Justin Lee
   Me
     Information Technology
     Senior, graduating Spring 12


   Information or Technology?

   Who thinks it’s too early?
   Reasons Chronologically
     Friendly greeting
     Shared personal information
     Presented a favorable option
     I asked for “help”
     Peer Pressure?
   What is it?
     Utilizing social factors to obtain desirables
      ▪ Manipulation

   When is it used?
     All the time!
   Antecedent
     Altruism


   Behavior
     Not your own, or is it?
      ▪ You choose to engage to their will

   Consequence
     The point to social engineering!
   Neither and Both
     Social Engineering is a method


   Babies use it and you do too!

   Hackers also use it…
   Value of information
   Dependence
   Lack of education
   Phishing Scams

   Pretexting

   Actually…
     From anyone that asks
   Awareness

   Common Sense

   Control
     Do you want to share
     just any information?
What color is this?




Justin Lee                         Red or Orange?




                                        Blue or Purple?
   To distinguish mentally; recognize as
    distinct or different

   Requires awareness
     And a little bit of thinking
   Incentives to comply
     Distractions entertain
      ▪ Those puppies could be MO’s
     Compliments reinforce behavior
   Questions




   Clarifications

EAB Ignite Presentation

  • 1.
  • 2.
    Me  Information Technology  Senior, graduating Spring 12  Information or Technology?  Who thinks it’s too early?
  • 4.
    Reasons Chronologically  Friendly greeting  Shared personal information  Presented a favorable option  I asked for “help”  Peer Pressure?
  • 5.
    What is it?  Utilizing social factors to obtain desirables ▪ Manipulation  When is it used?  All the time!
  • 7.
    Antecedent  Altruism  Behavior  Not your own, or is it? ▪ You choose to engage to their will  Consequence  The point to social engineering!
  • 10.
    Neither and Both  Social Engineering is a method  Babies use it and you do too!  Hackers also use it…
  • 12.
    Value of information  Dependence  Lack of education
  • 13.
    Phishing Scams  Pretexting  Actually…  From anyone that asks
  • 14.
    Awareness  Common Sense  Control  Do you want to share just any information?
  • 16.
    What color isthis? Justin Lee Red or Orange? Blue or Purple?
  • 17.
    To distinguish mentally; recognize as distinct or different  Requires awareness  And a little bit of thinking
  • 19.
    Incentives to comply  Distractions entertain ▪ Those puppies could be MO’s  Compliments reinforce behavior
  • 20.
    Questions  Clarifications

Editor's Notes

  • #2 Greet class, ask how everyone is doing.
  • #3 Talk about self briefly
  • #4 Ask for class to help by getting up and stretching. Increase alertness.
  • #5 Inquire as to why anyone “helped” me out.
  • #6 Explain what just happened. Elaborate on the topic of discussion.
  • #7 Social Engineering is about people, HUMAN RESOURCES!
  • #8 Applying the ABC’s of behavior analysis
  • #9 Impact of consequences, what it means to social engineer and be socially engineered
  • #10 Behavioral impacts of social engineering
  • #11 Social Engineering in ethical terms
  • #12 Social Engineering and Security
  • #13 Elaborate reasons for the effectiveness of social engineering
  • #14 Phishing Scams- don’t give out information without confirming authenticity. I used the presentation as a pretext to social engineer
  • #15 Keep information secure and have a defense against compromises
  • #16 Most people don’t get phished because they can tell it’s a trap = ideal behavior
  • #17 What colors do you see? Ambiguous stimuli, difficulty to see through threats
  • #18 It’s like watching out for traffic, look out!
  • #19 Look for anything suspicious in order to prevent malignant social engineering
  • #20 Don’t fall victim to Puppies! I mean appeals.
  • #21 Finish strong, hold interest until the end