Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Social engineering
Old school It's all about the money <ul><li>Hustling
Scams
Example </li></ul>
Psychology of scams “cognitive and motivational processes” <ul><li>trust and authority
visceral  triggers </li><ul><li>human desires and needs
greed, fear, avoidance of physical pain, or the desire to be liked </li></ul></ul>Go here for full story
Inducing judgement errors <ul><li>Scarcity cues </li><ul><li>Unique opportunity </li></ul><li>Induction of behavioural com...
Lack of emotional control </li><ul><li>A psychological trait of victims  </li></ul></ul>
Examples Who needs spam, when we have this link http://www.urbanmillionaires.com/ Question: <ul><li>Is it true? Is it trus...
Puts words on it from the previous slides. </li><ul><li>Still think it is trust worthy? </li></ul></ul>
Examples Emotional distress steal a womans hand bag Question: <ul><li>Is this possible?
Is she gullible? </li></ul>
Still old school <ul><li>Gaining access to places you are not allowed </li><ul><li>http://www.youtube.com/watch?v=kOEWd_M5...
Relation to security <ul><li>No security with physical access
Why go through the firewall, if you may walk past? </li></ul>
People on the move Steal the laptop (covertly) http://www.youtube.com/watch?v=Gb3ZiTJkCaA&feature=related
Upcoming SlideShare
Loading in …5
×

Itet2 its social engineering

410 views

Published on

Published in: Technology, News & Politics
  • Be the first to comment

  • Be the first to like this

Itet2 its social engineering

  1. 1. Social engineering
  2. 2. Old school It's all about the money <ul><li>Hustling
  3. 3. Scams
  4. 4. Example </li></ul>
  5. 5. Psychology of scams “cognitive and motivational processes” <ul><li>trust and authority
  6. 6. visceral triggers </li><ul><li>human desires and needs
  7. 7. greed, fear, avoidance of physical pain, or the desire to be liked </li></ul></ul>Go here for full story
  8. 8. Inducing judgement errors <ul><li>Scarcity cues </li><ul><li>Unique opportunity </li></ul><li>Induction of behavioural commitment </li><ul><li>Start small and get them rolling </li></ul><li>Extreme cost/benefit
  9. 9. Lack of emotional control </li><ul><li>A psychological trait of victims </li></ul></ul>
  10. 10. Examples Who needs spam, when we have this link http://www.urbanmillionaires.com/ Question: <ul><li>Is it true? Is it trustworthy?
  11. 11. Puts words on it from the previous slides. </li><ul><li>Still think it is trust worthy? </li></ul></ul>
  12. 12. Examples Emotional distress steal a womans hand bag Question: <ul><li>Is this possible?
  13. 13. Is she gullible? </li></ul>
  14. 14. Still old school <ul><li>Gaining access to places you are not allowed </li><ul><li>http://www.youtube.com/watch?v=kOEWd_M5m44 </li></ul><li>The secret: </li><ul><li>Look as if you belong. </li></ul></ul>
  15. 15. Relation to security <ul><li>No security with physical access
  16. 16. Why go through the firewall, if you may walk past? </li></ul>
  17. 17. People on the move Steal the laptop (covertly) http://www.youtube.com/watch?v=Gb3ZiTJkCaA&feature=related
  18. 18. People on the move Use their telephones against them <ul><li>for profit
  19. 19. reading the calendar, mails, SMS
  20. 20. As a bug </li></ul>
  21. 21. People on the move Wifi design vulnerabilities for profit Is this possible?
  22. 22. People on the move <ul><li>Mobile IT </li><ul><li>A security nightmare
  23. 23. Too many variables </li></ul></ul>Is this ok to use? Could it be fake?
  24. 24. People at the office <ul><li>Make them tell you their passwords. </li><ul><li>Teachers recurring story – this time with an external reference....
  25. 25. from the BBC </li></ul></ul>Question: <ul><li>Is this realistic? In Denmark? </li></ul>
  26. 26. People at the office Listen in on their keyboards please type something secret. Question <ul><li>Is this realistic?
  27. 27. Why is this more difficult than it seems? What has been left out? </li></ul>
  28. 28. People at the office <ul><li>Spam </li><ul><li>Check your mailbox </li></ul></ul>
  29. 29. People at the office <ul><li>Receptionists are a crucial part of security
  30. 30. Educate people </li><ul><li>Like this? </li></ul></ul>
  31. 31. Closing word Which on to use? Technical vs. social Answer: Both To read more, see this

×