SlideShare a Scribd company logo
1 of 13
RIZIQ RAMADANI
System Engineer & IT Operations Supports
PT. Sinergi Insani Primanet
WHAT IS
SOCIAL
ENGINEERING ?
Social Engineering
Social engineering, in the context of
information security, refers to
psychological manipulation of people
into performing actions or divulging
confidential information. This differs
from social engineering within the
social sciences, which does not contain
the divulging of confidential
information. A type of confidence trick
for the purpose of information
gathering, fraud, or system access, it
differs from a traditional "con" in that
it is often one of many steps in a more
complex fraud scheme.
It has also been defined as "any act
that influences a person to take an
action that may or may not be in their
INFORMATION SECURITY
CULTURE
Implementation:
They are commitment of
the management,
communication with
organizational members,
courses for all
organizational members,
and commitment of the
employees.
Pre-
Evaluation:
to identify the
awareness of
information.
Strategic
Planning:
Clustering
people is
helpful to
achieve it.
Operative
Planning:
we can set a good
security culture based
on internal
communication,
management-buy-in,
and security
awareness and
training program.
Shared patterns of thought, behavior, and values within a social group
TECHNIQUES AND TERMS
• All social engineering techniques are based on specific
attributes of human decision-making known as cognitive
biases. These biases, sometimes called "bugs in the
human hardware", are exploited in various combinations
to create attack techniques, some of which are listed
below.
• The attacks used in social engineering can be used to steal
employees' confidential information.
The most common type of social engineering happens
over the phone.
• Other examples of social engineering attacks are criminals
posing as exterminators, fire marshals and technicians to
go unnoticed as they steal company secrets.
One example of social engineering is an individual who walks into a
building and posts an official-looking announcement to the
company bulletin that says the number for the help desk has
changed.
SIX KEY
PRINCIPLES
RECIPROCITY – People tend to return a favor,
thus the pervasiveness of free samples in
marketing.
The good cop/bad cop strategy is also based on
this principle.
COMMITMENT AND CONSISTENCY – If people
commit, orally or in writing, to an idea or goal,
they are more likely to honor that commitment
because of establishing that idea or goal as
being congruent with their self-image. Even if
the original incentive or motivation is removed
after they have already agreed, they will continue
to honor the agreement.
SOCIAL PROOF – People will do things that they see other people are doing.
AUTHORITY – People will tend to obey authority figures, even if they are asked to perform
objectionable acts.
LIKING – People are easily persuaded by other people that they like.
SCARCITY – Perceived scarcity will generate demand. For example, saying offers are available for a
"limited time only" encourages sales.
FOUR SOCIAL ENGINEERING
VECTORS
Vishing
•Vishing, otherwise known as "voice phishing", is the criminal practice of using social
engineering over the telephone system to gain access to private personal and financial
information from the public for the purpose of financial reward.
Phishing
•Phishing is a technique of fraudulently obtaining private information. Typically, the
phisher sends an e-mail that appears to come from a legitimate business—a bank, or
credit card company—requesting "verification" of information and warning of some dire
consequence if it is not provided
Smishing
•The act of using SMS text messaging to lure victims into a specific course of action. Like
Phishing it can be clicking on a malicious link or divulging information.
Impersonation
•Pretending or pretexting to be another person with the goal of gaining access physically to
a system or building.
NOTABLE SOCIAL
ENGINEERS
Kevin Mitnick
Kevin Mitnick is an American computer security consultant, author and
hacker, best known for his high-profile 1995 arrest and later five year
conviction for various computer and communications-related crimes.
Susan Headley
Susan Headley was an American hacker active during the late 1970s and
early 1980s widely respected for her expertise in social engineering,
pretexting, and psychological subversion.
She was known for her specialty in breaking into military computer
systems, which often involved going to bed with military personnel and
going through their clothes for usernames and passwords while they slept
Badir Brothers
Brothers Ramy, Muzher, and Shadde Badir—all of whom were blind from
birth—managed to set up an extensive phone and computer fraud scheme
in Israel in the 1990s using social engineering, voice impersonation, and
Braille-display computers.
LA
W
Pretexting of telephone records
In December 2006, United States Congress
approved a Senate sponsored bill making the
pretexting of telephone records a federal felony
with fines of up to $250,000 and ten years in
prison for individuals (or fines of up to $500,000
for companies).
It was signed by President George W. Bush on 12
January 2007.
HP
Patricia Dunn, former chairwoman of Hewlett
Packard, reported that the HP board hired a
private investigation company to delve into who
was responsible for leaks within the board. Dunn
acknowledged that the company used the practice
of pretexting to solicit the telephone records of
board members and journalists.
IN POPULAR CULTURE
In the movie The Thomas Crown Affair, one of the characters poses over the
telephone as a museum guard's superior in order to move the guard away from his
post.
In the movie Live Free or Die Hard, Justin Long is seen pretexting that his father is
dying from a heart attack to have an On-Star Assist representative start what will
become a stolen car.
In the TV show Mr. Robot, Darlene scatters USB flash drives (containing malware)
outside a prison entrance, baiting a curious guard into compromising the prison's
internal network when he plugs one of the drives into his computer workstation.
In the movie Who Am I, the main characters are seen using various social engineering
THANK YOU

