Social Security


SOCIAL ENGINEERING

According to wikipedia social engineering is a art of human hacking , where hackersdont use technology. Social engineering , in context of information security,refers to psychological manipulation of people into performing actions or divulging confidential information.



Some Facts :
  • people are the weakest link in a security chain lifecycle
  • companies critical data could still remain vulnerable to old-fashioned human manipulation
  • Most people think that hacking is mostly technical, utilizing the technical flaws in the system that the hacker is able to exploit.
  • Social engineering is a non-technical kind of attack that tricks people into performing malicious actions or giving away confidential data.Simply hacker uses organisations employees to get the credentials

Effects :
  •  gain unauthorized access to critical information and systems.
  •  identity theft
  •  disrupt the service








Causes :
  •  people are not aware of the value of the data they have.
  •  advantage of our willingness to trust and help others.  
  •  convinced people to give hackers what they wanted.



 The Process :
  • Gather Information - Learns as much as he can about the victim.
  • Plan Attack - the attacker  preplans the execution plan.
  • Acquire Tools - These are the pre owned tools through which they will execute the plan by exloiting the weaknesses of the target persons/person's system using acquired knowledge.







 


Creativity :

  • Phishing – Tricks a user to click/download a malicious link.
  • Spear phishing – Targeting a specific organization and/or individual.
  •  
  • Whale phishing – Targets specifically individuals such as CEOs.
  • Vishing – Targeting individuals over the phone.
  • Pretexting – Presents oneself as someone else.
  • Tailgating (piggybacking) – Unauthorized person gains access to restricted area by following an authorized person. 
  • Water-holing – Hacker compromises a third party website in order to compromise a person who visits that website to deliver a malware.
  • Dumpster diving – Collects information about a company and/or individual by going through the trash.
  • Reverse social engineering – It’s not a hacker who initiates a contact, but a potential victim themselves.
  • Baiting –  The hacker might drop a portable USB drive in the company parking lot or elevator on the chance that an employee will plug it into a work computer.
  • Quid pro quo – Hacker requests private information such as username and password in exchange for gift such as a gift card.
  • Scareware – To scare/manipulate a person to buy unwanted software and/or to download a software (which is malicious) to fix a problem.
  • Malvertising – Spread malware by online advertising on popular websites.  
----------------------------------------XXXXXXX-----------------------------------------------------

Comments

Popular Posts

The Nigerian Prince Scam

ACCESSING TASK MANAGER

PC Security For Noobies !!!

Understanding the Computer Errors