19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 5: Social Engineering<br />

Social engineers often know a little about a lot of things — both inside and<br />

outside their target organizations — because this knowledge helps them in<br />

their efforts. The more information social engineers gain about organizations,<br />

the easier it is for them to pose as employees or other trusted insiders. Social<br />

engineers’ knowledge and determination give them the upper hand over average<br />

employees who don’t recognize the value of the information that social<br />

engineers seek.<br />

Understanding the Implications<br />

Many organizations have enemies who want to cause trouble through social<br />

engineering. These enemies might be current or former employees seeking<br />

revenge, competitors wanting a leg up, or hackers trying to prove their skills.<br />

Regardless of who causes the trouble, every organization is at risk — especially<br />

with the web, which can help facilitate hacking and information gathering. Larger<br />

companies spread across several locations are often more vulnerable given their<br />

complexity, but smaller companies can also be attacked. Everyone, from receptionists<br />

to security guards to IT personnel, is a potential victim of social engineering.<br />

Help desk and call center employees are especially vulnerable because<br />

they are trained to be helpful and forthcoming with information. Even the aver<br />

age, untrained employee is susceptible to attack.<br />

Social engineering has serious consequences. Because the objective of<br />

social engineering is to coerce someone for information to lead to ill-gotten<br />

gain, anything is possible. Effective social engineers can obtain the following<br />

information:<br />

✓ User or administrator passwords<br />

✓ Security badges or keys to the building and even to the computer room<br />

✓ Intellectual property such as design specifications, source code, or<br />

other research and development documentation<br />

✓ Confidential financial reports<br />

✓ Private and confidential employee information<br />

✓ Customer lists and sales prospects<br />

If any of the preceding information is leaked, financial losses, lower employee<br />

morale, decreased customer loyalty, and even legal and regulatory compliance<br />

issues could result. The possibilities are endless.<br />

Social engineering attacks are difficult to protect against for various reasons.<br />

For one thing, they aren’t well documented. For another, social engineers are<br />

limited only by their imaginations. Also, because so many possible methods<br />

69

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!