1
Social Engineering
CS 334 - Computer Security
Thanks to: The late Dr. Yosef Sherif, unknown colleague at UW-Madison, Mathew Sullivan at Iowa State, Tanya
- L. Crenshaw at U. Portland, various
- ther colleagues and contributors
Social Engineering CS 334 - Computer Security Thanks to: The late - - PowerPoint PPT Presentation
Social Engineering CS 334 - Computer Security Thanks to: The late Dr. Yosef Sherif, unknown colleague at UW-Madison, Mathew Sullivan at Iowa State, Tanya L. Crenshaw at U. Portland, various other colleagues and contributors 1 Social
1
2
3
4
¨ The end user is usually the weakest link of a system
¤ People are often lazy, ignorant to security, or simply
¨ Social engineering is a journey into social
¤ Yes I know, that probably doesn’t sound very fun ¤ Well guess what… it is, so deal with it!
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
¨ A number of variables influence the persuasion
¤ The Communicator (Who?) ¤ The Message (What?) ¤ The Audience (Whom?) ¤ The Channel (How?)
¨ For now, let’s focus on “The Communicator”
¨ The Communicator (Who?):
¤ Credibility ¤ Expertise ¤ Trustworthiness ¤ Attractiveness
¨ Credibility: “The Milgram Experiment”
white lab coat
¨ Credibility: “The Milgram Experiment”
¤ The “assistant” will give electric shocks in increasing
¤ The “test subject” is actually an actor and is not really
¨ Credibility: “The Milgram Experiment”
¤ After a few shocks, “test subject” actor begins yelling in
¤ “assistant” members would ask the man in the white coat
n By the time the 450-volt switch is reached, the actor has
¨ So what’s the moral of the story?
¤ Most people will obey the man in the white coat ¤ In social engineering, creating the aura of an authority
¨ The Communicator (Who?):
¤ Credibility ¤ Expertise ¤ Trustworthiness ¤ Attractiveness
Source: http://en.wikipedia.org/wiki/Social_psychology_(psychology)
Source: "Gender pairing bias in trustworthiness" from Journal of Socio-Economics, Volume 38, Issue 5, October 2009, Pages 779-789
¨ I bet you are thinking, “That wouldn’t happen to me, I
¤ Oh really? Don’t be so sure! Social Engineers have a
¤ It’s easy for you to say you wouldn’t be fooled, because
n This bias is called illusory superiority n Causes people to overestimate their positive qualities and
¨ Amazing statistics, for your enjoyment:
¤ In a 2003 information security survey, 90% of office
¤ In another study, 70% of people claimed they would
¤ 34% of respondents volunteered their password when
* Researchers made no attempt to validate the passwords Source: http://news.bbc.co.uk/1/hi/technology/3639679.stm
43
44
45
46
47
48
49
50
51
52
help
pretending to assist the user
53
54
55
56
57
58
59
60
Source: http://ils.unc.edu/~neubanks/inls187/home/fugitive.html
¨ In 1981, at the age of 17, Mitnick and his gang of
¨ In broad daylight on a Saturday, the group talked their
¨ From that room, the gang lifted combination lock codes
Source :http://www.takedown.com/bio/mitnick.html
¨ To ensure continued access, they placed fake names and
¤ Take-home point: hackers always leave a way back in
¨ A manager soon realized the names were fraudulent and
¤ Take-home point: don’t tell your girlfriend about your crime
Source :http://www.takedown.com/bio/mitnick.html
64
65
66
67