140 likes | 291 Views
Social Engineering. Presented by James H. Sunshine October 26, 2004. Overview. Definitions Security Holes Attack Strategies Countermeasures Ethics Summary. A very DRY topic indeed! Ba-doom Boom! . Definitions. Social Engineering:
E N D
Social Engineering Presented by James H. Sunshine October 26, 2004
Overview • Definitions • Security Holes • Attack Strategies • Countermeasures • Ethics • Summary
A very DRY topic indeed! Ba-doom Boom!
Definitions • Social Engineering: • The art and science of getting people to comply with your wishes. • An outside hacker’s use of psychological tricks … in order to obtain information [needed] to gain access to the system. • Getting needed information …from a person rather than breaking into a system.
My definition Using people to get, or help get, what you want. So what are the tools and methods? How do they operate? What makes it so effective?
Security Holes Where are the weak points in a system?
Attack Strategies Tools and Methods • Telephone • Who to call? • What to say? • Dumpster Diving • What are they looking for? • Persuasion/Impersonation • Who to impersonate? • What information can be persuaded?
Operations Attack Strategies • Research! Do your homework! • Network scan? Know the boss’ computer. • Get a foot in the door. Assistance? • Are the computer’s unlocked? How’s the security? • What information is needed? Where is it?
Why is it effective? Attack Strategies • People want to help. • People fear authority. • People feel its ok to give small, innocuous pieces of information. • People don’t give a second thought to unusual instances, and so many security breaches go unreported.
Countermeasures • What can be done to prevent some of these attacks? • TRAINING!!!!!!!!!!!!!!!!!!!!!!!!!! • Passwords • Document handling • Shredding confidential data • Lockup of confidential data • Physical security • Badge control • Guest escort • Phone tracking/monitoring
Ethics • How does ethics apply? • Spells out procedures. • Clearly defines who to call. • Encourages questioning of unusual instances. • Introduces tight controls to limit the ability of someone giving out confidential information.
Summary • Social Engineering is insidiously tricky to combat, but not impossible. • The human is the weakest link in any security system, and yet is the trickiest to exploit. • Training is the best defense against attacks. • Ethics plays an important role in defending against social engineering.
References • searchsecurity.techtarget.com • www.securityfocus.com • www.cioinsight.com • www.securitygroup.org