(c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... ·...

54
(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering Security Awareness Series

Transcript of (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... ·...

Page 1: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

Social Engineering

Security Awareness Series

Page 2: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

Social Engineering- Fact or Fallacy?

From Nov. 12, 2001 Fortune Magazine "Ask Annie" Column

Dear Annie,I compile market research , including information aboutour competitors, for a small software company. Most ofit comes from the WEB, news articles, legitimateindustry contacts, or industry reports we purchase. Nowmy boss wants me to start calling our largestcompetitors, posing as a potential reseller, to try to getproduct information out of them that way. I don't feel thisis ethical. Am I just being a Pollyanna? Does everyonedo this?

- Squeamish in Seattle

Page 3: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

Objective

At the conclusion of this session,Attendees should be better able to:

Understand the principles of social engineeringDefine the goals of social engineeringRecognize the signs of social engineeringIdentify ways to protect yourself from social engineering

Page 4: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

Agenda

Introduction and ExampleSocial Interaction influences of socialengineering Principles• Different avenues of persuasion• PerceptionCommon types of social engineering• Human-based• Computer-based

Page 5: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

AgendaPersonality Traits• Diffusion of responsibility• Chance for ingratiation• Trust relationship• Moral duty• Guilt• Identification• Desire to be Helpful• Cooperation

Page 6: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

AgendaSocial Engineer Exploits• Direst request• Contrived situation• Personal persuasionPotential Security Breaches• Passwords• Modems• Help Desk• Websites

Page 7: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

AgendaEmployee EducationRecognize the SignsHow to Protect OurselvesSummaryCase Study Review

Page 8: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

Social engineeringSocial engineering is the name given to acategory of security attacks in which someonemanipulates others into revealing informationthat can be used to steal, data, access tosystems, access to cellular phones, money oreven your own identity. Such attacks can bevery simple or very complex. Gaining access toinformation over the phone or through web sitesthat you visit have added a new dimension tothe role of the social engineer.

Page 9: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

Social engineerSocial Engineering is the acquisition ofsensitive information or inappropriateaccess privileges by an outsider, basedupon the building of an inappropriate trustrelationship with insiders.

The goal of social engineering is to tricksomeone into providing valuableinformation or access to that information.

Page 10: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

Social Engineering ExampleMr. Smith: Hello?Caller: Hello, Mr. Smith. This is Fred Jones in tech support. Due tosome disk space constraints, we’re going to be moving some user’shome directories to another disk at 8:00 this evening. Your accountwill be part of this move, and will be unavailable temporarily.Mr. Smith: Uh, okay. I’ll be home by then, anyway.Caller: Good. Be sure to log off before you leave. I just need tocheck a couple of things. What was your username again, smith?Mr. Smith: Yes. It’s smith. None of my files will be lost in the move,will they?Caller: No sir. But I’ll check your account just to make sure. Whatwas the password on that account, so I can get in to check yourfiles?Mr. Smith: My password is tuesday, in lower case letters.Caller: Okay, Mr. Smith, thank you for your help. I’ll make sure tocheck you account and verify all the files are there.Mr. Smith: Thank you. Bye.

Page 11: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

IntroductionSocial engineering preys on qualities ofhuman nature:the desire to be helpfulthe tendency to trust peoplethe fear of getting into trouble

The sign of a truly successful social engineer is they receive information without raising any suspicion as to what they are doing.

Page 12: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

IntroductionPeople are usually the weakest link in the

security chain.

Social engineering is still the most effectivemethod getting around security obstacles.

A skilled social engineer will often try toexploit this weakness before spending time andeffort on other methods to crack passwords.

Page 13: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

IntroductionWhy try to hack through someone’ssecurity system when you can get a userto open the door for you?

Social engineering is the hardest form ofattack to defend against because it cannot bedefended with hardware or software alone.

A successful defense depends on having goodpolicies in place ensuring that all employeesfollow them.

