Preview

People Hacking: the Art of Social Engineering

Powerful Essays
Open Document
Open Document
4047 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
People Hacking: the Art of Social Engineering
People Hacking: The Art of Social Engineering

ABSTRACT

Social engineering is one of the most overlooked aspects of information security and yet it is the easiest way for someone – usually an employee - to gain access to restricted information on a computer network. Attacks can be either physical or psychological; each can be equally effective in acquiring confidential information. Methods used to get information can be either human- or computer-based, with different psychological reasons why each method works. Protecting against social engineers boils down to policies that guard against their attacks, but these policies must also be complemented with an effective security awareness program in order to be successful.

INTRODUCTION

Imagine a local banking company. The CIO is out of town on business. A group of strangers walks in early one morning, and by lunchtime they walk out with access to anything they want on the company 's network. How did this happen? First of all, these so-called "strangers" researched the company and probably knew more about it than most employees. The intruders showed up at the front door and just followed other employees into secured areas of the building. Each smiled when they searched for their "lost" security badge when trying to enter the top floor where the VIPs were located; a friendly employee smiled back as he let them in. Since these strangers knew the CIO was out of town (something that the HR department revealed when they called earlier in the week), they were able to get into his office, call the Help Desk, and get his password changed because his current one "wasn 't working." After they got access to the network, the intruders were able to successfully hack into the system and become a super-user with access to valuable resources. They then sorted through the CIO 's files and even his trash and were able to find all kinds of useful information. These strangers then walked out



References: Allen, Malcolm (2001). The Use of ‘Social Engineering ' as a means of Violating Computer Systems. Retrieved November 22, 2003, from http://www.sans.org/rr/papers/index.php?id=529 Arthurs, Wendy (2001). A Proactive Defence to Social Engineering. Retrieved November 22, 2003, from http://www.sans.org/rr/papers/index.php?id=511 Golomb, Gary (2003). IDS vs. IPS Commentary. Retrieved December 3, 2003, from http://www.linuxsecurity.com/articles/forums_article-7476.html Gragg, David (2002). A Multi-Level Defense Against Social Engineering. Retrieved November 22, 2003, from http://www.sans.org/rr/papers/index.php?id=920 Gulati, Radha (2002). The Threat of Social Engineering and Your Defense Against It. Retrieved December 3, 2003, from http://www.sans.org/rr/papers/index.php?id=1232 Kessler International (2000, January 4). Employees, Not Hackers, Greatest Computer Threat. Retrieved December 13, 2003, from http://www.investigation.com/articles/library/2000articles/articles18.htm Stevens, George (2002). Enhancing Defenses Against Social Engineering. Retrieved November 22, 2003, from http://www.giac.org/practical/gsec/George_Stevens_GSEC.pdf

You May Also Find These Documents Helpful

  • Best Essays

    Aircraft Solutions Project

    • 2440 Words
    • 10 Pages

    Marsan, C. D. (2009, June 9). Hidden Threat on Corporate Nets: Misconfigured Gear. Retrieved April 4, 2011, from CIO: http://www.cio.com/article/494522/Hidden_Threat_on_Corporate_Nets_Misconfigured_Gear…

    • 2440 Words
    • 10 Pages
    Best Essays
  • Good Essays

    FXT2 Task2

    • 825 Words
    • 4 Pages

    References: Peltier, T. (n.d.). Social Engineering: Concepts and Solutions. Retrieved January 27, 2014, from http://www.infosectoday.com/Norwich/GI532/Social_Engineering.htm…

    • 825 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Never allow any type of attack, successful or otherwise to go undocumented or wasted. “If you experience an attack, learn from it,” For example, let us analyze an information security breach case of a financial corporation that caught an employee trying to steal very private company trading algorithms. Accountability and authenticity must immediately be exercised to ensure…

    • 639 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Week 5 you decide

    • 928 Words
    • 4 Pages

    Insiders have caused damage to networks being terminated or remain in a position to provide information to the outside. They can set up fake websites that look like a real product or supplier but are actually malicious sites designed to attack the computer and add malicious code to the key log, use contact lists, steal data, and other malicious purposes.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Whitman, M. E., & Mattord, H. J. (2011). Readings and cases in information security: Law and ethics. Boston, MA: Course Technology.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    In the book The Pigman John and Loraine are best friends and just by playing a game and make a phone call they both find there new best friend Mr. Pigman. A significant theme in The Pigman is friendship.…

    • 169 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    SkillPort Security

    • 647 Words
    • 3 Pages

    Discuss the role that preparing employees to recognize and respond to social engineering techniques should play in the organization’s overall information security program. Note three specific social engineering techniques. Discuss how they can be recognized and how to best prepare employees for each potential attack.…

    • 647 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Peter Krapp Analysis

    • 703 Words
    • 3 Pages

    Peter Krapp builds a well-constructed argument designed to persuade readers that computer hacking is a danger that steals our most valuable possession—personal information—from our most vulnerable people--students. The article focuses on personal information about college students stolen from college computer networks. The writer builds his argument brick by brick. He starts by giving an example of student data stolen from a college by hackers in China, relating his topic to an event that really happened. The writer quickly establishes himself as an expert in the topic so readers can trust his information. Krapp asks and answers questions about the theft of data, goes into more depth about the type of information stolen from college networks, and then briefly touches on the laws, or the lack of laws, to protect students. He points out that data is stolen from students by not only foreign hackers, but also by American companies. The writer finishes with a call for colleges to protect student data, clearly stating his purpose.…

