SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Social engineering


           Servers and network
                   2012 Autumn

                   Morten Bo Nielsen
                   Mon@eal.dk
Old school

                                    It's all about the
                                    money
                                    ●   Hustling
                                    ●   Scams


                                        Example


Networks and servers - Mon@eal.dk                        2
Psychology of scams
“cognitive and motivational
processes”
 ●   trust and authority
 ●   visceral triggers
     ●   human desires and
         needs
     ●   greed, fear, avoidance of
         physical pain, or the
         desire to be liked


Networks and servers - Mon@eal.dk                            3
                                    Go here for full story
Inducing judgement errors
                              ●     Scarcity cues
                                    ●   Unique opportunity
                              ●     Induction of behavioural
                                    commitment
                                    ●   Start small and get them rolling
                              ●     Extreme cost/benefit
                              ●     Lack of emotional control
                                    ●   A psychological trait of victims


Networks and servers - Mon@eal.dk                                          4
Examples
Who needs spam, when we have this link
http://www.urbanmillionaires.com/


Question:
 ●   Is it true? Is it trustworthy?
 ●   Puts words on it from the previous slides.
     ●   Still think it is trust worthy?


Networks and servers - Mon@eal.dk                 5
Examples
Emotional distress
steal a womans hand bag


Question:
 ●   Is this possible?
 ●   Is she gullible?



Networks and servers - Mon@eal.dk        6
Still old school
 ●   Gaining access to places you are not allowed
     ●   http://www.youtube.com/watch?v=kOEWd_M5m44


 ●   The secret:
         Look as if you belong.




Networks and servers - Mon@eal.dk                     7
Relation to security
                                    ●   No security with
                                        physical access
                                    ●   Why go through the
                                        firewall, if you may
                                        walk past?




Networks and servers - Mon@eal.dk                              8
People on the move


                    Steal the laptop (covertly)
                       laptops in airports




Networks and servers - Mon@eal.dk                 9
People on the move
Use their telephones against them
 ●   for profit
 ●   reading the calendar, mails, SMS
 ●   As a bug




Networks and servers - Mon@eal.dk       10
People on the move


                                          ●    Mobile IT
                                               ●   A security nightmare
                                               ●   Too many variables
                          Is this ok to use?
                          Could it be fake?




Networks and servers - Mon@eal.dk                                         11
People at the office
 ●   Make them tell you their passwords.
     ●   Teachers recurring story – this time with an external
         reference....
     ●   from the BBC


Question:
 ●   Is this realistic? In Denmark?



Networks and servers - Mon@eal.dk                           12
People at the office
 ●   Spam
     ●   Check your mailbox




Networks and servers - Mon@eal.dk         13
People at the office
                                    ●   Receptionists are a
                                        crucial part of security
                                    ●   Educate people
                                        ●   Like this?




Networks and servers - Mon@eal.dk                             14
Closing word


                          Which on to use?
                         Technical vs. social

                              Answer: Both

                                    To read more, see this



Networks and servers - Mon@eal.dk                            15

Weitere ähnliche Inhalte

Andere mochten auch

Itt2 its pki and certificates
Itt2 its pki and certificatesItt2 its pki and certificates
Itt2 its pki and certificatesMorten Nielsen
 
peranan guru pendidikan islam
peranan guru pendidikan islam  peranan guru pendidikan islam
peranan guru pendidikan islam Mohd Kamal Jusoh
 
14.04.04 exegesis lent 4
14.04.04 exegesis   lent 414.04.04 exegesis   lent 4
14.04.04 exegesis lent 4morrisenglish
 
14.04.04 exegesis lent 5
14.04.04 exegesis   lent 514.04.04 exegesis   lent 5
14.04.04 exegesis lent 5morrisenglish
 
Itet2 its social engineering
Itet2 its social engineeringItet2 its social engineering
Itet2 its social engineeringMorten Nielsen
 
