19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 5: Social Engineering<br />

request is made over the telephone, verify the caller’s identity and call<br />

back.<br />

✓ Never click an e-mail link that supposedly loads a page with information<br />

that needs updating. This is especially true for unsolicited e-mails.<br />

Mouse-over links can be just as dangerous as cross-site scripting, and<br />

related exploits can be carried out by a user innocently placing his or<br />

her mouse over a hyperlink. Mouse-over vulnerabilities can be handled<br />

by antimalware software at the network perimeter or computer level as<br />

well as within the application itself.<br />

✓ Be careful when sharing personal information on social networking<br />

sites, such as Facebook or LinkedIn. Also, be on the lookout for people<br />

claiming to know you or wanting to be your friend. Their intentions<br />

might be malicious.<br />

✓ Escort all guests within a building.<br />

✓ Never open e-mail attachments or other files from strangers.<br />

✓ Never give out passwords.<br />

A few other general suggestions can ward off social engineering:<br />

✓ Never let a stranger connect to one of your network jacks or wireless<br />

networks — even for a few seconds. A hacker can place a network<br />

analyzer, Trojan-horse program, or other malware directly onto your<br />

network.<br />

✓ Classify your information assets, both hard copy and electronic. Train<br />

all employees how to handle each asset type.<br />

✓ Develop and enforce computer media and document destruction policies<br />

that help ensure data is handled carefully and stays where it should<br />

be. A good resource for information on destruction policies is www.<br />

pdaconsulting.com/datadp.htm.<br />

✓ Use cross-shredding paper shredders. Better still, hire a<br />

document-shredding company that specializes in confidential document<br />

destruction.<br />

These techniques can reinforce the content of formal training:<br />

✓ New employee orientation, training lunches, e-mails, and newsletters<br />

✓ Social engineering survival brochure with tips and FAQs<br />

✓ Trinkets, such as screen savers, mouse pads, sticky notes, pens, and<br />

office posters that bear messages that reinforce security principles<br />

The Appendix lists my favorite security awareness trinkets and tool vendors<br />

to improve security awareness and education in your organization.<br />

79

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!