Constantly changing - You never know what they’ll use next
May involve multiple people – And multiple organizations – There are ties connecting many organizations
May be in person or electronic – Phone calls from aggressive “customers” – Emailed funeral notifications of a friend or associate
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Phishing
A
Social engineering with a touch of spoofing – Often delivered by email, text, etc.
Don’t be fooled - Check the URL
Usually there’s something not quite right – Spelling, fonts, graphics
Vishing (Voice phishing) is done over the phone or voicemail – Caller ID spoofing is common – Fake security checks or bank updates
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Shoulder surfing
A
You have access to important information – Many people want to see – Curiosity, industrial espionage, competitive advantage
This is surprisingly easy – Airports / Flights, hallway-facing monitors, or coffee shops
Surf from afar – Binoculars / Telescopes (easy in the big city) – Webcam monitoring
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Preventing shoulder surfing
A
Control your input – Be aware of your surroundings
Use privacy filters – It’s amazing how well they work
Keep your monitor out of sight – Away from windows and hallways
Don’t sit in front of me on your flight – I can’t help myself
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Spear phishing
A
Targeted phishing with inside information – Makes the attack more believable
Spear phishing the CEO is “whaling” – Targeted phishing with the possibility of a large catch – The CFO (Chief Financial Officer) is commonly speared
These executives have direct access to the corporate bank account – The attackers would love to have those credentials
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Tailgating and piggybacking
A
Tailgating uses an authorized person to gain unauthorized access to a building – The attacker does not have consent – Sneaks through when nobody is looking
Piggybacking follows the same process, but the authorized person is giving consent – Hold the door, my hands are full of donut boxes – Sometimes you shouldn’t be polite
Once inside, there’s little to stop you – Most security stops at the border
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Watching for tailgating
A
Policy for visitors - You should be able to identify anyone
One scan, one person – A matter of policy or mechanically required
Access Control Vestibule / Airlock – You don’t have a choice
Don’t be afraid to ask – Who are you and why are you here?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Impersonation
A
Pretend to be someone you aren’t – Halloween for the fraudsters
Use some of those details you got from the dumpster – You can trust me, I’m with your help desk
Attack the victim as someone higher in rank – Office of the Vice President for Scamming
Throw tons of technical details around – Catastrophic feedback due to the depolarization of the differential magnetometer
Be a buddy – How about those Cubs?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Dumpster diving
A
Mobile garbage bin – United States brand name “Dumpster” – Similar to a rubbish skip
Important information thrown out with the trash – Thanks for bagging your garbage for me!
Gather details that can be used for a different attack – Impersonate names, use phone numbers
Timing is important – Just after end of month, end of quarter – Based on pickup schedule
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Wireless evil twins
A
Looks legitimate, but actually malicious – The wireless version of phishing
Configure an access point to look like an existing network – Same (or similar) SSID and security settings/captive portal
Overpower the existing access points – May not require the same physical location
WiFi hotspots (and users) are easy to fool – And they’re wide open
You encrypt your communication, right? – Use HTTPS and a VPN