Social Engineering Flashcards
Name examples of SE.
Posing as a fellow employee (easier in a large
organization)
Posing as an employee of a vendor, partner company, or
law enforcement
Posing as someone in authority
Posing as a new employee requesting help
Using insider lingo and terminology to gain trust
What are the steps of the SE life cycle?
Research: attackers try to find out as much as possible
beforehand from annual reports, brochures, web site,
dumpster diving
Developing trust: use of insider information,
misrepresenting identity, need for help or authority
Exploiting trust: ask victim for information or other form of
help (or manipulate victim into asking for help)
Utilize information: if final goal not reached yet, go back to
earlier steps
What are warning signs of an SE attack?
Unusual request Refusal to give callback number Claim of authority Stresses urgency Threatens negative consequences in case of non-compliance Shows discomfort when questioned or challenged Name dropping Compliments or flattery Flirting
How to stop SE attacks?
Have procedures in place for handling suspicious requests:
Make Staff part of the security policy
Training of staff plays an important role
Explain why certain procedures are put in place (blind
obedience doesn’t work)
Staff has to be trained to challenge authority when security
is at stake