Social Engineering
Social EngineeringSocial Engineering
Social EngineeringLance Howell
 
Social engineering
Social engineering Social engineering
Social engineering amirzand2002
 
Eng.09.Sem.02.Assignments
Eng.09.Sem.02.AssignmentsEng.09.Sem.02.Assignments
Eng.09.Sem.02.Assignmentsmorrisenglish
 
paradigma baru pendidikan islam
 paradigma baru pendidikan islam  paradigma baru pendidikan islam
paradigma baru pendidikan islam Mohd Kamal Jusoh
 
48 peranan guru pendidikan islam menerusi falsafah pendidikan islam
48 peranan guru pendidikan islam menerusi falsafah pendidikan islam 48 peranan guru pendidikan islam menerusi falsafah pendidikan islam
48 peranan guru pendidikan islam menerusi falsafah pendidikan islam Mohd Kamal Jusoh
 

Andere mochten auch (13)

Itt2 its introduction
Itt2 its introductionItt2 its introduction
Itt2 its introduction
 
Itt2 its pki and certificates
Itt2 its pki and certificatesItt2 its pki and certificates
Itt2 its pki and certificates
 
peranan guru pendidikan islam
peranan guru pendidikan islam  peranan guru pendidikan islam
peranan guru pendidikan islam
 
14.04.04 exegesis lent 4
14.04.04 exegesis   lent 414.04.04 exegesis   lent 4
14.04.04 exegesis lent 4
 
14.04.04 exegesis lent 5
14.04.04 exegesis   lent 514.04.04 exegesis   lent 5
14.04.04 exegesis lent 5
 
Itet2 its social engineering
Itet2 its social engineeringItet2 its social engineering
Itet2 its social engineering
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Social engineering
Social engineering Social engineering
Social engineering
 
Eng.09.Sem.02.Assignments
Eng.09.Sem.02.AssignmentsEng.09.Sem.02.Assignments
Eng.09.Sem.02.Assignments
 
Itet2 its anatomy
Itet2 its anatomyItet2 its anatomy
Itet2 its anatomy
 
4 b peranan-pendidikan
4 b peranan-pendidikan4 b peranan-pendidikan
4 b peranan-pendidikan
 
paradigma baru pendidikan islam
 paradigma baru pendidikan islam  paradigma baru pendidikan islam
paradigma baru pendidikan islam
 
48 peranan guru pendidikan islam menerusi falsafah pendidikan islam
48 peranan guru pendidikan islam menerusi falsafah pendidikan islam 48 peranan guru pendidikan islam menerusi falsafah pendidikan islam
48 peranan guru pendidikan islam menerusi falsafah pendidikan islam
 

Ähnlich wie Itt3 its social engineering

APSU IPC Clouducation 101
APSU IPC Clouducation 101APSU IPC Clouducation 101
APSU IPC Clouducation 101Thomas Danford
 
Putting Great KM Ideas into Practice
Putting Great KM Ideas into PracticePutting Great KM Ideas into Practice
Putting Great KM Ideas into PracticeKate Simpson
 
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...Jason Hong
 
Data distribution in the cloud with Node.js
Data distribution in the cloud with Node.jsData distribution in the cloud with Node.js
Data distribution in the cloud with Node.jsdarach
 
unba.se - ACM CSCW 2017 - IWCES15
unba.se - ACM CSCW 2017 - IWCES15unba.se - ACM CSCW 2017 - IWCES15
unba.se - ACM CSCW 2017 - IWCES15Daniel Norman
 
Patching your employee's brain (by NVISO - Pieter Danhieux)
Patching your employee's brain (by NVISO - Pieter Danhieux)Patching your employee's brain (by NVISO - Pieter Danhieux)
Patching your employee's brain (by NVISO - Pieter Danhieux)NVISO
 