More Related Content

Similar to Social Engineering by Riziq Ramadani

Social Engineering - Enterprise Phishing.pptx
Social Engineering - Enterprise Phishing.pptxSocial Engineering - Enterprise Phishing.pptx
Social Engineering - Enterprise Phishing.pptxDaniel Gorita
 
Module 3 social engineering-b
Module 3   social engineering-bModule 3   social engineering-b
Module 3 social engineering-bBbAOC
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptCakraWicaksono3
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptpixvilx
 
International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxchrixymae
 
Benefits of Regular Social Engineering Services - Aardwolf Security
Benefits of Regular Social Engineering Services - Aardwolf SecurityBenefits of Regular Social Engineering Services - Aardwolf Security
Benefits of Regular Social Engineering Services - Aardwolf SecurityAardwolf Security
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentationpooja_doshi
 
Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?JamRivera1
 
Social Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageSocial Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageMarin Ivezic
 
Social engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekarSocial engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekarRaghunath G
 
Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...Dave Holland
 
Digital defamation presentation
Digital defamation presentationDigital defamation presentation
Digital defamation presentationMelfi Associates
 
Employee Monitoring DiscussionKindly discuss in 100 words wh
Employee Monitoring DiscussionKindly discuss in 100 words whEmployee Monitoring DiscussionKindly discuss in 100 words wh
Employee Monitoring DiscussionKindly discuss in 100 words whTanaMaeskm
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering OWASP Foundation
 
Types of Social engineering
Types of Social engineeringTypes of Social engineering
Types of Social engineeringRiddhi Sood
 
Unlocking the Hidden Potential
Unlocking the Hidden PotentialUnlocking the Hidden Potential
Unlocking the Hidden PotentialEricaCiko
 
White Paper: Social Engineering and Cyber Attacks: The Psychology of Deception
White Paper: Social Engineering and Cyber Attacks: The Psychology of DeceptionWhite Paper: Social Engineering and Cyber Attacks: The Psychology of Deception
White Paper: Social Engineering and Cyber Attacks: The Psychology of DeceptionEMC
 
computer law.pptx
computer law.pptxcomputer law.pptx
computer law.pptxMouradAKenk
 
Living in the IT Era - Lesson 5.pptx
Living in the IT Era - Lesson 5.pptxLiving in the IT Era - Lesson 5.pptx
Living in the IT Era - Lesson 5.pptxFroilan Cantillo
 

Similar to Social Engineering by Riziq Ramadani (20)

Social Engineering - Enterprise Phishing.pptx
Social Engineering - Enterprise Phishing.pptxSocial Engineering - Enterprise Phishing.pptx
Social Engineering - Enterprise Phishing.pptx
 
Module 3 social engineering-b
Module 3   social engineering-bModule 3   social engineering-b
Module 3 social engineering-b
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
 
International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptx
 
Benefits of Regular Social Engineering Services - Aardwolf Security
Benefits of Regular Social Engineering Services - Aardwolf SecurityBenefits of Regular Social Engineering Services - Aardwolf Security
Benefits of Regular Social Engineering Services - Aardwolf Security
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
 
Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?
 
Social Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageSocial Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionage
 
Social engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekarSocial engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekar
 
Social Engineering Techniques - The Dark Arts
Social Engineering Techniques - The Dark ArtsSocial Engineering Techniques - The Dark Arts
Social Engineering Techniques - The Dark Arts
 
Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...
 
Digital defamation presentation
Digital defamation presentationDigital defamation presentation
Digital defamation presentation
 
Employee Monitoring DiscussionKindly discuss in 100 words wh
Employee Monitoring DiscussionKindly discuss in 100 words whEmployee Monitoring DiscussionKindly discuss in 100 words wh
Employee Monitoring DiscussionKindly discuss in 100 words wh
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering
 
Types of Social engineering
Types of Social engineeringTypes of Social engineering
Types of Social engineering
 
Unlocking the Hidden Potential
Unlocking the Hidden PotentialUnlocking the Hidden Potential
Unlocking the Hidden Potential
 
White Paper: Social Engineering and Cyber Attacks: The Psychology of Deception
White Paper: Social Engineering and Cyber Attacks: The Psychology of DeceptionWhite Paper: Social Engineering and Cyber Attacks: The Psychology of Deception
White Paper: Social Engineering and Cyber Attacks: The Psychology of Deception
 
computer law.pptx
computer law.pptxcomputer law.pptx
computer law.pptx
 
Living in the IT Era - Lesson 5.pptx
Living in the IT Era - Lesson 5.pptxLiving in the IT Era - Lesson 5.pptx
Living in the IT Era - Lesson 5.pptx
 

