opsec and defense agains social engineering for devels
play

OPSEC and defense agains social engineering for devels, execs, and - PowerPoint PPT Presentation

OPSEC and defense agains social engineering for devels, execs, and sart-ups @KirilsSolovjovs on twitter Mg.sc.comp. Kirils Solovjovs http://kirils.org for more Possible Security Contents Problem: Social Engineering concepts


  1. OPSEC and defense agains social engineering for devels, execs, and sart-ups @KirilsSolovjovs on twitter Mg.sc.comp. Kirils Solovjovs http://kirils.org for more Possible Security

  2. Contents ● Problem: Social Engineering – concepts – attacks ● Solution: OPSEC – theory – practice Kirils Solovjovs, 22/03/2018 OPSEC and defense against social 2/23 possiblesecurity.com engineering for devels, execs and start-ups

  3. [video] This is how hackers hack you using simple social engineering https://www.youtube.com/watch?v=lc7scxvKQOo Kirils Solovjovs, 22/03/2018 OPSEC and defense against social 3/23 possiblesecurity.com engineering for devels, execs and start-ups

  4. Social Engineering Kirils Solovjovs, 22/03/2018 OPSEC and defense against social 4/23 possiblesecurity.com engineering for devels, execs and start-ups

  5. Social Engineering (SE) is the use of deception to manipulate individuals into divulging sensitive information that may be used for illegitimate or fraudulent purposes or to further attacks on a larger entity Kirils Solovjovs, 22/03/2018 OPSEC and defense against social 5/23 possiblesecurity.com engineering for devels, execs and start-ups

  6. SE attack cycle for organisations ● Research Research ● Target ● Build trust Target ● Exploit Exploit Build trust Kirils Solovjovs, 22/03/2018 OPSEC and defense against social 6/23 possiblesecurity.com engineering for devels, execs and start-ups

  7. SE attack types (in person) ● Impersonation ● Access – VIP, user, tech tailgating – – appeal to authority key duplication – ● Acquisition – reverse social engineering – identity theft eavesdropping – shoulder-surfing – dumpster-diving – Kirils Solovjovs, 22/03/2018 OPSEC and defense against social 7/23 possiblesecurity.com engineering for devels, execs and start-ups

  8. SE attack types (remote) ● Types ● Delivery vehicles – phishing, spearphishing e-mails – – vishing usb drops – – app impersonation instant messages, sms – social networks – traffic injection – malware, adware – Kirils Solovjovs, 22/03/2018 OPSEC and defense against social 8/23 possiblesecurity.com engineering for devels, execs and start-ups

  9. Operations Security Kirils Solovjovs, 22/03/2018 OPSEC and defense against social 9/23 possiblesecurity.com engineering for devels, execs and start-ups

  10. OPSEC or Operations Security Kirils Solovjovs, 22/03/2018 OPSEC and defense against social 10/23 possiblesecurity.com engineering for devels, execs and start-ups

  11. OPSEC history ● Military origins ● Has found use in today’s cybersecurity – Why? Humans – the weakest link – Solution? OPSEC Kirils Solovjovs, 22/03/2018 OPSEC and defense against social 11/23 possiblesecurity.com engineering for devels, execs and start-ups

  12. OPSEC ● Identification of critical information ● Analysis of potential threats ● Analysis of your vulnerabilities ● Assessment of risk ● Application of appropriate countermeasures Kirils Solovjovs, 22/03/2018 OPSEC and defense against social 12/23 possiblesecurity.com engineering for devels, execs and start-ups

  13. Identification of critical information ● Losing which information would be detrimental to you? ● Gaining which information would be beneficial to your competitors? ● Examples: – passwords – research data – analytical data Kirils Solovjovs, 22/03/2018 OPSEC and defense against social 13/23 possiblesecurity.com engineering for devels, execs and start-ups