    • 703 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    The act of phishing has been around since the mid-1990s, but it was not legally defined as a crime until the early 2000s when it became more widespread (Rekouche 2011). To help understand the implications of phishing, this essay will critically view a significant case study that happened in 2009, Operation Phish Phry’. Understanding the actions taken by the various actors involved in this case could provide an insight regarding the countermeasures proposed by relevant authorities about phishing. Additionally, I would argue that the proposed countermeasures are insufficient and that there is still room for improvements which I will cover in this essay.…

    • 1498 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Organized Crime

    • 375 Words
    • 2 Pages

    One new trend in organized crime is cybercrime. The key to it is social engineering. Hackers can easily persuade someone now a days to do things on their computer that is not in their best interest and the internet is assisting them.…

    • 375 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    This book shows the many aspects of social engineering and it goes into detail on how the social engineer thinks, plans, and executes his or her’s attacks. The author, Christopher Hadnagy uses his real knowledge and experiences to take the reader on a long and engaging ride on the subject. The book asserts that human hackers not only scam others because of greed, but in order to stay powerful. One of the important main ideas is the influence and the power of persuasion. The author notes that people are trained from a young age in nearly every culture to listen to and respect authority. When the social engineer takes on that role of authority, it becomes a most powerful tool; far more powerful than any software or piece of technology. This relates to the show, White Collar, because Neal takes on many different identities, so he can manipulate others into thinking he is someone that he’s not. He does this to obtain information, money, or whatever else he wants. Like many criminals, Neal has many aliases, and his most used one is Nick Halden, which he uses when he meets new people, so they don’t judge him based on his past criminal life. This source is useful when research on social engineering is needed to support the thesis and the argument of the research paper. The information and facts from this book correlate with the examples from the T.V. show, White Collar, thus allowing a deeper analysis of the operative word and its definitions.…

    • 2588 Words
    • 11 Pages
    Better Essays
  • Best Essays

    References: Agarwal, R. and Karahanna, E. (2000). Time Flies When You 're Having Fun: Cognitive Absorption and Beliefs About Information Technology Usage. Management Information Systems Quarterly, 24, 665-692. Amber Stabek, S. B., and Watters, P. A. (2009). the Case for a Consistant Cyberscam Classification Framework. Internet Commerce Security Laboratory. ARIN (2009). ARIN: WHOIS Database Search Retrieved 20th Oct 2009 from ws.arin.net/ Arnold, B. (2008). The 419 scam: basis, statistics, regulation. Caslon Analytics [Online]. Available: http://www.caslon.com.au/419scamnote.htm#statistics. Bishop, J. (2008). Understanding and facilitating the development of social networks in online dating communities: A case study and model. Social Networking communities and eDating Services. Bolton, R. J. (2002). Unsupervised Profiling Methods for Fraud Detection. Statistical Science, 17, 235-255. Bonchi, E. F., Malin, B., and Jiang, W. (2008). PinKDD '08: Privacy, Security, and Trust in KDD: Post-Workshop Report. SIGKDD Explorations 2008, 10, 66-67. Dixon, R. (2005). I will eat your Dollars. Los Angeles Times [Online]. Available: http://web.archive.org/web/20051029165224/http://news.yahoo.com/s/latimests/20051020/ts_latim es/iwilleatyourdollars. Ellison, N., and Gibbs, J. (2006). Managing Impressions Online: Self Presentation in the Online Dating Environment. Journal of Computer Mediated Communication, 11. FDIC. (2009). Fraud Alert. Teller Vision. April. Feliciano, C., Robnett, B., and Komaie, G. (2009). Gendered racial exclusion among white Internet daters. Social Science Research, 38, 41-56. Ferreyra-Orozo, G. (2008). A Culture of Corruption: Everyday Deception and Popular Discontent in Nigeria. American Anthropologist, 110, 145-146. Gill, J. O. (2003). Perception of email personality at zero-acquaintance: Extroversion takes care of itself; Neuroticism is a worry. Proceedings of the 25th annual conference of the cognitive science society.…

    • 5113 Words
    • 21 Pages
    Best Essays
  • Better Essays

    Manipulation

    • 1222 Words
    • 5 Pages

    Throughout this paper I will discuss several different forms of manipulation such as; Crowd Manipulation, Market Manipulation, Media Manipulation, and Psychological Manipulation. I will break down each of these to find their purpose and place in our society and to find if they is any “good” to be found in them.…

    • 1222 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    MATERIAL FALLACIES

    • 821 Words
    • 5 Pages

    • Poisoning the well: a direct attack on the trustworthiness of the person making a…

    • 821 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Crime

    • 1327 Words
    • 6 Pages

    3. Snow, Gordon M. "Social Networks Are Vulnerable to Crime." Policing the Internet. Ed. Roman Espejo. Detroit: Greenhaven Press, 2012. At Issue. Rpt. from "Statement Before the House Judiciary Subcommittee on Crime, Terrorism, and Homeland Security." www.fbi.gov. Courtesy of The Federal Bureau of Investigation and The Department of Justice. The Federal Bureau of Investigation and The Department of Justice, 2010. Gale Opposing Viewpoints In Context. Web. 23 Nov. 2012.…

    • 1327 Words
    • 6 Pages
    Better Essays