1. 'Interoperability. A quick chat, a few war stories'. Carl Wilson, Open Pla...
1. 'Interoperability. A quick chat, a few war stories'. Carl Wilson, Open Pla...1. 'Interoperability. A quick chat, a few war stories'. Carl Wilson, Open Pla...
1. 'Interoperability. A quick chat, a few war stories'. Carl Wilson, Open Pla...IMPACT Centre of Competence
 

Ähnlich wie Itt3 its social engineering (7)

APSU IPC Clouducation 101
APSU IPC Clouducation 101APSU IPC Clouducation 101
APSU IPC Clouducation 101
 
Putting Great KM Ideas into Practice
Putting Great KM Ideas into PracticePutting Great KM Ideas into Practice
Putting Great KM Ideas into Practice
 
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
 
Data distribution in the cloud with Node.js
Data distribution in the cloud with Node.jsData distribution in the cloud with Node.js
Data distribution in the cloud with Node.js
 
unba.se - ACM CSCW 2017 - IWCES15
unba.se - ACM CSCW 2017 - IWCES15unba.se - ACM CSCW 2017 - IWCES15
unba.se - ACM CSCW 2017 - IWCES15
 
Patching your employee's brain (by NVISO - Pieter Danhieux)
Patching your employee's brain (by NVISO - Pieter Danhieux)Patching your employee's brain (by NVISO - Pieter Danhieux)
Patching your employee's brain (by NVISO - Pieter Danhieux)
 
1. 'Interoperability. A quick chat, a few war stories'. Carl Wilson, Open Pla...
1. 'Interoperability. A quick chat, a few war stories'. Carl Wilson, Open Pla...1. 'Interoperability. A quick chat, a few war stories'. Carl Wilson, Open Pla...
1. 'Interoperability. A quick chat, a few war stories'. Carl Wilson, Open Pla...
 

Mehr von Morten Nielsen

Itt1 intro project management
Itt1 intro project managementItt1 intro project management
Itt1 intro project managementMorten Nielsen
 
Itt1 intro knowing and doing
Itt1 intro knowing and doingItt1 intro knowing and doing
Itt1 intro knowing and doingMorten Nielsen
 
Itt2 its ssl and services
Itt2 its ssl and servicesItt2 its ssl and services
Itt2 its ssl and servicesMorten Nielsen
 
Itt2 its encrypted storage
Itt2 its encrypted storageItt2 its encrypted storage
Itt2 its encrypted storageMorten Nielsen
 
ITET1 Routing Transport layer.odp
ITET1 Routing Transport layer.odpITET1 Routing Transport layer.odp
ITET1 Routing Transport layer.odpMorten Nielsen
 
ITET1 Routing Application layer.odp
ITET1 Routing Application layer.odpITET1 Routing Application layer.odp
ITET1 Routing Application layer.odpMorten Nielsen
 
Itet2 its counter recon
Itet2 its counter reconItet2 its counter recon
Itet2 its counter reconMorten Nielsen
 
Itet2 its authorative sources
Itet2 its authorative sourcesItet2 its authorative sources
Itet2 its authorative sourcesMorten Nielsen
 

Mehr von Morten Nielsen (19)

Itt1 intro project management
Itt1 intro project managementItt1 intro project management
Itt1 intro project management
 
Itt1 intro knowing and doing
Itt1 intro knowing and doingItt1 intro knowing and doing
Itt1 intro knowing and doing
 
Itt2 its ssl and services
Itt2 its ssl and servicesItt2 its ssl and services
Itt2 its ssl and services
 
Itt2 its ids
Itt2 its idsItt2 its ids
Itt2 its ids
 
Itt2 its encrypted storage
Itt2 its encrypted storageItt2 its encrypted storage
Itt2 its encrypted storage
 
Itt2 its introduction
Itt2 its introductionItt2 its introduction
Itt2 its introduction
 
Itt3 virtual machines
Itt3 virtual machinesItt3 virtual machines
Itt3 virtual machines
 
Itt1 sd requirements
Itt1 sd requirementsItt1 sd requirements
Itt1 sd requirements
 
