Social Engineering technique to gather Critical Information of Social Networking Websites

Size: px
Start display at page:

Download "Social Engineering technique to gather Critical Information of Social Networking Websites"

Transcription

1 Social Engineering technique to gather Critical Information of Social Networking Websites Inderjit Kaur Dept. of Computer Science and Applications K.M.V., Jalandhar Punjab, India Er. Gurjot Singh Dept. of Computer Science and Applications K.M.V., Jalandhar Punjab, India Abstract Social engineering is a technique implied by penetration testers to find the loop holes in the security of web applications and organizations. The organizations often suffer harm from the unintended behavior of their employees that expose the organizations to security risk due to the unintentional insider threat. In this paper we describe the techniques that often used in social engineering to analyze unexpected insider threats extract from social engineering exploits and also the preventive measures against it. The social networking sites are the wide area of research due to the increase in growth of technology and human resources that leads to a crucial point of concern to be aware of the security aspects of social networking websites. We implied the social engineering technique to gain critical information about the target/ individual and to hack their social accounts. Index Terms Social Engineering, Penetration testing, social websites, hacking. I. INTRODUCTION The penetration testers are hired by the companies to discover if the employees are not disclosing the sensitive information of the company. The penetration tester finds these loop holes with the social engineering. Social engineering starts with gathering background information on targets [1]. This information is generally gathered via dumpster diving and phone calls, and the usage of social networking sites that leads to a growing number of available social engineering tools and techniques. Now a day s attackers can use social networking websites (SNSs) such as facebook to gather background information about the target. SNS`s serve as communication platform by offering services such as private messaging and chats which can be used by the penetration tester while social engineering [2]. The entire Online Social Networking websites bring the friends and their family members together to share their critical information but still it lacks in the security of social websites. The shared information is freely opened accessible to all the users of social networking websites. When the photos are freely available, the unauthorized users can easily access the photos of others individuals and download it. The hacked image can be misused, such as creation of fake profile and the photo can be sold to other nuisance websites. This kind of data hacking activities in online social networks even leads the life to death [14]. Social networking websites are wide area of research for the researcher`s. The increasing growth in Technology and Human Resources provides the new platform to form social networks that is the crucial point of concern to be aware of social networking websites and built networks. II. PENETRATION TESTING Penetration testing is widely used to help the security of web applications and organizations also. The penetration testers discover vulnerabilities by simulating attacks on a target system. Testers use the techniques that gather input information about the target system and analyze the application s responses to verify whether an attack was successfully done. Sometimes, in this technique the steps can t be completed, which can leave part of some web application untested and vulnerabilities undiscovered. The work of penetration tester is to find these loops holes from the system and make the systems and organization more secure [2]. III. SOCIAL ENGINEERING Social engineering, in information security, is the art of influencing the people to give up their sensitive information. It is a type of confidence technique for the purpose of information gathering. Social engineering is a term describes a non-technical attack that relies on human interaction and tricking people to break normal security procedure. Criminals use social engineering technique because it is comparatively easier than other attacks. It is one of the most useful attacks, because its victims naturally want to trust other people and are of course helpful. The victims of social engineering are tricked into releasing information that they do not realize, will used to 581 P a g e

2 attack a particular network. Social engineers know the fact that people are not conscious of the value of the information they possess and are careless about protecting it [3, 7]. A. Types of social engineering There are the two types of the social engineering that exists. The following are the names of the type of social engineering: 1. Human Based Social Engineering 2. Computer Based Social Engineering Types of social engineering Computer Based 1. Human Based Social Engineering Human Based Human based social engineering needs an interface with humans; it means communication among individuals and then retrieving the desired information about themselves. The penetration tester acquires human based social engineering techniques in different ways, some of the methods are as follows: a. Impersonation In this type of social-engineering attack, the hacker operates the system as an employee or valid user on the system. The hacker can gain physical access to the system by pretending to be a worker, employee, or contractor of that particular organization. b. Posing as an important user In this type of attack, the hacker pretends as he is a highlevel person who has the authority to use computer systems or documents. Most of the time, the employees don t ask any kind of questions to someone who appears in this position. c. Being a third party In this attack, the hacker has to get permission from an authorized person to operate the computer system. This method works when the official/ authorized person is unavailable for some time in the organization. d. Desktop support Calling tech support for assistance is a classic socialengineering technique. Help desk and technical are trained to help users, which makes this technique very useful for social engineering. e. Shoulder surfing Shoulder surfing is the technique of gathering passwords by watching over a person s shoulder while he is logging in to the system. A hacker can monitors a valid user log in and then use that password to gain access to the system. f. Dumpster diving Dumpster diving involves looking in the trash for information written on pieces of paper or printouts of computer. The hacker can often find passwords, filenames, or other type of confidential information [3]. 2. Computer based social engineering Computer-based social engineering uses computer software that attempts to retrieve the desired information. In the computer based social engineering the tester operates so many tools and fraud/obfuscation techniques, in this the tester opt the phishing pages also to get the sensitive information of the organization. The testers operate the social networking websites, s, viruses, spywares etc to retrieve information of the system. There are so many computer based social engineering techniques used in social engineering, some of them are as follows: a. Phishing Phishing involves fake s or websites designed to imitate real systems with the goal of capturing sensitive data. A message might be come from a bank or other well-known organization to verify your login information, through which the attacker can get sensitive information. b. Baiting Baiting involves dangling something you want to entice you to take action the hacker s wishes. Phishing can be done through downloads on a peer-to-peer website or it can be a USB flash drive with a company logo labeled Executive Salary Summary Q left out in the open for you to find. Then, once the device is downloaded, the person or company s computer system is infected with malicious code allowing the hacker to penetrate into your system. c. Online scams s sent by scammers may have attachments that include malicious code inside the attachment. Those attachments can include key loggers to capture users passwords, viruses, Trojans, or worms and pop up windows can also be used in social engineering attacks. The Pop-up windows that advertise special offers may excite users to unintentionally install malicious software on their systems. d. Vishing 582 P a g e

