SlideShare uma empresa Scribd logo
1 de 21
Corporate Information Security: New Trends in Corporate Information Loss   Tim Rhodes Provizio 208-629-3300
Learning Objectives ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Economic & Industrial Espionage ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1.  Source:   Annual Report to Congress on Foreign Economic & Industrial Espionage   – Feb 2005
Successful Espionage Tactics Source :  Defense Security Service Combating social engineering is JUST AS Important as the tactics, processes, and prevention strategies used to combat hacking
Common Social Engineering Methods Source :  Defense Security Service ,[object Object],[object Object],[object Object],[object Object],[object Object]
How Social Engineering Works ,[object Object],[object Object],[object Object],[object Object],Collection is cyclical, with  every  piece of information being valuable. Cycle is restarted & used until objective is met. Development  of Relationship Information Gathering Exploitation of Relationship Execution to Achieve Objective
How Social Engineering Works ,[object Object],[object Object],[object Object],Effective SEs are creative in their approach by identifying multiple sources that may even have a minor  “ piece ”  of the  “ puzzle ”
How Social Engineering Works ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How Social Engineering Works ,[object Object],[object Object],[object Object],[object Object],[object Object],Target  Company
Social Engineering Methods ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Social Engineering Methods ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Actual Profile on Linkedin.Com Profile provides in-depth specifics on job responsibilities as well as confidential budget & earning figures
Social Engineering Methods ,[object Object],[object Object],[object Object],[object Object],Audio/Video Wireless  “ Bug ”   (1,000 feet transmission range); $90 from SpyWorld.com Small FM Wireless  “ Bug ”   (1/2 mile transmission range); $45 from SpyCraft.com Prepaid cell phone  (Unlimited transmission range); $45 Baby Monitor (1,000 feet transmission range); $80 retail
Social Engineering Methods ,[object Object],[object Object],[object Object],[object Object],[object Object]
The Art of Human Persuasion ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Art of Human Persuasion ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Art of Human Persuasion ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Techniques can be combined to leverage specific information or dig further into a subject;
Social Engineering :  Sources vs. Assets ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Legal & Ethical Legal But Unethical Illegal Use of Secondary sources Proper use of Primary sources All interviews & discussions in true name (no misrepresentation) No collection of known confidential information (rather, use multiple data sources and analyze  “ pieces ”  of data together into your  “ puzzle picture ” ) Use of HUMINT using different name (misrepresentation) Ex: MBA student, journalist, potential investor, etc Seeking confidential information (single source interviews) Use of social engineering-Misrepresentation to gain confidential information Using technical means to acquire information (listening devices or  “ bugs ” , video surveillance, etc) Bribery to obtain information (exchanging money for information or holding information over someone to force information) Espionage Vs. Competitive Intelligence ,[object Object],[object Object],[object Object]
Detecting Social Engineering ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Protecting Your Company ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Additional Recommendations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Semelhante a Social Engineering Presentation 2008 Linkedin[1]

Social Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessSocial Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessCBIZ, Inc.
 
Social engineering
Social engineeringSocial engineering
Social engineeringHHSome
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyRussell Publishing
 
We spline invdeck_apr2018_2
We spline invdeck_apr2018_2We spline invdeck_apr2018_2
We spline invdeck_apr2018_2Fernanda Torós
 
Facts About Social Engineering Services - Aardwolf Security
Facts About Social Engineering Services - Aardwolf SecurityFacts About Social Engineering Services - Aardwolf Security
Facts About Social Engineering Services - Aardwolf SecurityAardwolf Security
 
We spline invdeck_mar2018
We spline invdeck_mar2018We spline invdeck_mar2018
We spline invdeck_mar2018Fernanda Torós
 
We spline invdeck_apr2018_2
We spline invdeck_apr2018_2We spline invdeck_apr2018_2
We spline invdeck_apr2018_2Fernanda Torós
 
Marketing Research Sally Weiss
Marketing Research Sally WeissMarketing Research Sally Weiss
Marketing Research Sally Weissmpunzalan
 