Itt3 its acl
Itt3 its aclItt3 its acl
Itt3 its acl
 
Itet3 its forensics
Itet3 its forensicsItet3 its forensics
Itet3 its forensics
 
Diagram cookbook
Diagram cookbookDiagram cookbook
Diagram cookbook
 
ITET3 Networking P2P
ITET3 Networking P2PITET3 Networking P2P
ITET3 Networking P2P
 
ITET1 Routing Transport layer.odp
ITET1 Routing Transport layer.odpITET1 Routing Transport layer.odp
ITET1 Routing Transport layer.odp
 
ITET1 Routing Application layer.odp
ITET1 Routing Application layer.odpITET1 Routing Application layer.odp
ITET1 Routing Application layer.odp
 
ITET3 ITS governance
ITET3 ITS governanceITET3 ITS governance
ITET3 ITS governance
 
Routing vlans
Routing vlansRouting vlans
Routing vlans
 
Itet2 its counter recon
Itet2 its counter reconItet2 its counter recon
Itet2 its counter recon
 
Itet2 its authorative sources
Itet2 its authorative sourcesItet2 its authorative sources
Itet2 its authorative sources
 
Its presentation
Its presentationIts presentation
Its presentation
 

Kürzlich hochgeladen

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Kürzlich hochgeladen (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Itt3 its social engineering

  • 1. Social engineering Servers and network 2012 Autumn Morten Bo Nielsen Mon@eal.dk
  • 2. Old school It's all about the money ● Hustling ● Scams Example Networks and servers - Mon@eal.dk 2
  • 3. Psychology of scams “cognitive and motivational processes” ● trust and authority ● visceral triggers ● human desires and needs ● greed, fear, avoidance of physical pain, or the desire to be liked Networks and servers - Mon@eal.dk 3 Go here for full story
  • 4. Inducing judgement errors ● Scarcity cues ● Unique opportunity ● Induction of behavioural commitment ● Start small and get them rolling ● Extreme cost/benefit ● Lack of emotional control ● A psychological trait of victims Networks and servers - Mon@eal.dk 4
  • 5. Examples Who needs spam, when we have this link http://www.urbanmillionaires.com/ Question: ● Is it true? Is it trustworthy? ● Puts words on it from the previous slides. ● Still think it is trust worthy? Networks and servers - Mon@eal.dk 5
  • 6. Examples Emotional distress steal a womans hand bag Question: ● Is this possible? ● Is she gullible? Networks and servers - Mon@eal.dk 6
  • 7. Still old school ● Gaining access to places you are not allowed ● http://www.youtube.com/watch?v=kOEWd_M5m44 ● The secret: Look as if you belong. Networks and servers - Mon@eal.dk 7
  • 8. Relation to security ● No security with physical access ● Why go through the firewall, if you may walk past? Networks and servers - Mon@eal.dk 8
  • 9. People on the move Steal the laptop (covertly) laptops in airports Networks and servers - Mon@eal.dk 9
  • 10. People on the move Use their telephones against them ● for profit ● reading the calendar, mails, SMS ● As a bug Networks and servers - Mon@eal.dk 10
  • 11. People on the move ● Mobile IT ● A security nightmare ● Too many variables Is this ok to use? Could it be fake? Networks and servers - Mon@eal.dk 11
  • 12. People at the office ● Make them tell you their passwords. ● Teachers recurring story – this time with an external reference.... ● from the BBC Question: ● Is this realistic? In Denmark? Networks and servers - Mon@eal.dk 12
  • 13. People at the office ● Spam ● Check your mailbox Networks and servers - Mon@eal.dk 13
  • 14. People at the office ● Receptionists are a crucial part of security ● Educate people ● Like this? Networks and servers - Mon@eal.dk 14
  • 15. Closing word Which on to use? Technical vs. social Answer: Both To read more, see this Networks and servers - Mon@eal.dk 15