3 The vishing technique involves performing phishing on phone, typically using voice over IP technology. The main target of this technique is financial organizations, institution, government organizations, online sales, payment services and so on. It gains the information about target s payment card information, passport number, bank account etc. e. Using social networking sites The tester gains the information from the chat rooms and the social networking websites, which are very popular in present era. The tester can gather the information from the facebook, orkut, hi-5, my-space by visiting their profiles. f. Using video recording tools to capture images Recording tools can be used to capture screenshots of a victim s computer screen. This activity can provide the critical information of password, credentials, personal information etc [3]. IV. NEED OF SOCIAL ENGINEERING Social engineering helps us to understand the techniques and various approaches to that powerful hacking processes and it will enable you to integrate social engineering within the whole framework of your penetration testing services [6]. We can gain mesmerizing insights into how social engineering techniques, including phishing, telephone, and malicious code injection to get physical access can be used to gather information or manipulate the individuals to perform actions that may aid in an attack [4]. Social Engineering is an aspect of intrusion the makes use of vulnerabilities in the non-technical aspects of the system. In the technological area, social engineering relates to unauthorized access of computing resources or network by exploiting human weaknesses [5]. Whatever you do to intrude in particular network, or to raise your access is a part of penetration testing. If you are able to get users to loop hole of the system, some kind of information that gain access to something, then you are doing that things which a real attacker would have been able to do. We can use the phishing technique or other technique to gain physical access or we can say them to disable a firewall. We can be able to get them under the false positive, through their own carelessness, or by other means to do unexpected tasks and the other techniques you do can also be included in part of a pen-test. V. LITERATURE SURVEY In [8] Lech. J Janczewski and Lingyan {Rene} Fu had described the major aspects and underling construct of social engineering. They construct a conceptual model of social engineering attacks.a case study was undertaken to understand the phenomenon of new zealand based IT practitioners to contribute insightful opinions, on the basis of this an improved model of social engineering based attacks was formulated. In [9] Markus Huber, Stewart Kowalski, Marcus Nohlberg and Simon Tjoa had described a growing number of people use social networking sites to foster social relationships among each other. While the advantages of the provided services are obvious, drawbacks on a user s privacy and arising implications are often neglected. The promising results of the evaluation highlight the possibility to efficiently and effectively perform social engineering attacks by applying automated social engineering. In [10] Frank L. Greitzer, Jeremy R. Strozer, Sholom Cohen, Andrew P. Moore, David Mundie and Jennifer Cowley had described the Organizations often suffer harm from individuals who bear no malice against them but whose actions unintentionally expose the organizations to risk the unintentional insider threat and inform future research and development of UIT mitigation strategies. In [11] Anubhav Chitrey, Dharmendra Singh, Monark Bag and Vrijendra Singh had described the research identified many participating entities in Social Engineering based Attacks and each identified entity of this research is a research area in itself. Their model can be used in development of Organization-wide Information Security policy and Information Security Awareness Program. In [12] Danesh Irani, Marco Balduzzi, Davide Balzarotti Engin Kirda, and Calton Pu, had presented the first user study on how attackers can abuse some of the features provided by online social networks with the aim of launching automated reverse social engineering attacks. They present and study the effectiveness and feasibility of three novel attacks: Recommendation-based, visitor tracking-based, and demographic-based reverse social engineering. In [13] Xin (Robert) Luo, Richard Brody and Alessandro Seazzu Stephen Burd showed that Social engineering is a technique used by malicious attackers to gain access to desired information by exploiting the flaws in human logic known as cognitive biases. Social engineering is a potential threat to information security and should be considered equally important to its technological counterparts. VI. DISCUSSION In this, we are using information gathering technique i.e. social engineering to determine where the most valuable information resides in social networking websites. It also determines the best way to gain access to the target and then hack them. Social engineering obtains critical information about an organization/website which ultimately leads to an attack. In our work, we attempt to hack particular individual s facebook account with the help of social Engineering technique. A human based interaction technique to retrieve desired information about their interest. Case Study: In this, we attempt to penetrate the facebook site with the vulnerability in URL of the facebook profile link. 583 P a g e

