SlideShare una empresa de Scribd logo
1 de 15
Social engineering


           Servers and network
                   2012 Autumn

                   Morten Bo Nielsen
                   Mon@eal.dk
Old school

                                    It's all about the
                                    money
                                    ●   Hustling
                                    ●   Scams


                                        Example


Networks and servers - Mon@eal.dk                        2
Psychology of scams
“cognitive and motivational
processes”
 ●   trust and authority
 ●   visceral triggers
     ●   human desires and
         needs
     ●   greed, fear, avoidance of
         physical pain, or the
         desire to be liked


Networks and servers - Mon@eal.dk                            3
                                    Go here for full story
Inducing judgement errors
                              ●     Scarcity cues
                                    ●   Unique opportunity
                              ●     Induction of behavioural
                                    commitment
                                    ●   Start small and get them rolling
                              ●     Extreme cost/benefit
                              ●     Lack of emotional control
                                    ●   A psychological trait of victims


Networks and servers - Mon@eal.dk                                          4
Examples
Who needs spam, when we have this link
http://www.urbanmillionaires.com/


Question:
 ●   Is it true? Is it trustworthy?
 ●   Puts words on it from the previous slides.
     ●   Still think it is trust worthy?


Networks and servers - Mon@eal.dk                 5
Examples
Emotional distress
steal a womans hand bag


Question:
 ●   Is this possible?
 ●   Is she gullible?



Networks and servers - Mon@eal.dk        6
Still old school
 ●   Gaining access to places you are not allowed
     ●   http://www.youtube.com/watch?v=kOEWd_M5m44


 ●   The secret:
         Look as if you belong.




Networks and servers - Mon@eal.dk                     7
Relation to security
                                    ●   No security with
                                        physical access
                                    ●   Why go through the
                                        firewall, if you may
                                        walk past?




Networks and servers - Mon@eal.dk                              8
People on the move


                    Steal the laptop (covertly)
                       laptops in airports




Networks and servers - Mon@eal.dk                 9
People on the move
Use their telephones against them
 ●   for profit
 ●   reading the calendar, mails, SMS
 ●   As a bug




Networks and servers - Mon@eal.dk       10
People on the move


                                          ●    Mobile IT
                                               ●   A security nightmare
                                               ●   Too many variables
                          Is this ok to use?
                          Could it be fake?




Networks and servers - Mon@eal.dk                                         11
People at the office
 ●   Make them tell you their passwords.
     ●   Teachers recurring story – this time with an external
         reference....
     ●   from the BBC


Question:
 ●   Is this realistic? In Denmark?



Networks and servers - Mon@eal.dk                           12
People at the office
 ●   Spam
     ●   Check your mailbox




Networks and servers - Mon@eal.dk         13
People at the office
                                    ●   Receptionists are a
                                        crucial part of security
                                    ●   Educate people
                                        ●   Like this?




Networks and servers - Mon@eal.dk                             14
Closing word


                          Which on to use?
                         Technical vs. social

                              Answer: Both

                                    To read more, see this



Networks and servers - Mon@eal.dk                            15

Más contenido relacionado

Destacado

Itt2 its pki and certificates
Itt2 its pki and certificatesItt2 its pki and certificates
Itt2 its pki and certificates
Morten Nielsen
 
14.04.04 exegesis lent 4
14.04.04 exegesis   lent 414.04.04 exegesis   lent 4
14.04.04 exegesis lent 4
morrisenglish
 
14.04.04 exegesis lent 5
14.04.04 exegesis   lent 514.04.04 exegesis   lent 5
14.04.04 exegesis lent 5
morrisenglish
 
Itet2 its social engineering
Itet2 its social engineeringItet2 its social engineering
Itet2 its social engineering
Morten Nielsen
 
48 peranan guru pendidikan islam menerusi falsafah pendidikan islam
48 peranan guru pendidikan islam menerusi falsafah pendidikan islam 48 peranan guru pendidikan islam menerusi falsafah pendidikan islam
48 peranan guru pendidikan islam menerusi falsafah pendidikan islam
Mohd Kamal Jusoh
 