  14. Analysis of potential threats ● What are the current cybersecurity threats and exploits? ● Which threat actors should you be concerned about? – competitors – entities ● Examples: – Company B is developing the same product as we and is rumored to have offensive cyber capability. – We are travelling to China with corporate laptops and fear intercept. Kirils Solovjovs, 22/03/2018 OPSEC and defense against social 14/23 possiblesecurity.com engineering for devels, execs and start-ups

  15. Analysis of your vulnerabilities ● What are the potential deficiencies of your security process? ● What could reveal your critical information? ● Can you fix it? ● Think like the enemy! Where would you attack? ● Examples: – Our tech support does not properly identify callers before providing assistance – We don’t have a firewall and do not follow secure coding practices Kirils Solovjovs, 22/03/2018 OPSEC and defense against social 15/23 possiblesecurity.com engineering for devels, execs and start-ups

  16. Assessment of risk ● What is the risk of each vulnerability? Multiply every potential threat with every weakness to get the risk! – Risk = Impact × Probability – ● What OPSEC measures can you apply for each vulnerability? ● Examples: Impact of tech support not identifying callers is medium (5), because of limited tech support – permissions. Interests and capabilities of Company B make it very likely (8) that they will target us, therefore risk = 5 × 8 = 40%. We can require callers to provide secret phrases when connecting over the phone. Kirils Solovjovs, 22/03/2018 OPSEC and defense against social 16/23 possiblesecurity.com engineering for devels, execs and start-ups

  17. Application of appropriate countermeasures ● Have you implemented countermeasures for the risks identified? ● What do you need to apply all the required countermeasures? ● What hinders application of the required countermeasures? ● Is it financially feasibile? Prioritize by risk! – ● Examples: Our top risk ir rated 40% and costs 1800€ per year in extra workload and lost productivity, so – we will be implementing it starting 1 st of April 2018 and financing it from the IT support budget. Kirils Solovjovs, 22/03/2018 OPSEC and defense against social 17/23 possiblesecurity.com engineering for devels, execs and start-ups

  18. Tips for Operations Security Kirils Solovjovs, 22/03/2018 OPSEC and defense against social 18/23 possiblesecurity.com engineering for devels, execs and start-ups

  19. Practical OPSEC tips (everywhere) ● Secure passwords – create strong passwords – use a password manager or your head – don’t reuse passwords ● Install latest security updates ● Do not connect unknown devices to your device or vice versa ● Mindfully decide, if you will share a piece of information (including on social media) Kirils Solovjovs, 22/03/2018 OPSEC and defense against social 19/23 possiblesecurity.com engineering for devels, execs and start-ups

  20. Practical OPSEC tips (outside the office) ● Use VPN to protect your data when using other networks – If using a VPN is not possible, do not use shared WiFi hot-spots ● Know where your stuff is ● Keep your devices and work information (e.g. printouts) with you at all times, if possible ● Be aware of your surroundings when processing sensitive information – talking on the phone, working on a laptop, having a face-to-face conversation Kirils Solovjovs, 22/03/2018 OPSEC and defense against social 20/23 possiblesecurity.com engineering for devels, execs and start-ups

  21. Methodological OPSEC tips (1) ● Carry out regular employee awareness trainings – consider reminders / posters ● Test your employees by carrying out mock social engineering attacks ● Make sure that everyone, including especially founders / exec branch commits to OPSEC Kirils Solovjovs, 22/03/2018 OPSEC and defense against social 21/23 possiblesecurity.com engineering for devels, execs and start-ups

  22. Methodological OPSEC tips (2) ● Discover your vulnerability surface as seen from the outside ● Carry out or purchase penetration tests ● Set up technical defenses and countermeasures ● Manage risk posed by contractors and suppliers Kirils Solovjovs, 22/03/2018 OPSEC and defense against social 22/23 possiblesecurity.com engineering for devels, execs and start-ups

  23. Q&A Slides are available on http://kirils.org Find me on twitter: @KirilsSolovjovs Kirils Solovjovs, 22/03/2018 OPSEC and defense against social 23/23 possiblesecurity.com engineering for devels, execs and start-ups

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend