16.05.2014 Views

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

202 Chapter 8<br />

with other activities, they have been able to break into many corporations as a result. In<br />

this type of attack, the attacker chooses a mark he or she can scam to gain a password,<br />

user ID, or other usable information. Because most administrators and employees of<br />

companies are more concerned with providing efficiency and helping users, they may be<br />

unaware that the person they are speaking to is not a legitimate user. And because there<br />

are no formal procedures for establishing whether an end user is legitimate, the attacker<br />

often gains a tremendous amount of information in a very short time, and often with no<br />

way to trace the information leak back to the attacker.<br />

Social engineering begins with a goal of obtaining information about a person or business<br />

and can range in activities from dumpster diving to cold calls or impersonations. As<br />

acknowledged in the movies, many hackers and criminals have realized that a wealth<br />

of valuable information often lays in the trash bins waiting to be emptied by a disposal<br />

company. Most corporations do not adequately dispose of information, and trash bins<br />

often contain information that may identify employees or customers. This information is<br />

not secured and is available to anyone who is willing to dive into the dumpster at night<br />

and look for it—hence, the term dumpster diving .<br />

Other information is readily available via deception. Most corporations do not contain<br />

security measures that address deception adequately. What happens when the protocol<br />

is followed properly, but the person being admitted is not who he says he is? Many<br />

groups utilize members of their group in a fashion that would violate protocols to gather<br />

information about a corporate admittance policy. Often, the multiperson attack results<br />

in gaining admittance to the company and ultimately the information desired. Using<br />

the bathroom or going for a drink of water is always a great excuse for exiting from a<br />

meeting, and you often will not have an escort. Most corporations do not have terminal<br />

locking policies, and this is another way an attacker can gain access or load software that<br />

may pierce the company’s firewall. So long as the people entering the corporation can<br />

act according to the role they have defined for their access and they look the part, it is<br />

unlikely that they will be detected.<br />

Remotely, social engineering actually becomes less challenging. There are no visual<br />

expectations to meet, and people are very willing to participate with a little coaxing. As<br />

is often the case, giving away something free can always be a method for entry. Many<br />

social engineering situations involve sending along a free piece of software or something<br />

of value for free. Embedded within free software, Trojans, viruses, and worms can go<br />

www.newnespress.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!