SlideShare a Scribd company logo
1 of 28
Social Engineering and Identity Theft
How to avoid being a victim
Scott Teipe – CISSP, CISM
Manager of Information Security
©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.
Social Engineering and Identity Theft Cases
Frank Abagnale (1969)
• http://en.wikipedia.org/wiki/Frank_Abagnale
Lifelock (2007)
• http://en.wikipedia.org/wiki/Lifelock
HBGary vs. Anonymous (2011)
• http://en.wikipedia.org/wiki/HBGary
Amar Singh (2012)
• http://www.huffingtonpost.com/2012/08/07/largest-id-theft-in-
history_n_1751241.html
Identity Theft Statistics
• One of the most common cybercrimes worldwide!
The 2013 Identity Fraud Report released by Javelin
Strategy & Research indicates:
In 2012 identity fraud incidents increased by
more than one million victims.
Fraudsters stole more than $21 billion, the
highest amount since 2009.
12.6 million victims in the United States in 2012.
1 new victim every 3 seconds!!!
©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.
Identity Theft
Javelin Strategy & Research Report
https://www.javelinstrategy.com/news/1387/92/More-Than-12-Million-Identity-Fraud-Victims-in-2012-
According-to-Latest-Javelin-Strategy-Research-Report/d,pressRoomDetail
©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.
Identity Theft
Once your personal data is obtained, it can be used to:
• Apply for a job
• Charge utilities
• File for bankruptcy
• File fraudulent tax returns
• Open new accounts on your name
• Commit a crime or get into legal trouble
• Drain your checking account and savings
• Go on a spending spree, purchase a car, appliances, services, etc.
©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.
Social Engineering
• Social Engineering - New term for an old
problem: being scammed.
• Exploit Human Nature Weakness
• Desire to Help
• Fear of Authority
• Use of logic(mask a small lie within a
series of true statements)
• Exploit necessities and desires (money,
sex, free services/entertainment, etc.)
• Technical and Non Technical
• Phone, email, trash, face to face
• Target: Your personal information or third
party information for which you have
access.
©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.
Social Engineering Techniques
• Phishing and Spearphishing
• Dumpster Diving
• Be aware of what you throw in the trash. Someone’s trash is someone else’s
treasure.
• Shoulder surfing
• Always check to ensure nobody is peeking over your shoulder when entering security
credentials (PIN, Password, etc)
Some of these techniques allow the attacker to bypass security controls
(passwords, firewalls, etc)
©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.
Scenario 1
• You find a USB key in the parking lot at your workplace, once you plug it in, you
find a program that offer free access to a website in order to watch pirated first-
run movies.
©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.
Scenario 2
• You work in IT support and receive a phone call. The person on the other side of
the line claims to be the new VP of the company and has forgotten his/her
security credentials (pin/password) and asks you to reset their password.
©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.
Strategy
• Awareness and Common Sense
• If its too good to be true…
• Discipline and Education
• If in doubt, look for confirmation
• Efficient use of defensive
technologies
• Proper use, storage and disposal
of your information
©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.
Technology Defense Mechanisms
• Security in depth: Multiple overlapping defenses
• Remember there is no single solution that protects 100% against an attack
• Proactive vs. Reactive
• Firewall, Antivirus, System Patches
• Most Modern operating systems have user friendly security features built-in
• Passwords security
• Data disposal
©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.
Action Center
• Windows 7/8
• Antivirus:
• Win8: Windows Defender
• Win7: Windows security essentials
• Firewall: Windows Firewall
• Patch Management: Windows Update
• Other features:
• Data Privacy/Protection (BitLocker Win7/8)
• Antiphishing (Win8 Windows SmartScreen)
• Family Safety (Win 8)
©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.
Action Center
• Display Important messages
• Windows update: Make sure Windows Update is configured correctly and turned
on!
©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.
Windows Defender
• Antivirus Real time
protection
• Status color coded:
Green, Yellow, Red
©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.
Windows Smart Screen