Page 14: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

Influences ofSocial Engineering

Three aspects of social interactions willhelp us in finding ways to learn about anddetect social engineering.

Different avenues of persuasion

Perception that affect social interaction

Techniques for persuasion and influence.

Page 15: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

Different avenues of persuasion

In attempting to persuade someone to dosomething, there are two methods apersuader can employ:

A Direct Route

A Peripheral Route

Page 16: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

Different avenues of persuasion

A Direct Route uses:systematiclogical argumentsTo:stimulate a favorable responseprompting the recipient to action

Page 17: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

Different avenues of persuasion

A Peripheral Route uses:peripheral cuesmental shortcutsMisrepresent their objectivesTo:trigger acceptance without thinking

Page 18: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

Different avenues of persuasion

One way in which the social engineer canmake prospective victims moresusceptible to Peripheral routes topersuasion is by making some statementat the outset that triggers a strong emotionsuch as:ExcitementFear

“The President of the University is waiting for

the information!”

Page 19: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

PerceptionIn a typical transaction our perceptionsabout the request for service begins with a basicbelief that each party is who they say they are.

Some social engineering victims may tend torely primarily on their belief that the person withwhom they dealt was honest, and to give littlethought to the activities.

Page 20: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

Common Types ofSocial Engineering

Social engineering can be broken into :Human basedComputer basedHuman-based refers to person-to-personinteractions to retrieve the desiredinformation.Computer-based refers to havingcomputer software that attempts toretrieve the desired information.

Page 21: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

Human-basedImpersonation - Case studies indicate that help desksare the most frequent targets of social engineeringattacks.– A Social Engineer calls the help desk– Help desk is helpful– Social engineer will often know names of employeesImportant User - A common ploy is to pretend be notonly an employee, but a vice president.– Help desk is less likely to turn down a request coming

from a high-level official– Social engineer may threaten to report the employee

to their supervisor.

Page 22: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

Human-basedThird-party Authorization - The social engineer mayhave obtained the name of someone in the organizationwho has the authority to grant access to information.– Ms. Martinez says its OK.– “Before he went on vacation, Ms. Martinez said I

should call you to get this information.Tech Support - Social engineer pretends to besomeone from the infrastructure-support groups.– System is having a problem– Needs them to log on to test the connection

Page 23: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

Human BasedIn Person - The social engineer may enter the buildingand pretend to be an employee, guest or servicepersonnel.– May be dressed in a uniform– Allowed to roam– Become part of the cleaning crewDumpster diving - Going through the trashShoulder Surfing - Looking over a shoulder to see whatthey are typing.– Passwords– Phone-card numbers

Page 24: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

Computer-based

Popup Windows - A window will appear on thescreen telling the user he has lost his networkconnection and needs to reenter their username and password.– A program will then e-mail the intruder with the

information.Mail attachments - Programs can be hidden ine-mail attachments.– Viruses– Worms– “I love you”

Page 25: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

Computer-basedSpam, Chain Letters and Hoaxes - These all rely on

social engineering to be spread.– While they do not usually cause damage, they do

cause a loss of productivity.– They use valuable network resources.Websites - A common ploy is to offer somethingfree or a chance to win a sweepstakes on aWebsite.– To win requires an e-mail address and password.– Used with 401K come-on.

Page 26: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

Personality TraitsIn the following discussion we willexamine how various social engineeringpersonality traits enhance the possibility ofsuccessful social engineering.When present, these traits increase thelikelihood of compliance.