Recently uploaded

Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Ramkumar k
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Call Girls Mumbai
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptxrouholahahmadi9876
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiessarkmank1
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...vershagrag
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxNANDHAKUMARA10
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptAfnanAhmad53
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxpritamlangde
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 

Recently uploaded (20)

Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptx
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 

Social Engineering by Riziq Ramadani

  • 1.
  • 2. RIZIQ RAMADANI System Engineer & IT Operations Supports PT. Sinergi Insani Primanet
  • 4. Social Engineering Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information. This differs from social engineering within the social sciences, which does not contain the divulging of confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional "con" in that it is often one of many steps in a more complex fraud scheme. It has also been defined as "any act that influences a person to take an action that may or may not be in their
  • 5.
  • 6. INFORMATION SECURITY CULTURE Implementation: They are commitment of the management, communication with organizational members, courses for all organizational members, and commitment of the employees. Pre- Evaluation: to identify the awareness of information. Strategic Planning: Clustering people is helpful to achieve it. Operative Planning: we can set a good security culture based on internal communication, management-buy-in, and security awareness and training program. Shared patterns of thought, behavior, and values within a social group
  • 7. TECHNIQUES AND TERMS • All social engineering techniques are based on specific attributes of human decision-making known as cognitive biases. These biases, sometimes called "bugs in the human hardware", are exploited in various combinations to create attack techniques, some of which are listed below. • The attacks used in social engineering can be used to steal employees' confidential information. The most common type of social engineering happens over the phone. • Other examples of social engineering attacks are criminals posing as exterminators, fire marshals and technicians to go unnoticed as they steal company secrets. One example of social engineering is an individual who walks into a building and posts an official-looking announcement to the company bulletin that says the number for the help desk has changed.
  • 8. SIX KEY PRINCIPLES RECIPROCITY – People tend to return a favor, thus the pervasiveness of free samples in marketing. The good cop/bad cop strategy is also based on this principle. COMMITMENT AND CONSISTENCY – If people commit, orally or in writing, to an idea or goal, they are more likely to honor that commitment because of establishing that idea or goal as being congruent with their self-image. Even if the original incentive or motivation is removed after they have already agreed, they will continue to honor the agreement. SOCIAL PROOF – People will do things that they see other people are doing. AUTHORITY – People will tend to obey authority figures, even if they are asked to perform objectionable acts. LIKING – People are easily persuaded by other people that they like. SCARCITY – Perceived scarcity will generate demand. For example, saying offers are available for a "limited time only" encourages sales.
  • 9. FOUR SOCIAL ENGINEERING VECTORS Vishing •Vishing, otherwise known as "voice phishing", is the criminal practice of using social engineering over the telephone system to gain access to private personal and financial information from the public for the purpose of financial reward. Phishing •Phishing is a technique of fraudulently obtaining private information. Typically, the phisher sends an e-mail that appears to come from a legitimate business—a bank, or credit card company—requesting "verification" of information and warning of some dire consequence if it is not provided Smishing •The act of using SMS text messaging to lure victims into a specific course of action. Like Phishing it can be clicking on a malicious link or divulging information. Impersonation •Pretending or pretexting to be another person with the goal of gaining access physically to a system or building.
  • 10. NOTABLE SOCIAL ENGINEERS Kevin Mitnick Kevin Mitnick is an American computer security consultant, author and hacker, best known for his high-profile 1995 arrest and later five year conviction for various computer and communications-related crimes. Susan Headley Susan Headley was an American hacker active during the late 1970s and early 1980s widely respected for her expertise in social engineering, pretexting, and psychological subversion. She was known for her specialty in breaking into military computer systems, which often involved going to bed with military personnel and going through their clothes for usernames and passwords while they slept Badir Brothers Brothers Ramy, Muzher, and Shadde Badir—all of whom were blind from birth—managed to set up an extensive phone and computer fraud scheme in Israel in the 1990s using social engineering, voice impersonation, and Braille-display computers.
  • 11. LA W Pretexting of telephone records In December 2006, United States Congress approved a Senate sponsored bill making the pretexting of telephone records a federal felony with fines of up to $250,000 and ten years in prison for individuals (or fines of up to $500,000 for companies). It was signed by President George W. Bush on 12 January 2007. HP Patricia Dunn, former chairwoman of Hewlett Packard, reported that the HP board hired a private investigation company to delve into who was responsible for leaks within the board. Dunn acknowledged that the company used the practice of pretexting to solicit the telephone records of board members and journalists.
  • 12. IN POPULAR CULTURE In the movie The Thomas Crown Affair, one of the characters poses over the telephone as a museum guard's superior in order to move the guard away from his post. In the movie Live Free or Die Hard, Justin Long is seen pretexting that his father is dying from a heart attack to have an On-Star Assist representative start what will become a stolen car. In the TV show Mr. Robot, Darlene scatters USB flash drives (containing malware) outside a prison entrance, baiting a curious guard into compromising the prison's internal network when he plugs one of the drives into his computer workstation. In the movie Who Am I, the main characters are seen using various social engineering