• Real time protection
against malware
• Offers phishing
protection within IE in
real time.
©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.
Password Security
• Length: 16 or more characters
• Complexity
• Avoid Dictionary words and personally identifiable information
• Change the order - use numbers, symbols then letters.
• Human nature is to use a capital letter then lower case then
numbers and symbols to form a password. Hacking programs
know this!
• Use password generators
• https://www.grc.com/passwords.htm
• http://passwordsgenerator.net/
• Too many passwords? Try a password manager
• Free Password Manager – Keepass
• http://keepass.info/
©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.
Two Factor Authentication
• Offers an extra layer of security
• It requires an additional authentication
factor
• One of the following besides username
and password:
• Something you have: Security token
• Something you know: PIN or pattern
• Something you are: Biometrics like
fingerprint, voice, etc
• Google and Yahoo started offering two
factor authentication as an additional
security feature back in 2011.
©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.
Digital Fingerprints
• Where we are leaving traces of
our lives:
• Social Media (Twitter,
Facebook, LinkedIN, etc)
• Old Devices: Cellphones
• What are we leaving behind:
• Date/Place of birth
• Family Members Information
(Nicknames/Dates/etc)
• Social Security Numbers,
Phone Numbers, etc.
©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.
How to Manage Your Information
• Install a data sanitation utility
and use it to delete any
important and/or personal
information.
• If you are going to
sell/transfer a device wipe the
storage device clean
including the memory card!
• Another excellent protection
is to encrypt your sensitive
information.
©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.
Free Tools for Secure Erase
• Eraser
• http://eraser.heidi.ie/download.php
• Ccleaner
• http://www.piriform.com/ccleaner/download
• File Shredder
• http://www.fileshredder.org/
©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.
Free Tools for Data Wipe
• Secure Erase
• http://cmrr.ucsd.edu/people/Hughes/SecureErase.shtml
• MHDD
• http://hddguru.com/software/2005.10.02-MHDD/
• Hard disk vendors offer utilities to wipe the contents of their HD
• Always wipe the Hard disk before disposing or donating an old computer!!!
• Don’t become a victim of old personal data.
©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.
Free Tools for Data Encryption
• Truecrypt
• http://www.truecrypt.org/
• Safehouse Explorer Encryption
• http://www.safehousesoftware.com/
• Windows 7/8 Bitlocker
• http://windows.microsoft.com/en-
hk/windows7/products/features/bitlocker
Encrypt data on removable storage (USB
thumb drives, SD cards)
©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.
Free Anti-virus
• Avast:
http://www.avast.com/index
• AVG: http://free.avg.com/ww-
en/homepage
• Avira:
http://www.avira.com/en/avira-
free-antivirus
©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.
Email
Basic principles
• Avoid clicking on links contained within e-mail messages.
• Type the webpage into the browser instead of clicking on the link.
• If in doubt, confirm the validity of the e-mail with the sender.
WHY???
• It is very easy for hackers to forge the sender’s identity.
• It is easy to forge the e-mail format to make it look legitimate.
• Clicking on a legitimate looking link may install malicious software without your
consent or knowledge.
©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.
Email
No official UN or HSBC email addresses
Take a look to the header
©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.
Internet Browsing
• Most vulnerabilities require you to click on something within the website to
activate the vulnerability and cause your computer to crash or become very slow.
• Websites make it difficult to choose the right place to click. Often times, buttons
are just images coaxing you to perform an action such as clicking on a link
embedded in an image.
• Critical: keep your browser and computer updated with the latest versions and
patches!!!
©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.
Conclusions
• Be aware, educated and
disciplined.
• Keep it simple (i.e: Just install
the applications that you really
need).
• There are no silver bullets,
having a strategy in
conjunction with the proper
use of technology will help
you to minimize your exposure
to fraud.
©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.
Questions??