Page 27: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

Personality TraitsDiffusion of responsibility - The target is made tobelieve that they are not solely responsible for theiractions.– The social engineer creates situations with manyfactors that dilute personal responsibility for decisionmaking.– The social engineer may drop names– May claim someone higher up has made the decisionChance for ingratiation - The target is lead to believeThat compliance with the request will enhance theirchances of receiving benefit.– Gaining advantage over a competitor– getting in good with management– Giving assistance to a sultry sounding female

Page 28: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

Personality TraitsTrust Relationships - The social engineerexpends time developing a trust relationshipwith the intended victim.– Usually following a series of small interactionsMoral duty - Encouraging the target to act outof a sense of moral duty or moral outrage.– Requires the social engineer to gather

information on the target and the organization– Tries to get the target to believe that there will

be a wrong that compliance will mitigate

Page 29: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

Personality TraitsGuilt - Most individuals attempt to avoid the guiltfeelings if possible.– Social engineer create situations designed to:· tug at the heartstrings· manipulate empathy· create sympathy– If granting a request will lead to avoidance of guilt,

target is more likely to comply.– Believing that not granting the request will lead to

significant problems to the requestor is often enough to weigh the balance in favor of compliance with the request.

Page 30: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

Personality TraitsIdentification - Try to get the target to identify

with the social engineer.– The social engineer tries to build a connection

with the target based on information gathered.– Informality is another trait social engineers

excel atDesire to help - Social engineers rely on

people’s desire to be helpful.– Holding the door– Logging on to an account– Lack of assertiveness or refusal skills

Page 31: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

Personality TraitsCooperation - The less conflict with thetarget the better.– Voice of reason– logic– patience– Stresses the positive but can refer back

to the threat process

Page 32: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

Social Engineer ExploitsSocial engineering exploits often fall intoone of the following categories:Direct requests - the social engineersimply asks for the information or accesswith no set up.– These are often challenged and refused– Is seldom used due to low probability of

success

Page 33: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

Social Engineer ExploitsContrived situation - The more factors the target mustconsider in addition to the basic request, the more likelythe target is to be persuaded.– Forgot a password– manager on vacation– looming deadlinesPersonal Persuasion - Many social engineers areadept at using personal persuasion to overcome initialresistance.– The goal is not to force compliance but to get

voluntary action– Target believes they are making the decision

Page 34: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

Potential Security BreachesSome potential security breaches are somundane that they hardly seemnoticeable. With the rush to install thelatest and greatest firewalls, encryptionsoftware and keys, security professionalsoften overlook the most obvious factors.

Page 35: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

Potential Security BreachesPasswords - One of the weakest areas ofsecurity.– Too long– Too short– Too easy– Never changed

Page 36: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

Potential Security BreachesModems - Every company has moremodems than they know of.– Programs like pcAnywhere– Use war-dialersHelp Desk - They try too hard to behelpful.Websites - As we discussed before,setting up a bogus website to trapinformation.

Page 37: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

Common DefensesA social engineer may simply walk in andbehave like one of the employees.We don’t challenge unfamiliar personnel.

Page 38: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

Common DefensesCommon defenses:• Everyone that enters the building (contractors,

business partners, vendors, employees)must show identification

• Passwords are never spoken over the phone.• Passwords are not to be left lying around.• Caller ID technology.• Invest in shredders.

Page 39: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

Policies and ProceduresSecurity policies should cover the following areas:

Account setupPassword change policyHelp desk proceduresAccess privilegesViolationsUnique user identification

Confidential informationhandlingModem usage andacquisitionSecure sensitive areasPrivacy policyCentralized securityfocus point

Page 40: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

Recognize the SignsRecognize key signs that indicate youmay be the target of a social engineeringattack:

Refusal to give contact informationRushingName-droppingIntimidationSmall mistakesRequesting forbidden information

Page 41: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

Recognize the Signs“I cannot be contacted”

“I’m on my cell phone and the battery is about to die”

The number they give you is a “call out only” number.

Page 42: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

How to Protect Ourselves

Here are some methods:Become familiar with the techniques usedTrust your instinctsNotification to targeted groups during attemptsCoordinated response when scams areidentifiedTest your readiness

Page 43: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

How to Protect OurselvesApply technology where you can.Consider the following:• Trace calls if possible• Control overseas long distance service

to most phones• Ensure good physical security for

building access• Mark sensitive documents

Page 44: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

Summary – Four Step PlanStep 1

If you cannot personally identify a caller who asks forPersonal information about you or anyone else(including badge number or employee number), forinformation about your computer system, or for anyother sensitive information, do not provide theinformation. Insist on verifying the caller’s identity bycalling them back at their proper telephone number as listed in (Company Name)’s telephone directory. This

procedurecreates minimal inconvenience to legitimate activitywhen compared with the scope of potential losses.

