OPSEC and defense agains social engineering for devels, execs, and - - PowerPoint PPT Presentation

opsec and defense agains social engineering for devels
SMART_READER_LITE
LIVE PREVIEW

OPSEC and defense agains social engineering for devels, execs, and - - PowerPoint PPT Presentation

OPSEC and defense agains social engineering for devels, execs, and sart-ups @KirilsSolovjovs on twitter Mg.sc.comp. Kirils Solovjovs http://kirils.org for more Possible Security Contents Problem: Social Engineering concepts


slide-1
SLIDE 1

OPSEC and defense agains social engineering for devels, execs, and sart-ups

Mg.sc.comp. Kirils Solovjovs Possible Security @KirilsSolovjovs on twitter http://kirils.org for more

slide-2
SLIDE 2

Kirils Solovjovs, 22/03/2018 possiblesecurity.com OPSEC and defense against social engineering for devels, execs and start-ups 2/23

Contents

  • Problem: Social Engineering

– concepts – attacks

  • Solution: OPSEC

– theory – practice

slide-3
SLIDE 3

Kirils Solovjovs, 22/03/2018 possiblesecurity.com OPSEC and defense against social engineering for devels, execs and start-ups 3/23

[video]

This is how hackers hack you using simple social engineering https://www.youtube.com/watch?v=lc7scxvKQOo

slide-4
SLIDE 4

Kirils Solovjovs, 22/03/2018 possiblesecurity.com OPSEC and defense against social engineering for devels, execs and start-ups 4/23

Social Engineering

slide-5
SLIDE 5

Kirils Solovjovs, 22/03/2018 possiblesecurity.com OPSEC and defense against social engineering for devels, execs and start-ups 5/23

Social Engineering (SE)

is the use of deception to manipulate individuals into divulging sensitive information that may be used for illegitimate or fraudulent purposes or to further attacks on a larger entity

slide-6
SLIDE 6

Kirils Solovjovs, 22/03/2018 possiblesecurity.com OPSEC and defense against social engineering for devels, execs and start-ups 6/23

SE attack cycle for organisations

  • Research
  • Target
  • Build trust
  • Exploit

Build trust Research Target Exploit

slide-7
SLIDE 7

Kirils Solovjovs, 22/03/2018 possiblesecurity.com OPSEC and defense against social engineering for devels, execs and start-ups 7/23

SE attack types (in person)

  • Impersonation

– VIP, user, tech – appeal to authority – reverse social engineering – identity theft

  • Access

tailgating

key duplication

  • Acquisition

eavesdropping

shoulder-surfing

dumpster-diving

slide-8
SLIDE 8

Kirils Solovjovs, 22/03/2018 possiblesecurity.com OPSEC and defense against social engineering for devels, execs and start-ups 8/23

SE attack types (remote)

  • Types

– phishing, spearphishing – vishing – app impersonation

  • Delivery vehicles

e-mails

usb drops

instant messages, sms

social networks

traffic injection

malware, adware

slide-9
SLIDE 9

Kirils Solovjovs, 22/03/2018 possiblesecurity.com OPSEC and defense against social engineering for devels, execs and start-ups 9/23

Operations Security

slide-10
SLIDE 10

Kirils Solovjovs, 22/03/2018 possiblesecurity.com OPSEC and defense against social engineering for devels, execs and start-ups 10/23

OPSEC or Operations Security

slide-11
SLIDE 11

Kirils Solovjovs, 22/03/2018 possiblesecurity.com OPSEC and defense against social engineering for devels, execs and start-ups 11/23

OPSEC history

  • Military origins
  • Has found use in today’s cybersecurity

– Why? Humans – the weakest link – Solution? OPSEC

slide-12
SLIDE 12

Kirils Solovjovs, 22/03/2018 possiblesecurity.com OPSEC and defense against social engineering for devels, execs and start-ups 12/23

OPSEC

  • Identification of critical information
  • Analysis of potential threats
  • Analysis of your vulnerabilities
  • Assessment of risk
  • Application of appropriate countermeasures
slide-13
SLIDE 13

Kirils Solovjovs, 22/03/2018 possiblesecurity.com OPSEC and defense against social engineering for devels, execs and start-ups 13/23

Identification of critical information

  • Losing which information would be detrimental to you?
  • Gaining which information would be beneficial to your competitors?
  • Examples:

– passwords – research data – analytical data

slide-14
SLIDE 14

Kirils Solovjovs, 22/03/2018 possiblesecurity.com OPSEC and defense against social engineering for devels, execs and start-ups 14/23

Analysis of potential threats

  • What are the current cybersecurity threats and exploits?
  • Which threat actors should you be concerned about?

