Information Security Social Engineering Why are we here

  • Slides: 22
Download presentation
Information Security Social Engineering

Information Security Social Engineering

Why are we here? • To make you more aware of threats regarding information

Why are we here? • To make you more aware of threats regarding information security • Give you examples of real life threats • Show you a hacking scenario • Let you know what you can do to prevent.

What is Social Media & Engineering? Social Media • Any method of social interaction

What is Social Media & Engineering? Social Media • Any method of social interaction where people create, share, or exchange ideas and information. Social Engineering • Process of using social skills to convince people to reveal access credentials or other valuable information to the attacker. • Social media is a tool hackers use to build social engineering. We give them that.

Why care? • Survey Results • Primary use of internet is for social media

Why care? • Survey Results • Primary use of internet is for social media and then school work • Group is aware of cyber security and cyber attacks • About 50% have answered personal questions online • Group uses smartphones, tablets, and computers to access internet • Hackers always find new ways and with advancement in technology it is becoming easier to exploit people • STAY INFORMED!!!!

Misconception about Phone Security • 57% of adult smartphone users are unaware that there

Misconception about Phone Security • 57% of adult smartphone users are unaware that there are security solutions for smartphones • 52% of users store sensitive files on their phones • Last year, 38% of smartphone users were victims of cybercrime • This number is expected to grow as the smartphone user base continues to grow • Smartphones can become infected with many different variations of malware, just as computers can

Cell Phone Attacks • NFC – Near Field Communication • Radio-frequency identification • Activate

Cell Phone Attacks • NFC – Near Field Communication • Radio-frequency identification • Activate within 3 centimeters – Debuted in 2010 • Samsung Nexus S – Used for • Mobile Payments • Device Pairing • Data transfers • Eavesdropping • Antenna to intercept radio communication • Steal/corrupt data being transmitted

Cell Phone Attacks • Gyroscope – Detect devices orientation in space – Android •

Cell Phone Attacks • Gyroscope – Detect devices orientation in space – Android • Frequencies from 80 Hz – 250 Hz – i. OS • Frequencies 0 Hz – 100 Hz – Consequence • Record human voices (80 Hz – 250 Hz) • No explicit permissions required • No microphone necessary

Cell Phone Attacks • Bluetooth – Ultra High Frequency Radio Waves – Short distance

Cell Phone Attacks • Bluetooth – Ultra High Frequency Radio Waves – Short distance (~30 ft) – Used for • Data transfers • Device communication – Bluesnarfing • Connect without authentication • CRUD data – i. e. Calendar or contacts data – Bluebugging • Connect by posing as headset or previously authenticated device • Listen to phone calls • Interact with text messages

Social Engineering Scams 419 Fraud Purchase Order Scam • • • Scams retailers and

Social Engineering Scams 419 Fraud Purchase Order Scam • • • Scams retailers and universities • Sends money overseas • Uses victims from Romance Scam to facilitate money wiring Employment Scam Lottery Scam Online sales and rentals Romance Scam

Local Scams “Peg” Romance Victim Papageorgiu • Used online dating • Fell in love

Local Scams “Peg” Romance Victim Papageorgiu • Used online dating • Fell in love with an “antic dealer” Mike Perry • Helped wire money for her “boyfriend” from “antic sales” • Money laundering scheme • Also a victim of online dating • “girlfriend” was a woman living in Albuquerque • Sold his condo to help his “girlfriend”

Social Engineering Tactics Nontechnical Technical • • • Pretexting Diversion theft Tailgaiting Shoulder Surfing

Social Engineering Tactics Nontechnical Technical • • • Pretexting Diversion theft Tailgaiting Shoulder Surfing Techie Talk Neuro-linguistic programming Phishing Baiting Social Networking Social Engineering in reverse

Social Network Scam Example Offender Victim • Creates fake facebook with full content (pictures,

Social Network Scam Example Offender Victim • Creates fake facebook with full content (pictures, hobbies, etc. ) • Pretend to be someone you should know (transfer student, fellow employee, etc. ) • Sends friend request • Has security options enabled to only allow friends to see information • Is that enough?

Art of BS • • • How to invade personal space and gain credibility

Art of BS • • • How to invade personal space and gain credibility Use of same language/ slang Humor Build trust 3 layers of space http: //youtu. be/1 kk. OKv. Prd. Z 4? t=31 m 55 s Demonstration

Prevention Never give out: Be aware of who is asking • Personal information •

Prevention Never give out: Be aware of who is asking • Personal information • Medical Information • Financial Information • Doctor, Employer, friend? • Should they already have the information? • Do they need this information? • Why do they need this?

Prevention Be aware what they ask via phone Be aware what they ask via

Prevention Be aware what they ask via phone Be aware what they ask via internet • • • Watch out for any attachments in e-mail they want you to run • Avoid any requests to enter account information if you don’t know the sender or site. • When in doubt, you can contact sender or send a new email to address with same subject. Ask for full name of caller Correct spelling A call back number Why they need information • When in doubt, put caller on hold and see if they wait. Most scammers will not. Log the strange call

Short Video and Live Demo • https: //www. youtube. com/watch? v=1 kk. OKv. Prd.

Short Video and Live Demo • https: //www. youtube. com/watch? v=1 kk. OKv. Prd. Z 4 • 16: 58 • Live Demo of Hacking

Q&A Can you find a difference between the secured session and insecure session?

Q&A Can you find a difference between the secured session and insecure session?

Q&A True or false: Social Engineering scams need your trust to happen True

Q&A True or false: Social Engineering scams need your trust to happen True

Q&A True or false: Social attacks can only happen online False- there are more

Q&A True or false: Social attacks can only happen online False- there are more online and is increasing, but can happen in person or over the phone.

Q&A How many layers of protection are there? Three

Q&A How many layers of protection are there? Three

QUESTIONS? ?

QUESTIONS? ?