Page 45: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

Step 2

Remember that passwords are sensitive. A password foryour personal account should be known ONLY to you.Systems administrators or maintenance technicians whoneed to do something to your account will not requireyour password. They have their own password withsystem privileges that will allow them to work on youraccount without the need for you to reveal youpassword. If a system administrator or maintenancetechnician asks you for your password, be suspicious.

Page 46: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

Step 3

Systems maintenance technicians from outside vendorswho come on site should be accompanied by the localsite administrator (who should be known to you). If thesite administrator is not familiar to you, or if thetechnician comes alone, it is wise to give a call to yourknown site administrator to check if the technicianshould be there.

Unfortunately, many people are reluctant to do thisbecause it makes them look paranoid, and it isembarrassing to show that they do not trust a visitor.

Page 47: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

Step 4

If you feel you have thwarted or perhaps been victimizedby an attempt at social engineering, report the incidentto your manager and to security personnel immediately.

Page 48: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

Final ThoughtsA social engineer with enough time, patience andtenacity will eventually exploit some weakness in thesecurity of an enterprise.

The University’s campus constituents awareness andacceptance of security policies and proceduresare an important asset in the battle againstattackers.

The best defense against social engineeringattacks combines raising the bar of awarenessamong students, faculty and staff, coupled with a senseOf personal responsibility to protect the University’s assets.

Page 49: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

Final Thoughts

Consequences of successful attacks:

loss of public confidencemarket sharenegative publicityfines and other regulatory consequences

Page 50: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

Final ThoughtsThe audio is NOT true!

Employees at all levels need to believe that theyare an important part of the overall securitystrategy designed to protect the University, itsassets, and all those that work and live oncampus from the negative consequences ofsocial engineering.

SEC-U-R-IT-Y

Page 51: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

Social engineering Case Studies

How would you respond?

Page 52: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

Using Names"Hello, can I speak with Tom Smith fromR&D please?""I'm sorry, he'll be on vacation until next Monday""OK, who's in charge until he gets back?""Robert Jones"So we speak to Robert Jones instead. A hacker, however, can leverage this information when contacting R&D later. After some small talk with an R&D employee, the hacker claims:

"By the way Michael, just before Tom Smith went on vacation, he asked me to review the new design. I talked with Robert Jones and he said you should just fax/mail/send it to me. My number is 123-1234. Could you do it as soon as possible? Thanks."

Page 53: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

Vendor ImpersonationAnother basic technique is impersonatingan employee from a hardware vendor. They might use the name of a real orimagined company:

"Hi, I'm calling from Applied Technology Corporation. We have a special offer on routers. Could you tell me if you're satisfied with the hardware you're using at the moment?"

Page 54: (c) Copyright 2001. Melissaiwar.org.uk/comsec/resources/security-awareness/social-engineering... · (c) Copyright 2001. Melissa Guenther, LLC. All rights reserved Social Engineering

(c) Copyright 2001. Melissa Guenther, LLC. All rights reserved

After HoursDuring an after hours Internet chat session, you are asked for apicture of yourself. Although you don’t have one available, youare obligingly asked if you would like one of the other party.After a bit of additional encouragement, the other party sendsAn attachment that, in all respects, resembled a JPEG file.Upon accessing the attachment the hard drive starts spinning,and of course, there is no photo.

Understand the danger of a Trojan horse being enclosed, and immediately alert the IT department. The Internet connection needs to be closed down and checked. Eventually, the computer could be reinstalled and rolled back to the day before with a backup tape, (losing a full day of production and possible additional days overall).