(Security is as strong as the weakest link which is usually the human. 
As Kevin Mitnick said most of the time he got access just by using this
technique. More awareness campaigns are needed to address this issue. 

It is just too easy to trick someone, especially if they are not aware
of it and worst of it most of the time they won't even realise that they
were a victim/target as some people are just too good to be caught.  For
example, someone who is really at good 'human source development' will
put the important questions in the middle of the conversation as humans
generally remember far better the beginning and the end of it than the
middle bit. WEN)

Social engineering: Hackers exploit human weakness
by Laurie G. Knepper
Joint STARS Test Force senior computer systems manager

12/6/2002 - MELBOURNE, Fla. (AFPN) -- Are you familiar with the term
"social engineering"? If not, you probably don't know the potential
impact of social engineering on the Air Force and national security. And
that means you could be an unwitting participant. 

Social engineering means computer-security cracking techniques that rely
on weakness in human nature rather than weaknesses in hardware, software
or network design. 

The goal of social engineering is to trick people into revealing
passwords, network vulnerabilities or other information that will help
the hacker get access to important data. Using social engineering, even
someone with lousy computer skills can find his or her way into a
supposedly secure computer system and access, modify or destroy the data
on it. 

How are your social engineering defenses? 

-- Do you lock your work station before leaving your desk, or do you
leave it up to a screensaver to kick in a little while later? 

-- Would you decline to give your password to someone who said, over the
phone or in an e-mail, that he or she was debugging a problem with your
account, and then contact your computer security representatives
immediately, or would you comply with the password request? 

-- Do you challenge strangers in the hall who don't display a proper
badge, or do you assume because they are in nice suits that they are
probably too important to be questioned? 

-- Would you stop a clean-cut uniformed delivery person carrying
packages who flashes a smile and asks where the mailroom is as he
attempts to tailgate into a secure building with you, or would you
politely hold the door open for him and point him toward the mailroom? 

-- Do you shred old phone lists, or do you simply dump them in the trash
or recycle bin? 

-- Would you decline to participate in a phone survey that asks a bunch
of questions about your organization's computer systems, or would you
participate to get the "free gift"? 

-- Do you leave work discussions at work, or do you discuss Air Force
business over meals at local restaurants? 

In case you have any doubt, the first action in each of these examples
reflects proper security practices, while the second action reflects
poor security or outright security violations. 

Here are a few interesting and educational articles on the Web that deal
with social engineering. Please take some time to read them. There may
be a test. It may be given by someone official. Or it may be given by
someone who is not official, not authorized, and not supposed to be
getting the information or access that you are inadvertently giving
them. Think about it. 


Physical Security - Technical Security's Biggest Hole lists some
everyday "easy access" methods that have proven effective. 
http://www.scmagazine.com/scmagazine/2001_11/feature.html 

-- Social Engineering Fundamentals, Part I: Hacker Tactics
http://online.securityfocus.com/infocus/1527  

-- Social Engineering Fundamentals, Part II: Combat Strategies 
http://online.securityfocus.com/infocus/1533 

Social Engineering Attacks via IRC and Instant Messaging
http://www.cert.org/incident_notes/IN-2002-03.html 




IWS INFOCON Mailing List
@ IWS - The Information Warfare Site
http://www.iwar.org.uk


Reply via email to