More Related Content

Similar to Social Engineering and Identity Theft.pptx

Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security PracticeBrian Pichman
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital SecurityUjjwal Acharya
 
Executive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdfExecutive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdfTechSoup
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security InnovationPriyanka Aash
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online PrivacyKazi Sarwar Hossain
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & securityPriyab Satoshi
 
Security Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Innovation
 
Security best practices for regular users
Security best practices for regular usersSecurity best practices for regular users
Security best practices for regular usersGeoffrey Vaughan
 
2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-securityStephen Cobb
 
CyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdfCyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdfVarinder K
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security SeminarJeremy Quadri
 
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19TechSoup
 
5 Cybersecurity Threats Your Business Can't Afford to Ignore
5 Cybersecurity Threats Your Business Can't Afford to Ignore5 Cybersecurity Threats Your Business Can't Afford to Ignore
5 Cybersecurity Threats Your Business Can't Afford to IgnoreWSI WebAnalys
 
Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01Kenneth Carnesi, JD
 
Information Security Awareness Orientation
Information Security Awareness OrientationInformation Security Awareness Orientation
Information Security Awareness Orientationmohannadalhanahnah
 

Similar to Social Engineering and Identity Theft.pptx (20)

Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital Security
 
Executive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdfExecutive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdf
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
Security Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Best Practices for Regular Users
Security Best Practices for Regular Users
 
Security best practices for regular users
Security best practices for regular usersSecurity best practices for regular users
Security best practices for regular users
 
Grant 2011.0918
Grant 2011.0918Grant 2011.0918
Grant 2011.0918
 
2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
CyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdfCyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdf
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
 
Judy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 PresentationJudy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 Presentation
 
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
 
Personal Threat Models
Personal Threat ModelsPersonal Threat Models
Personal Threat Models
 
5 Cybersecurity Threats Your Business Can't Afford to Ignore
5 Cybersecurity Threats Your Business Can't Afford to Ignore5 Cybersecurity Threats Your Business Can't Afford to Ignore
5 Cybersecurity Threats Your Business Can't Afford to Ignore
 
Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01
 
Information Security Awareness Orientation
Information Security Awareness OrientationInformation Security Awareness Orientation
Information Security Awareness Orientation
 

More from Roshni814224

Business Information Systems in firms.pptx
Business Information Systems in firms.pptxBusiness Information Systems in firms.pptx
Business Information Systems in firms.pptxRoshni814224
 
Strategic Information System in Business Firm.ppt
Strategic Information System in Business Firm.pptStrategic Information System in Business Firm.ppt
Strategic Information System in Business Firm.pptRoshni814224
 
Management Information System Applications.pptx
Management Information System Applications.pptxManagement Information System Applications.pptx
Management Information System Applications.pptxRoshni814224
 
The Concepts of Internet and Networking.pptx
The Concepts of Internet and Networking.pptxThe Concepts of Internet and Networking.pptx
The Concepts of Internet and Networking.pptxRoshni814224
 
Integrity Constraints in Database Management System.ppt
Integrity Constraints in Database Management System.pptIntegrity Constraints in Database Management System.ppt
Integrity Constraints in Database Management System.pptRoshni814224
 
Data models in Database Management Systems.ppt
Data models in Database Management Systems.pptData models in Database Management Systems.ppt
Data models in Database Management Systems.pptRoshni814224
 
Transaction Management, Recovery and Query Processing.pptx
Transaction Management, Recovery and Query Processing.pptxTransaction Management, Recovery and Query Processing.pptx
Transaction Management, Recovery and Query Processing.pptxRoshni814224
 
Computer System Software Component Details.pptx
Computer System Software Component Details.pptxComputer System Software Component Details.pptx
Computer System Software Component Details.pptxRoshni814224
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxRoshni814224
 
Information Systems, Organizations and Strategy.pptx
Information Systems, Organizations and Strategy.pptxInformation Systems, Organizations and Strategy.pptx
Information Systems, Organizations and Strategy.pptxRoshni814224
 
Information Systems in Global Business Today.pptx
Information Systems in Global Business Today.pptxInformation Systems in Global Business Today.pptx
Information Systems in Global Business Today.pptxRoshni814224
 
Applications of Management Information System.pptx
Applications of Management Information System.pptxApplications of Management Information System.pptx
Applications of Management Information System.pptxRoshni814224
 
Securing Management Information Systems.ppt
Securing Management Information Systems.pptSecuring Management Information Systems.ppt
Securing Management Information Systems.pptRoshni814224
 
relational model in Database Management.ppt.ppt
relational model in Database Management.ppt.pptrelational model in Database Management.ppt.ppt
relational model in Database Management.ppt.pptRoshni814224
 
Database Management System Security.pptx
Database Management System  Security.pptxDatabase Management System  Security.pptx
Database Management System Security.pptxRoshni814224
 
Normalization in Database Management System.pptx
Normalization in Database Management System.pptxNormalization in Database Management System.pptx
Normalization in Database Management System.pptxRoshni814224
 
Introduction to Database Management System.ppt
Introduction to Database Management System.pptIntroduction to Database Management System.ppt
Introduction to Database Management System.pptRoshni814224
 
Computer system Hardware components.pptx
Computer system Hardware components.pptxComputer system Hardware components.pptx
Computer system Hardware components.pptxRoshni814224
 
