Social Security
SOCIAL ENGINEERING
The Process :
According to wikipedia social engineering is a art of human hacking , where hackersdont use technology. Social engineering , in context of information security,refers to psychological manipulation of people into performing actions or divulging confidential information.
Some Facts :
- people
are the weakest link in a security chain lifecycle
- companies
critical data could still remain vulnerable to old-fashioned human
manipulation
- Most
people think that hacking is mostly technical, utilizing the technical
flaws in the system that the hacker is able to exploit.
- Social
engineering is a non-technical kind of attack that tricks people into
performing malicious actions or giving away confidential data.Simply
hacker uses organisations employees to get the credentials
Effects :
- gain unauthorized access to
critical information and systems.
- identity theft
- disrupt the service
Causes :
- people are not aware of the value of the
data they have.
- advantage of our willingness to trust and
help others.
- convinced people to give hackers what they wanted.
- Gather Information - Learns as much as he can about the victim.
- Plan Attack - the attacker preplans the execution plan.
- Acquire Tools - These are the pre owned tools through which they will execute the plan by exloiting the weaknesses of the target persons/person's system using acquired knowledge.
Creativity :
- Phishing
– Tricks a user to click/download a malicious link.
- Spear phishing – Targeting a specific organization and/or individual.
- Whale phishing – Targets specifically individuals such as CEOs.
- Vishing – Targeting individuals over the phone.
- Pretexting – Presents oneself as someone else.
- Tailgating (piggybacking) – Unauthorized person gains access to restricted
area by following an authorized person.
- Water-holing – Hacker compromises a third party website in order to
compromise a person who visits that website to deliver a malware.
- Dumpster diving – Collects information about a company and/or individual
by going through the trash.
- Reverse social engineering – It’s not a hacker who initiates a contact,
but a potential victim themselves.
- Baiting – The hacker might drop a portable USB drive in the company
parking lot or elevator on the chance that an employee will plug it into a
work computer.
- Quid pro quo – Hacker requests private information such as username and
password in exchange for gift such as a gift card.
- Scareware – To scare/manipulate a person to buy unwanted software and/or
to download a software (which is malicious) to fix a problem.
- Malvertising – Spread malware by online advertising on popular
websites.
----------------------------------------XXXXXXX-----------------------------------------------------
Comments
Post a Comment