02.11.2014 Views

untangling_the_web

untangling_the_web

untangling_the_web

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

DID: 4046925<br />

UNCLASSIFIEDUFOR OFFIGIAL blSE ONLY<br />

never distribute software directly via email) and all Microsoft downloads are from<br />

<strong>the</strong>ir site .<br />

Microsoft Policies on Software Distribution<br />

http://www.microsoft.com/technet/security/bulletin/info/swdist.mspx<br />

Although it is not new, ano<strong>the</strong>r type of con called "pretexting"205 made headlines<br />

during 2006 when some executives at Hewlett Packard got into serious trouble<br />

because of this method of obtaining information. The HP execs weren't after<br />

financial data but telephone records, and at that time it was not clear if pretexting to<br />

obtain phone records was illegal or not in <strong>the</strong> US. HP admits that it hired a firm to<br />

investigate board leaks to <strong>the</strong> press. The firm HP engaged to look into <strong>the</strong> leaks in<br />

turn hired private investigators who impersonated HP board members to get phone<br />

records belonging to at least nine reporters and one HP board member.<br />

This is just <strong>the</strong> most high-profile complaint about <strong>the</strong> ready availability of personal<br />

records obtained by "data brokers." You need to be aware that pretexting is a<br />

widespread tactic, and <strong>the</strong> laws governing fraudulently obtaining non-financial<br />

personal records and information are murky at best. Frankly, <strong>the</strong>re isn't much<br />

you can do to protect yourself from a clever and determined con artist who is going<br />

after your phone records at your phone company. The best ways to combat<br />

pretexting are laws that make pretexting a crime and companies that train <strong>the</strong>ir<br />

employees better.<br />

Understand Website Certificates<br />

If you are concerned about phishing attacks and o<strong>the</strong>r social engineering scams,<br />

you have probably been advised to make sure <strong>the</strong> site you are visiting has a valid<br />

site certificate. And <strong>the</strong>n you probably scratched your head and wondered, "how <strong>the</strong><br />

heck can I tell if that certificate is valid or not?"<br />

First, it is important to understand what a site certificate is and what it does for <strong>the</strong><br />

site and for you. Any <strong>web</strong>site that wants a secure connection must use encryption. In<br />

order to use encryption over <strong>the</strong> Internet, <strong>the</strong> <strong>web</strong>site owner must obtain a site<br />

certificate. There are, <strong>the</strong>n, two parties involved in verifying <strong>the</strong> validity of a<br />

certificate: <strong>the</strong> <strong>web</strong>site owner and <strong>the</strong> trusted certificate authority. At present, your<br />

browser is probably set to recognize more than 100 trusted certificate authorities, but<br />

not all of <strong>the</strong>se have <strong>the</strong> same strictness about ensuring <strong>the</strong> validity and security of<br />

205 The earliest use I have found of <strong>the</strong> term 'pretexting' to mean obtaining private or confidential<br />

information by pretending to be someone who has a legitimate right to or need for that information is<br />

1980: Fair Financial Information Practices Act: Hearings Before <strong>the</strong> Subcommittee on Consumer<br />

Affairs by <strong>the</strong> United States Senate Committee on Banking, Housing, and Urban Affairs,<br />

Subcommittee on Consumer Affairs. .<br />

UNCLASSIFIEDHFOR OFFIOIAL l:J5E ONLY 585

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!