24
Social Engineering Social Engineering What?... What?... I only clicked on the flying I only clicked on the flying pig. pig. Thomas Karlsson (CISSP, ITIL, Security+) Thomas Karlsson (CISSP, ITIL, Security+) Security Support Specialist Security Support Specialist Microsoft CSS-Security EMEA Microsoft CSS-Security EMEA

Social Engineering What?... I only clicked on the flying pig. Thomas Karlsson (CISSP, ITIL, Security+) Security Support Specialist Microsoft CSS-Security

  • View
    216

  • Download
    1

Embed Size (px)

Citation preview

Page 1: Social Engineering What?... I only clicked on the flying pig. Thomas Karlsson (CISSP, ITIL, Security+) Security Support Specialist Microsoft CSS-Security

Social EngineeringSocial Engineering

What?...What?...

I only clicked on the flying pig.I only clicked on the flying pig.

Thomas Karlsson (CISSP, ITIL, Security+)Thomas Karlsson (CISSP, ITIL, Security+)

Security Support SpecialistSecurity Support Specialist

Microsoft CSS-Security EMEAMicrosoft CSS-Security EMEA

Page 2: Social Engineering What?... I only clicked on the flying pig. Thomas Karlsson (CISSP, ITIL, Security+) Security Support Specialist Microsoft CSS-Security

What is this session about?What is this session about?

Social engineering in combination withSocial engineering in combination with Customers perception aboutCustomers perception about

Defence in DepthDefence in Depth FirewallsFirewalls AntivirusAntivirus Security VulnerabilitiesSecurity Vulnerabilities

- Note - - Note -

all demos are executed in an isolated all demos are executed in an isolated environment.environment.

Page 3: Social Engineering What?... I only clicked on the flying pig. Thomas Karlsson (CISSP, ITIL, Security+) Security Support Specialist Microsoft CSS-Security
Page 4: Social Engineering What?... I only clicked on the flying pig. Thomas Karlsson (CISSP, ITIL, Security+) Security Support Specialist Microsoft CSS-Security

Risk awarenessRisk awareness

Page 5: Social Engineering What?... I only clicked on the flying pig. Thomas Karlsson (CISSP, ITIL, Security+) Security Support Specialist Microsoft CSS-Security

One layer protectionOne layer protection

Page 6: Social Engineering What?... I only clicked on the flying pig. Thomas Karlsson (CISSP, ITIL, Security+) Security Support Specialist Microsoft CSS-Security

Firewall?Firewall?

Page 7: Social Engineering What?... I only clicked on the flying pig. Thomas Karlsson (CISSP, ITIL, Security+) Security Support Specialist Microsoft CSS-Security

Defence in Depth - DiDDefence in Depth - DiD

Policys, procedures and awareness

Physical Security

Data

Application

Host

Network

Perimeter

Who should have access to the resources?•Keys to the office•Code to the alarm system•Motion sensors•Keys to the rooms•Keys to the document cabin•Keys to the cash box

Page 8: Social Engineering What?... I only clicked on the flying pig. Thomas Karlsson (CISSP, ITIL, Security+) Security Support Specialist Microsoft CSS-Security

Defence in depthDefence in depth

Page 9: Social Engineering What?... I only clicked on the flying pig. Thomas Karlsson (CISSP, ITIL, Security+) Security Support Specialist Microsoft CSS-Security

What is security?What is security?

PeoplePeople

ProcessesProcesses

ProductsProducts

Security is a Process! – and not a Product

Page 10: Social Engineering What?... I only clicked on the flying pig. Thomas Karlsson (CISSP, ITIL, Security+) Security Support Specialist Microsoft CSS-Security

Risk?Risk?

Page 11: Social Engineering What?... I only clicked on the flying pig. Thomas Karlsson (CISSP, ITIL, Security+) Security Support Specialist Microsoft CSS-Security

Mitigating riskMitigating risk

Page 12: Social Engineering What?... I only clicked on the flying pig. Thomas Karlsson (CISSP, ITIL, Security+) Security Support Specialist Microsoft CSS-Security

Ever heard about this guy?Ever heard about this guy?