Destacado (13)

Itt2 its introduction
Itt2 its introductionItt2 its introduction
Itt2 its introduction
 
Itt2 its pki and certificates
Itt2 its pki and certificatesItt2 its pki and certificates
Itt2 its pki and certificates
 
peranan guru pendidikan islam
peranan guru pendidikan islam  peranan guru pendidikan islam
peranan guru pendidikan islam
 
14.04.04 exegesis lent 4
14.04.04 exegesis   lent 414.04.04 exegesis   lent 4
14.04.04 exegesis lent 4
 
14.04.04 exegesis lent 5
14.04.04 exegesis   lent 514.04.04 exegesis   lent 5
14.04.04 exegesis lent 5
 
Itet2 its social engineering
Itet2 its social engineeringItet2 its social engineering
Itet2 its social engineering
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Social engineering
Social engineering Social engineering
Social engineering
 
Eng.09.Sem.02.Assignments
Eng.09.Sem.02.AssignmentsEng.09.Sem.02.Assignments
Eng.09.Sem.02.Assignments
 
Itet2 its anatomy
Itet2 its anatomyItet2 its anatomy
Itet2 its anatomy
 
4 b peranan-pendidikan
4 b peranan-pendidikan4 b peranan-pendidikan
4 b peranan-pendidikan
 
paradigma baru pendidikan islam
 paradigma baru pendidikan islam  paradigma baru pendidikan islam
paradigma baru pendidikan islam
 
48 peranan guru pendidikan islam menerusi falsafah pendidikan islam
48 peranan guru pendidikan islam menerusi falsafah pendidikan islam 48 peranan guru pendidikan islam menerusi falsafah pendidikan islam
48 peranan guru pendidikan islam menerusi falsafah pendidikan islam
 

Similar a Itt3 its social engineering

Similar a Itt3 its social engineering (7)

APSU IPC Clouducation 101
APSU IPC Clouducation 101APSU IPC Clouducation 101
APSU IPC Clouducation 101
 
Putting Great KM Ideas into Practice
Putting Great KM Ideas into PracticePutting Great KM Ideas into Practice
Putting Great KM Ideas into Practice
 
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
 
Data distribution in the cloud with Node.js
Data distribution in the cloud with Node.jsData distribution in the cloud with Node.js
Data distribution in the cloud with Node.js
 
unba.se - ACM CSCW 2017 - IWCES15
unba.se - ACM CSCW 2017 - IWCES15unba.se - ACM CSCW 2017 - IWCES15
unba.se - ACM CSCW 2017 - IWCES15
 
Patching your employee's brain (by NVISO - Pieter Danhieux)
Patching your employee's brain (by NVISO - Pieter Danhieux)Patching your employee's brain (by NVISO - Pieter Danhieux)
Patching your employee's brain (by NVISO - Pieter Danhieux)
 
1. 'Interoperability. A quick chat, a few war stories'. Carl Wilson, Open Pla...
1. 'Interoperability. A quick chat, a few war stories'. Carl Wilson, Open Pla...1. 'Interoperability. A quick chat, a few war stories'. Carl Wilson, Open Pla...
1. 'Interoperability. A quick chat, a few war stories'. Carl Wilson, Open Pla...
 

Más de Morten Nielsen (19)

Itt1 intro project management
Itt1 intro project managementItt1 intro project management
Itt1 intro project management
 
Itt1 intro knowing and doing
Itt1 intro knowing and doingItt1 intro knowing and doing
Itt1 intro knowing and doing
 
Itt2 its ssl and services
Itt2 its ssl and servicesItt2 its ssl and services
Itt2 its ssl and services
 
Itt2 its ids
Itt2 its idsItt2 its ids
Itt2 its ids
 
Itt2 its encrypted storage
Itt2 its encrypted storageItt2 its encrypted storage
Itt2 its encrypted storage
 
Itt2 its introduction
Itt2 its introductionItt2 its introduction
Itt2 its introduction
 