– competitors – entities

  • Examples:

– Company B is developing the same product as we and is rumored to have offensive

cyber capability.

– We are travelling to China with corporate laptops and fear intercept.

slide-15
SLIDE 15

Kirils Solovjovs, 22/03/2018 possiblesecurity.com OPSEC and defense against social engineering for devels, execs and start-ups 15/23

Analysis of your vulnerabilities

  • What are the potential deficiencies of your security process?
  • What could reveal your critical information?
  • Can you fix it?
  • Think like the enemy! Where would you attack?
  • Examples:

– Our tech support does not properly identify callers before providing assistance – We don’t have a firewall and do not follow secure coding practices

slide-16
SLIDE 16

Kirils Solovjovs, 22/03/2018 possiblesecurity.com OPSEC and defense against social engineering for devels, execs and start-ups 16/23

Assessment of risk

  • What is the risk of each vulnerability?

Multiply every potential threat with every weakness to get the risk!

Risk = Impact × Probability

  • What OPSEC measures can you apply for each vulnerability?
  • Examples:

Impact of tech support not identifying callers is medium (5), because of limited tech support

  • permissions. Interests and capabilities of Company B make it very likely (8) that they will target

us, therefore risk = 5 × 8 = 40%. We can require callers to provide secret phrases when connecting over the phone.

slide-17
SLIDE 17

Kirils Solovjovs, 22/03/2018 possiblesecurity.com OPSEC and defense against social engineering for devels, execs and start-ups 17/23

Application of appropriate countermeasures

  • Have you implemented countermeasures for the risks identified?
  • What do you need to apply all the required countermeasures?
  • What hinders application of the required countermeasures?
  • Is it financially feasibile?

Prioritize by risk!

  • Examples:

Our top risk ir rated 40% and costs 1800€ per year in extra workload and lost productivity, so we will be implementing it starting 1st of April 2018 and financing it from the IT support budget.

slide-18
SLIDE 18

Kirils Solovjovs, 22/03/2018 possiblesecurity.com OPSEC and defense against social engineering for devels, execs and start-ups 18/23

Tips for Operations Security

slide-19
SLIDE 19

Kirils Solovjovs, 22/03/2018 possiblesecurity.com OPSEC and defense against social engineering for devels, execs and start-ups 19/23

Practical OPSEC tips (everywhere)

  • Secure passwords

– create strong passwords – use a password manager or your head – don’t reuse passwords

  • Install latest security updates
  • Do not connect unknown devices to your device or vice versa
  • Mindfully decide, if you will share a piece of information (including on social media)
slide-20
SLIDE 20

Kirils Solovjovs, 22/03/2018 possiblesecurity.com OPSEC and defense against social engineering for devels, execs and start-ups 20/23

Practical OPSEC tips (outside the office)

  • Use VPN to protect your data when using other networks

– If using a VPN is not possible, do not use shared WiFi hot-spots

  • Know where your stuff is
  • Keep your devices and work information (e.g. printouts) with you at all

times, if possible

  • Be aware of your surroundings when processing sensitive information

– talking on the phone, working on a laptop, having a face-to-face conversation

slide-21
SLIDE 21

Kirils Solovjovs, 22/03/2018 possiblesecurity.com OPSEC and defense against social engineering for devels, execs and start-ups 21/23

Methodological OPSEC tips (1)

  • Carry out regular employee awareness trainings

– consider reminders / posters

  • Test your employees by carrying out mock social engineering attacks
  • Make sure that everyone, including especially founders / exec branch

commits to OPSEC

slide-22
SLIDE 22

Kirils Solovjovs, 22/03/2018 possiblesecurity.com OPSEC and defense against social engineering for devels, execs and start-ups 22/23

Methodological OPSEC tips (2)

  • Discover your vulnerability surface as seen from the outside
  • Carry out or purchase penetration tests
  • Set up technical defenses and countermeasures
  • Manage risk posed by contractors and suppliers
slide-23
SLIDE 23

Kirils Solovjovs, 22/03/2018 possiblesecurity.com OPSEC and defense against social engineering for devels, execs and start-ups 23/23

Q&A

Slides are available on http://kirils.org Find me on twitter: @KirilsSolovjovs