 its introduction
 
Itt2 its pki and certificates
Itt2 its pki and certificatesItt2 its pki and certificates
Itt2 its pki and certificates
 
peranan guru pendidikan islam
peranan guru pendidikan islam  peranan guru pendidikan islam
peranan guru pendidikan islam
 
14.04.04 exegesis lent 4
14.04.04 exegesis   lent 414.04.04 exegesis   lent 4
14.04.04 exegesis lent 4
 
14.04.04 exegesis lent 5
14.04.04 exegesis   lent 514.04.04 exegesis   lent 5
14.04.04 exegesis lent 5
 
Itet2 its social engineering
Itet2 its social engineeringItet2 its social engineering
Itet2 its social engineering
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Social engineering
Social engineering Social engineering
Social engineering
 
Eng.09.Sem.02.Assignments
Eng.09.Sem.02.AssignmentsEng.09.Sem.02.Assignments
Eng.09.Sem.02.Assignments
 
Itet2 its anatomy
Itet2 its anatomyItet2 its anatomy
Itet2 its anatomy
 
4 b peranan-pendidikan
4 b peranan-pendidikan4 b peranan-pendidikan
4 b peranan-pendidikan
 
paradigma baru pendidikan islam
 paradigma baru pendidikan islam  paradigma baru pendidikan islam
paradigma baru pendidikan islam
 
48 peranan guru pendidikan islam menerusi falsafah pendidikan islam
48 peranan guru pendidikan islam menerusi falsafah pendidikan islam 48 peranan guru pendidikan islam menerusi falsafah pendidikan islam
48 peranan guru pendidikan islam menerusi falsafah pendidikan islam
 

Ähnlich wie Itt3 its social engineering

APSU IPC Clouducation 101
APSU IPC Clouducation 101APSU IPC Clouducation 101
APSU IPC Clouducation 101Thomas Danford
 
Putting Great KM Ideas into Practice
Putting Great KM Ideas into PracticePutting Great KM Ideas into Practice
Putting Great KM Ideas into PracticeKate Simpson
 
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...Jason Hong
 
Data distribution in the cloud with Node.js
Data distribution in the cloud with Node.jsData distribution in the cloud with Node.js
Data distribution in the cloud with Node.jsdarach
 
unba.se - ACM CSCW 2017 - IWCES15
unba.se - ACM CSCW 2017 - IWCES15unba.se - ACM CSCW 2017 - IWCES15
unba.se - ACM CSCW 2017 - IWCES15Daniel Norman
 
Patching your employee's brain (by NVISO - Pieter Danhieux)
Patching your employee's brain (by NVISO - Pieter Danhieux)Patching your employee's brain (by NVISO - Pieter Danhieux)
Patching your employee's brain (by NVISO - Pieter Danhieux)NVISO
 
1. 'Interoperability. A quick chat, a few war stories'. Carl Wilson, Open Pla...
1. 'Interoperability. A quick chat, a few war stories'. Carl Wilson, Open Pla...1. 'Interoperability. A quick chat, a few war stories'. Carl Wilson, Open Pla...
1. 'Interoperability. A quick chat, a few war stories'. Carl Wilson, Open Pla...IMPACT Centre of Competence
 

Ähnlich wie Itt3 its social engineering (7)

APSU IPC Clouducation 101
APSU IPC Clouducation 101APSU IPC Clouducation 101
APSU IPC Clouducation 101
 
Putting Great KM Ideas into Practice
Putting Great KM Ideas into PracticePutting Great KM Ideas into Practice
Putting Great KM Ideas into Practice
 
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
 
Data distribution in the cloud with Node.js
Data distribution in the cloud with Node.jsData distribution in the cloud with Node.js
Data distribution in the cloud with Node.js
 
unba.se - ACM CSCW 2017 - IWCES15
unba.se - ACM CSCW 2017 - IWCES15unba.se - ACM CSCW 2017 - IWCES15
unba.se - ACM CSCW 2017 - IWCES15
 
Patching your employee's brain (by NVISO - Pieter Danhieux)
Patching your employee's brain (by NVISO - Pieter Danhieux)Patching your employee's brain (by NVISO - Pieter Danhieux)
Patching your employee's brain (by NVISO - Pieter Danhieux)
 
1. 'Interoperability. A quick chat, a few war stories'. Carl Wilson, Open Pla...
1. 'Interoperability. A quick chat, a few war stories'. Carl Wilson, Open Pla...1. 'Interoperability. A quick chat, a few war stories'. Carl Wilson, Open Pla...
1. 'Interoperability. A quick chat, a few war stories'. Carl Wilson, Open Pla...
 

Mehr von Morten Nielsen

Itt1 intro project management
Itt1 intro project managementItt1 intro project management
Itt1 intro project managementMorten Nielsen
 
Itt1 intro knowing and doing
Itt1 intro knowing and doingItt1 intro knowing and doing
Itt1 intro knowing and doingMorten Nielsen
 
Itt2 its ssl and services
Itt2 its ssl and servicesItt2 its ssl and services
Itt2 its ssl and servicesMorten Nielsen
 
Itt2 its encrypted storage
Itt2 its encrypted storageItt2 its encrypted storage
Itt2 its encrypted storageMorten Nielsen
 
ITET1 Routing Transport layer.odp
ITET1 Routing Transport layer.odpITET1 Routing Transport layer.odp
ITET1 Routing Transport layer.odpMorten Nielsen
 
ITET1 Routing Application layer.odp
ITET1 Routing Application layer.odpITET1 Routing Application layer.odp
ITET1 Routing Application layer.odpMorten Nielsen
 
Itet2 its counter recon
Itet2 its counter reconItet2 its counter recon
Itet2 its counter reconMorten Nielsen
 
Itet2 its authorative sources
Itet2 its authorative sourcesItet2 its authorative sources
Itet2 its authorative sourcesMorten Nielsen
 

Mehr von Morten Nielsen (19)

Itt1 intro project management
Itt1 intro project managementItt1 intro project management
Itt1 intro project management
 
Itt1 intro knowing and doing
Itt1 intro knowing and doingItt1 intro knowing and doing
Itt1 intro knowing and doing
 
Itt2 its ssl and services
Itt2 its ssl and servicesItt2 its ssl and services
Itt2 its ssl and services
 
Itt2 its ids
Itt2 its idsItt2 its ids
Itt2 its ids
 
Itt2 its encrypted storage
Itt2 its encrypted storageItt2 its encrypted storage
Itt2 its encrypted storage
 
Itt2 its introduction
Itt2 its introductionItt2 its introduction
Itt2 its introduction
 
Itt3 virtual machines
Itt3 virtual machinesItt3 virtual machines
Itt3 virtual machines
 
Itt1 sd requirements
Itt1 sd requirementsItt1 sd requirements
Itt1 sd requirements
 
Itt3 its acl
Itt3 its aclItt3 its acl
Itt3 its acl
 
Itet3 its forensics
Itet3 its forensicsItet3 its forensics
Itet3 its forensics
 
Diagram cookbook
Diagram cookbookDiagram cookbook
Diagram cookbook
 
ITET3 Networking P2P
ITET3 Networking P2PITET3 Networking P2P
ITET3 Networking P2P
 
ITET1 Routing Transport layer.odp
ITET1 Routing Transport layer.odpITET1 Routing Transport layer.odp
ITET1 Routing Transport layer.odp
 
ITET1 Routing Application layer.odp
ITET1 Routing Application layer.odpITET1 Routing Application layer.odp
ITET1 Routing Application layer.odp
 
ITET3 ITS governance
ITET3 ITS governanceITET3 ITS governance
ITET3 ITS governance
 
Routing vlans
Routing vlansRouting vlans
Routing vlans
 
Itet2 its counter recon
Itet2 its counter reconItet2 its counter recon
Itet2 its counter recon
 
Itet2 its authorative sources
Itet2 its authorative sourcesItet2 its authorative sources
Itet2 its authorative sources
 
Its presentation
Its presentationIts presentation
Its presentation
 

Kürzlich hochgeladen

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Kürzlich hochgeladen (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Itt3 its social engineering

  • 1. Social engineering Servers and network 2012 Autumn Morten Bo Nielsen Mon@eal.dk
  • 2. Old school It's all about the money ● Hustling ● Scams Example Networks and servers - Mon@eal.dk 2
  • 3. Psychology of scams “cognitive and motivational processes” ● trust and authority ● visceral triggers ● human desires and needs ● greed, fear, avoidance of physical pain, or the desire to be liked Networks and servers - Mon@eal.dk 3 Go here for full story
  • 4. Inducing judgement errors ● Scarcity cues ● Unique opportunity ● Induction of behavioural commitment ● Start small and get them rolling ● Extreme cost/benefit ● Lack of emotional control ● A psychological trait of victims Networks and servers - Mon@eal.dk 4
  • 5. Examples Who needs spam, when we have this link http://www.urbanmillionaires.com/ Question: ● Is it true? Is it trustworthy? ● Puts words on it from the previous slides. ● Still think it is trust worthy? Networks and servers - Mon@eal.dk 5
  • 6. Examples Emotional distress steal a womans hand bag Question: ● Is this possible? ● Is she gullible? Networks and servers - Mon@eal.dk 6
  • 7. Still old school ● Gaining access to places you are not allowed ● http://www.youtube.com/watch?v=kOEWd_M5m44 ● The secret: Look as if you belong. Networks and servers - Mon@eal.dk 7
  • 8. Relation to security ● No security with physical access ● Why go through the firewall, if you may walk past? Networks and servers - Mon@eal.dk 8
  • 9. People on the move Steal the laptop (covertly) laptops in airports Networks and servers - Mon@eal.dk 9
  • 10. People on the move Use their telephones against them ● for profit ● reading the calendar, mails, SMS ● As a bug Networks and servers - Mon@eal.dk 10
  • 11. People on the move ● Mobile IT ● A security nightmare ● Too many variables Is this ok to use? Could it be fake? Networks and servers - Mon@eal.dk 11
  • 12. People at the office ● Make them tell you their passwords. ● Teachers recurring story – this time with an external reference.... ● from the BBC Question: ● Is this realistic? In Denmark? Networks and servers - Mon@eal.dk 12
  • 13. People at the office ● Spam ● Check your mailbox Networks and servers - Mon@eal.dk 13
  • 14. People at the office ● Receptionists are a crucial part of security ● Educate people ● Like this? Networks and servers - Mon@eal.dk 14
  • 15. Closing word Which on to use? Technical vs. social Answer: Both To read more, see this Networks and servers - Mon@eal.dk 15