Social Listening and Intelligence is Predictive! Now What?
Social Listening and Intelligence is Predictive!  Now What?Social Listening and Intelligence is Predictive!  Now What?
Social Listening and Intelligence is Predictive! Now What?Rob Key
 
Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"abercius24
 
We spline invdeck_apr2018
We spline invdeck_apr2018We spline invdeck_apr2018
We spline invdeck_apr2018Fernanda Torós
 
We spline invdeck_mar2018
We spline invdeck_mar2018We spline invdeck_mar2018
We spline invdeck_mar2018Fernanda Torós
 
Building your social engineering awareness program
Building your social engineering awareness programBuilding your social engineering awareness program
Building your social engineering awareness programsurferdave71
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering OWASP Foundation
 
Why CEOs Should Love Open Employee Access to Social Media
Why CEOs Should Love Open Employee Access to Social MediaWhy CEOs Should Love Open Employee Access to Social Media
Why CEOs Should Love Open Employee Access to Social MediaShel Holtz
 
Tactical Misinformation-Disinformation in your Organization
Tactical Misinformation-Disinformation in your OrganizationTactical Misinformation-Disinformation in your Organization
Tactical Misinformation-Disinformation in your OrganizationEyesOpen Association
 

Semelhante a Social Engineering Presentation 2008 Linkedin[1] (20)

Social Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessSocial Engineering Audit & Security Awareness
Social Engineering Audit & Security Awareness
 
Social engineering
Social engineering Social engineering
Social engineering
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
We spline invdeck_apr2018_2
We spline invdeck_apr2018_2We spline invdeck_apr2018_2
We spline invdeck_apr2018_2
 
Facts About Social Engineering Services - Aardwolf Security
Facts About Social Engineering Services - Aardwolf SecurityFacts About Social Engineering Services - Aardwolf Security
Facts About Social Engineering Services - Aardwolf Security
 
We spline invdeck_mar2018
We spline invdeck_mar2018We spline invdeck_mar2018
We spline invdeck_mar2018
 
We spline invdeck_apr2018_2
We spline invdeck_apr2018_2We spline invdeck_apr2018_2
We spline invdeck_apr2018_2
 
Marketing Research Sally Weiss
Marketing Research Sally WeissMarketing Research Sally Weiss
Marketing Research Sally Weiss
 
Social Listening and Intelligence is Predictive! Now What?
Social Listening and Intelligence is Predictive!  Now What?Social Listening and Intelligence is Predictive!  Now What?
Social Listening and Intelligence is Predictive! Now What?
 
Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"
 
We spline invdeck_apr2018
We spline invdeck_apr2018We spline invdeck_apr2018
We spline invdeck_apr2018
 
We spline invdeck_mar2018
We spline invdeck_mar2018We spline invdeck_mar2018
We spline invdeck_mar2018
 
Building your social engineering awareness program
Building your social engineering awareness programBuilding your social engineering awareness program
Building your social engineering awareness program
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering
 
Why CEOs Should Love Open Employee Access to Social Media
Why CEOs Should Love Open Employee Access to Social MediaWhy CEOs Should Love Open Employee Access to Social Media
Why CEOs Should Love Open Employee Access to Social Media
 
Hacking the Helpdesk: Social Engineering Risks
Hacking the Helpdesk: Social Engineering RisksHacking the Helpdesk: Social Engineering Risks
Hacking the Helpdesk: Social Engineering Risks
 
Tactical Misinformation-Disinformation in your Organization
Tactical Misinformation-Disinformation in your OrganizationTactical Misinformation-Disinformation in your Organization
Tactical Misinformation-Disinformation in your Organization
 
Hacking the Helpdesk, Craig Clark
Hacking the Helpdesk, Craig ClarkHacking the Helpdesk, Craig Clark
Hacking the Helpdesk, Craig Clark
 

Social Engineering Presentation 2008 Linkedin[1]

  • 1. Corporate Information Security: New Trends in Corporate Information Loss Tim Rhodes Provizio 208-629-3300
  • 2.
  • 3.
  • 4. Successful Espionage Tactics Source : Defense Security Service Combating social engineering is JUST AS Important as the tactics, processes, and prevention strategies used to combat hacking
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.