Foundation of Business Intelligence for Business Firms .ppt
Foundation of Business Intelligence for Business Firms .pptFoundation of Business Intelligence for Business Firms .ppt
Foundation of Business Intelligence for Business Firms .pptRoshni814224
 
Global e-Business and Decision Support System.pptx
Global e-Business and Decision Support System.pptxGlobal e-Business and Decision Support System.pptx
Global e-Business and Decision Support System.pptxRoshni814224
 

More from Roshni814224 (20)

Business Information Systems in firms.pptx
Business Information Systems in firms.pptxBusiness Information Systems in firms.pptx
Business Information Systems in firms.pptx
 
Strategic Information System in Business Firm.ppt
Strategic Information System in Business Firm.pptStrategic Information System in Business Firm.ppt
Strategic Information System in Business Firm.ppt
 
Management Information System Applications.pptx
Management Information System Applications.pptxManagement Information System Applications.pptx
Management Information System Applications.pptx
 
The Concepts of Internet and Networking.pptx
The Concepts of Internet and Networking.pptxThe Concepts of Internet and Networking.pptx
The Concepts of Internet and Networking.pptx
 
Integrity Constraints in Database Management System.ppt
Integrity Constraints in Database Management System.pptIntegrity Constraints in Database Management System.ppt
Integrity Constraints in Database Management System.ppt
 
Data models in Database Management Systems.ppt
Data models in Database Management Systems.pptData models in Database Management Systems.ppt
Data models in Database Management Systems.ppt
 
Transaction Management, Recovery and Query Processing.pptx
Transaction Management, Recovery and Query Processing.pptxTransaction Management, Recovery and Query Processing.pptx
Transaction Management, Recovery and Query Processing.pptx
 
Computer System Software Component Details.pptx
Computer System Software Component Details.pptxComputer System Software Component Details.pptx
Computer System Software Component Details.pptx
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
 
Information Systems, Organizations and Strategy.pptx
Information Systems, Organizations and Strategy.pptxInformation Systems, Organizations and Strategy.pptx
Information Systems, Organizations and Strategy.pptx
 
Information Systems in Global Business Today.pptx
Information Systems in Global Business Today.pptxInformation Systems in Global Business Today.pptx
Information Systems in Global Business Today.pptx
 
Applications of Management Information System.pptx
Applications of Management Information System.pptxApplications of Management Information System.pptx
Applications of Management Information System.pptx
 
Securing Management Information Systems.ppt
Securing Management Information Systems.pptSecuring Management Information Systems.ppt
Securing Management Information Systems.ppt
 
relational model in Database Management.ppt.ppt
relational model in Database Management.ppt.pptrelational model in Database Management.ppt.ppt
relational model in Database Management.ppt.ppt
 
Database Management System Security.pptx
Database Management System  Security.pptxDatabase Management System  Security.pptx
Database Management System Security.pptx
 
Normalization in Database Management System.pptx
Normalization in Database Management System.pptxNormalization in Database Management System.pptx
Normalization in Database Management System.pptx
 
Introduction to Database Management System.ppt
Introduction to Database Management System.pptIntroduction to Database Management System.ppt
Introduction to Database Management System.ppt
 
Computer system Hardware components.pptx
Computer system Hardware components.pptxComputer system Hardware components.pptx
Computer system Hardware components.pptx
 
Foundation of Business Intelligence for Business Firms .ppt
Foundation of Business Intelligence for Business Firms .pptFoundation of Business Intelligence for Business Firms .ppt
Foundation of Business Intelligence for Business Firms .ppt
 
Global e-Business and Decision Support System.pptx
Global e-Business and Decision Support System.pptxGlobal e-Business and Decision Support System.pptx
Global e-Business and Decision Support System.pptx
 

Recently uploaded

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 

Recently uploaded (20)

Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 

Social Engineering and Identity Theft.pptx

  • 1. Social Engineering and Identity Theft How to avoid being a victim Scott Teipe – CISSP, CISM Manager of Information Security
  • 2. ©2011 Gogo Inc. and Affiliates. Proprietary & Confidential. Social Engineering and Identity Theft Cases Frank Abagnale (1969) • http://en.wikipedia.org/wiki/Frank_Abagnale Lifelock (2007) • http://en.wikipedia.org/wiki/Lifelock HBGary vs. Anonymous (2011) • http://en.wikipedia.org/wiki/HBGary Amar Singh (2012) • http://www.huffingtonpost.com/2012/08/07/largest-id-theft-in- history_n_1751241.html
  • 3. Identity Theft Statistics • One of the most common cybercrimes worldwide! The 2013 Identity Fraud Report released by Javelin Strategy & Research indicates: In 2012 identity fraud incidents increased by more than one million victims. Fraudsters stole more than $21 billion, the highest amount since 2009. 12.6 million victims in the United States in 2012. 1 new victim every 3 seconds!!!
  • 4. ©2011 Gogo Inc. and Affiliates. Proprietary & Confidential. Identity Theft Javelin Strategy & Research Report https://www.javelinstrategy.com/news/1387/92/More-Than-12-Million-Identity-Fraud-Victims-in-2012- According-to-Latest-Javelin-Strategy-Research-Report/d,pressRoomDetail
  • 5. ©2011 Gogo Inc. and Affiliates. Proprietary & Confidential. Identity Theft Once your personal data is obtained, it can be used to: • Apply for a job • Charge utilities • File for bankruptcy • File fraudulent tax returns • Open new accounts on your name • Commit a crime or get into legal trouble • Drain your checking account and savings • Go on a spending spree, purchase a car, appliances, services, etc.
  • 6. ©2011 Gogo Inc. and Affiliates. Proprietary & Confidential. Social Engineering • Social Engineering - New term for an old problem: being scammed. • Exploit Human Nature Weakness • Desire to Help • Fear of Authority • Use of logic(mask a small lie within a series of true statements) • Exploit necessities and desires (money, sex, free services/entertainment, etc.) • Technical and Non Technical • Phone, email, trash, face to face • Target: Your personal information or third party information for which you have access.
  • 7. ©2011 Gogo Inc. and Affiliates. Proprietary & Confidential. Social Engineering Techniques • Phishing and Spearphishing • Dumpster Diving • Be aware of what you throw in the trash. Someone’s trash is someone else’s treasure. • Shoulder surfing • Always check to ensure nobody is peeking over your shoulder when entering security credentials (PIN, Password, etc) Some of these techniques allow the attacker to bypass security controls (passwords, firewalls, etc)
  • 8. ©2011 Gogo Inc. and Affiliates. Proprietary & Confidential. Scenario 1 • You find a USB key in the parking lot at your workplace, once you plug it in, you find a program that offer free access to a website in order to watch pirated first- run movies.
  • 9. ©2011 Gogo Inc. and Affiliates. Proprietary & Confidential. Scenario 2 • You work in IT support and receive a phone call. The person on the other side of the line claims to be the new VP of the company and has forgotten his/her security credentials (pin/password) and asks you to reset their password.
  • 10. ©2011 Gogo Inc. and Affiliates. Proprietary & Confidential. Strategy • Awareness and Common Sense • If its too good to be true… • Discipline and Education • If in doubt, look for confirmation • Efficient use of defensive technologies • Proper use, storage and disposal of your information
  • 11. ©2011 Gogo Inc. and Affiliates. Proprietary & Confidential. Technology Defense Mechanisms • Security in depth: Multiple overlapping defenses • Remember there is no single solution that protects 100% against an attack • Proactive vs. Reactive • Firewall, Antivirus, System Patches • Most Modern operating systems have user friendly security features built-in • Passwords security • Data disposal
  • 12. ©2011 Gogo Inc. and Affiliates. Proprietary & Confidential. Action Center • Windows 7/8 • Antivirus: • Win8: Windows Defender • Win7: Windows security essentials • Firewall: Windows Firewall • Patch Management: Windows Update • Other features: • Data Privacy/Protection (BitLocker Win7/8) • Antiphishing (Win8 Windows SmartScreen) • Family Safety (Win 8)
  • 13. ©2011 Gogo Inc. and Affiliates. Proprietary & Confidential. Action Center • Display Important messages • Windows update: Make sure Windows Update is configured correctly and turned on!
  • 14. ©2011 Gogo Inc. and Affiliates. Proprietary & Confidential. Windows Defender • Antivirus Real time protection • Status color coded: Green, Yellow, Red