Itt3 virtual machines
Itt3 virtual machinesItt3 virtual machines
Itt3 virtual machines
 
Itt1 sd requirements
Itt1 sd requirementsItt1 sd requirements
Itt1 sd requirements
 
Itt3 its acl
Itt3 its aclItt3 its acl
Itt3 its acl
 
Itet3 its forensics
Itet3 its forensicsItet3 its forensics
Itet3 its forensics
 
Diagram cookbook
Diagram cookbookDiagram cookbook
Diagram cookbook
 
ITET3 Networking P2P
ITET3 Networking P2PITET3 Networking P2P
ITET3 Networking P2P
 
ITET1 Routing Transport layer.odp
ITET1 Routing Transport layer.odpITET1 Routing Transport layer.odp
ITET1 Routing Transport layer.odp
 
ITET1 Routing Application layer.odp
ITET1 Routing Application layer.odpITET1 Routing Application layer.odp
ITET1 Routing Application layer.odp
 
ITET3 ITS governance
ITET3 ITS governanceITET3 ITS governance
ITET3 ITS governance
 
Routing vlans
Routing vlansRouting vlans
Routing vlans
 
Itet2 its counter recon
Itet2 its counter reconItet2 its counter recon
Itet2 its counter recon
 
Itet2 its authorative sources
Itet2 its authorative sourcesItet2 its authorative sources
Itet2 its authorative sources
 
Its presentation
Its presentationIts presentation
Its presentation
 

Último

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Último (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 

Itt3 its social engineering

  • 1. Social engineering Servers and network 2012 Autumn Morten Bo Nielsen Mon@eal.dk
  • 2. Old school It's all about the money ● Hustling ● Scams Example Networks and servers - Mon@eal.dk 2
  • 3. Psychology of scams “cognitive and motivational processes” ● trust and authority ● visceral triggers ● human desires and needs ● greed, fear, avoidance of physical pain, or the desire to be liked Networks and servers - Mon@eal.dk 3 Go here for full story
  • 4. Inducing judgement errors ● Scarcity cues ● Unique opportunity ● Induction of behavioural commitment ● Start small and get them rolling ● Extreme cost/benefit ● Lack of emotional control ● A psychological trait of victims Networks and servers - Mon@eal.dk 4
  • 5. Examples Who needs spam, when we have this link http://www.urbanmillionaires.com/ Question: ● Is it true? Is it trustworthy? ● Puts words on it from the previous slides. ● Still think it is trust worthy? Networks and servers - Mon@eal.dk 5
  • 6. Examples Emotional distress steal a womans hand bag Question: ● Is this possible? ● Is she gullible? Networks and servers - Mon@eal.dk 6
  • 7. Still old school ● Gaining access to places you are not allowed ● http://www.youtube.com/watch?v=kOEWd_M5m44 ● The secret: Look as if you belong. Networks and servers - Mon@eal.dk 7
  • 8. Relation to security ● No security with physical access ● Why go through the firewall, if you may walk past? Networks and servers - Mon@eal.dk 8
  • 9. People on the move Steal the laptop (covertly) laptops in airports Networks and servers - Mon@eal.dk 9
  • 10. People on the move Use their telephones against them ● for profit ● reading the calendar, mails, SMS ● As a bug Networks and servers - Mon@eal.dk 10
  • 11. People on the move ● Mobile IT ● A security nightmare ● Too many variables Is this ok to use? Could it be fake? Networks and servers - Mon@eal.dk 11
  • 12. People at the office ● Make them tell you their passwords. ● Teachers recurring story – this time with an external reference.... ● from the BBC Question: ● Is this realistic? In Denmark? Networks and servers - Mon@eal.dk 12
  • 13. People at the office ● Spam ● Check your mailbox Networks and servers - Mon@eal.dk 13
  • 14. People at the office ● Receptionists are a crucial part of security ● Educate people ● Like this? Networks and servers - Mon@eal.dk 14
  • 15. Closing word Which on to use? Technical vs. social Answer: Both To read more, see this Networks and servers - Mon@eal.dk 15