Photo by Monty Brinton - John Wiley & SonsPhoto by Monty Brinton - John Wiley & Sons

Page 13: Social Engineering What?... I only clicked on the flying pig. Thomas Karlsson (CISSP, ITIL, Security+) Security Support Specialist Microsoft CSS-Security

ThreatsThreats

Page 14: Social Engineering What?... I only clicked on the flying pig. Thomas Karlsson (CISSP, ITIL, Security+) Security Support Specialist Microsoft CSS-Security
Page 15: Social Engineering What?... I only clicked on the flying pig. Thomas Karlsson (CISSP, ITIL, Security+) Security Support Specialist Microsoft CSS-Security

PolicyPolicy

””Documentation (”rules”) which Documentation (”rules”) which describes the objective for the describes the objective for the organisation and or department in organisation and or department in regards to it’s operating areas”regards to it’s operating areas”

The content often references...The content often references... Processes/ProceduresProcesses/Procedures

Methods in how-to achive the objectiveMethods in how-to achive the objective

Page 16: Social Engineering What?... I only clicked on the flying pig. Thomas Karlsson (CISSP, ITIL, Security+) Security Support Specialist Microsoft CSS-Security
Page 17: Social Engineering What?... I only clicked on the flying pig. Thomas Karlsson (CISSP, ITIL, Security+) Security Support Specialist Microsoft CSS-Security

Social EngineeringSocial Engineering

THETHE best way to get hold of classified best way to get hold of classified informationinformation

Products will in most casesProducts will in most cases NOT NOT block block the attackthe attack

KNOWLEDGEKNOWLEDGE is the key to ensure this is the key to ensure this attack vector doesn’t workattack vector doesn’t work

Page 18: Social Engineering What?... I only clicked on the flying pig. Thomas Karlsson (CISSP, ITIL, Security+) Security Support Specialist Microsoft CSS-Security

Real exampleReal example

Page 19: Social Engineering What?... I only clicked on the flying pig. Thomas Karlsson (CISSP, ITIL, Security+) Security Support Specialist Microsoft CSS-Security

•vcodec.com vcodec.com •V-codec.com V-codec.com •vcodecdownload.comvcodecdownload.com•vcodec-download.com vcodec-download.com •vcodecget.comvcodecget.com•vcodec-get.com vcodec-get.com •vcodecpull.comvcodecpull.com•Vicodec.comVicodec.com•Vidcodec.com Vidcodec.com •vidscodec.com vidscodec.com •zcodec.comzcodec.com•myspace.com/82959792 myspace.com/82959792

Page 20: Social Engineering What?... I only clicked on the flying pig. Thomas Karlsson (CISSP, ITIL, Security+) Security Support Specialist Microsoft CSS-Security

More threats to the sociatyMore threats to the sociaty

Page 21: Social Engineering What?... I only clicked on the flying pig. Thomas Karlsson (CISSP, ITIL, Security+) Security Support Specialist Microsoft CSS-Security
Page 22: Social Engineering What?... I only clicked on the flying pig. Thomas Karlsson (CISSP, ITIL, Security+) Security Support Specialist Microsoft CSS-Security

Being pro-active using right protection!Being pro-active using right protection!

Page 23: Social Engineering What?... I only clicked on the flying pig. Thomas Karlsson (CISSP, ITIL, Security+) Security Support Specialist Microsoft CSS-Security

DEMODEMO

- Note - - Note -

all demos are executed in an isolated all demos are executed in an isolated environment.environment.

Page 24: Social Engineering What?... I only clicked on the flying pig. Thomas Karlsson (CISSP, ITIL, Security+) Security Support Specialist Microsoft CSS-Security

Thomas KarlssonThomas Karlsson

[email protected]