  • 15. ©2011 Gogo Inc. and Affiliates. Proprietary & Confidential. Windows Smart Screen • Real time protection against malware • Offers phishing protection within IE in real time.
  • 16. ©2011 Gogo Inc. and Affiliates. Proprietary & Confidential. Password Security • Length: 16 or more characters • Complexity • Avoid Dictionary words and personally identifiable information • Change the order - use numbers, symbols then letters. • Human nature is to use a capital letter then lower case then numbers and symbols to form a password. Hacking programs know this! • Use password generators • https://www.grc.com/passwords.htm • http://passwordsgenerator.net/ • Too many passwords? Try a password manager • Free Password Manager – Keepass • http://keepass.info/
  • 17. ©2011 Gogo Inc. and Affiliates. Proprietary & Confidential. Two Factor Authentication • Offers an extra layer of security • It requires an additional authentication factor • One of the following besides username and password: • Something you have: Security token • Something you know: PIN or pattern • Something you are: Biometrics like fingerprint, voice, etc • Google and Yahoo started offering two factor authentication as an additional security feature back in 2011.
  • 18. ©2011 Gogo Inc. and Affiliates. Proprietary & Confidential. Digital Fingerprints • Where we are leaving traces of our lives: • Social Media (Twitter, Facebook, LinkedIN, etc) • Old Devices: Cellphones • What are we leaving behind: • Date/Place of birth • Family Members Information (Nicknames/Dates/etc) • Social Security Numbers, Phone Numbers, etc.
  • 19. ©2011 Gogo Inc. and Affiliates. Proprietary & Confidential. How to Manage Your Information • Install a data sanitation utility and use it to delete any important and/or personal information. • If you are going to sell/transfer a device wipe the storage device clean including the memory card! • Another excellent protection is to encrypt your sensitive information.
  • 20. ©2011 Gogo Inc. and Affiliates. Proprietary & Confidential. Free Tools for Secure Erase • Eraser • http://eraser.heidi.ie/download.php • Ccleaner • http://www.piriform.com/ccleaner/download • File Shredder • http://www.fileshredder.org/
  • 21. ©2011 Gogo Inc. and Affiliates. Proprietary & Confidential. Free Tools for Data Wipe • Secure Erase • http://cmrr.ucsd.edu/people/Hughes/SecureErase.shtml • MHDD • http://hddguru.com/software/2005.10.02-MHDD/ • Hard disk vendors offer utilities to wipe the contents of their HD • Always wipe the Hard disk before disposing or donating an old computer!!! • Don’t become a victim of old personal data.
  • 22. ©2011 Gogo Inc. and Affiliates. Proprietary & Confidential. Free Tools for Data Encryption • Truecrypt • http://www.truecrypt.org/ • Safehouse Explorer Encryption • http://www.safehousesoftware.com/ • Windows 7/8 Bitlocker • http://windows.microsoft.com/en- hk/windows7/products/features/bitlocker Encrypt data on removable storage (USB thumb drives, SD cards)
  • 23. ©2011 Gogo Inc. and Affiliates. Proprietary & Confidential. Free Anti-virus • Avast: http://www.avast.com/index • AVG: http://free.avg.com/ww- en/homepage • Avira: http://www.avira.com/en/avira- free-antivirus
  • 24. ©2011 Gogo Inc. and Affiliates. Proprietary & Confidential. Email Basic principles • Avoid clicking on links contained within e-mail messages. • Type the webpage into the browser instead of clicking on the link. • If in doubt, confirm the validity of the e-mail with the sender. WHY??? • It is very easy for hackers to forge the sender’s identity. • It is easy to forge the e-mail format to make it look legitimate. • Clicking on a legitimate looking link may install malicious software without your consent or knowledge.
  • 25. ©2011 Gogo Inc. and Affiliates. Proprietary & Confidential. Email No official UN or HSBC email addresses Take a look to the header
  • 26. ©2011 Gogo Inc. and Affiliates. Proprietary & Confidential. Internet Browsing • Most vulnerabilities require you to click on something within the website to activate the vulnerability and cause your computer to crash or become very slow. • Websites make it difficult to choose the right place to click. Often times, buttons are just images coaxing you to perform an action such as clicking on a link embedded in an image. • Critical: keep your browser and computer updated with the latest versions and patches!!!
  • 27. ©2011 Gogo Inc. and Affiliates. Proprietary & Confidential. Conclusions • Be aware, educated and disciplined. • Keep it simple (i.e: Just install the applications that you really need). • There are no silver bullets, having a strategy in conjunction with the proper use of technology will help you to minimize your exposure to fraud.
  • 28. ©2011 Gogo Inc. and Affiliates. Proprietary & Confidential. Questions??