4 Using this loophole we can hack someone s account if there is no strong privacy implied on it. We first, copy the stuff i.e. individual`s particular profile ID i.e. the stuff written after the forward slash in the URL Now open the login page and then click on the forget password and now paste that particular stuff in that area. After that a window will open. There will be option of recovering the account through the address or phone and there is also the option shown as can t access to these. With the help of this method, we can penetrate someone s social site account. Preventions: There are some steps, to follow that protect your account from hacking: 1. Update- The old version of facebook website is vulnerable so use the updated version of facebook website with more security patches. 2. Make sure that you must login your account in 24 hours. 3. We should penetrate our account so that no one can get access to it. 4. Bound the amount - Bound the amount of personal information you post on your profile. Do not upload information such as your residential address or information about your upcoming schedule or your daily routine activities. Also be attentive when posting information, including photos, videos and other media content. 5. Beware of strangers - The internet makes it very easy for the individual`s to misrepresent their personal identities on social sites. It is always recommended to bound the individuals who contact you on these social websites or even not to add the stranger`s to your account. If you interact with unknown persons, be attentive about the information you update or share on your profile. 6. Evaluate your settings Always update with the site's privacy settings. The default settings allow anyone to see your profile, but you may have an option to moderate the access to certain individuals by customize your settings. Websites may change their features periodically, so make sure you check the security settings of your profile regularly to make sure that your permissions are still appropriate or not. 7. Beware of third-party applications The third-party applications provides numerous functionality and entertainment facilities to all, but we have to aware about the caution and common-sense when deciding which applications can access your personal information. Avoid applications that seem suspicious, and make sure to modify your settings to limit the information which the suspicious applications can access [16]. 8. Be cautious while posting your photo- Ensure that the photo you uploaded does not show`s your actual whereabouts [15]. 9. Donot post your current location - Posting these kind of information on social networking website is like a invitation to criminals. VII. CONCLUSION In the end, we analyze that on facebook s website, some accounts are not secure. There can be the loop holes in it. So don t upload any sensitive information on social networking websites and not even add the strangers to your account. Average users of social sites do not realize that restricting access to their information does not sufficiently address the risks rising from the amount, quality and persistence of information they provide. Restricting the profile visibility to friends only or only me simply means restricting it within the specific portion. Also, if someone sends you the links on social websites, don t click on them; malicious code can be attached to it which can helps the hacker to make backdoors to the system that results in the physical access to your system. In computers world, no one thing is secure, we should get aware of the techniques with which we can secure our social account. REFERENCES [1] Thapar, A. Social Engineering: An Attack Vector Most Intricate to Tackle, Infosec Writers, [2] Huber, M., Kowalski, S., Nohlberg, M. and Tjoa, S., Towards automating social engineering using social networking sites, Vol. 3, pp , [3] Malcolm Allen, A MEANS TO VIOLATE A COMPUTER SYSTEM, SANS Institute InfoSec, June [4] Richard Ackroyd, Andrew Mason and Gavin Watson, Social Engineering Penetration Testing Publisher, Elsevier Science, April [5] 5.Karen Scarfone Murugiah Souppaya Amanda Cody Angela Orebaugh, Technical Guide to Information Security Testing and Assessment, Special Publication [6] Gavin Watson, Andrew Mason and Richard Ackroyd, Social Engineering Penetration Testing-Executing Social Engineering Pen Tests, Assessments and Defense, ISBN: , Imprint: SYNGRESS, Published: April [7] Inderjit Kaur, Er. Gurjot Singh and Suman Khurana, Analyzing the Vulnerabilities in Social Networking Websites and their Prevention, International Journal of Computer and Communication System Engineering, Vol. 2 (3), pp. no , [8] Lech J. Janczewski and Lingyan(Rene) Fu - Social Engineering-Based Attacks Model and New Zealand Perspective ISSN [9] Markus Huber, Stewart Kowalsk, Marcus Nohlberg and Simon Tjoa, Towards Automating Social Engineering Using Social Networking Sites- AT-1040, Vienna, Austria. [10] Frank L. Greitzer Jeremy R. Strozer, Sholom Cohen, Andrew P. Moore, David Mundie and Jennifer Cowley, Analysis of Unintentional Insider Threats Deriving from Social Engineering Exploits, 2014 IEEE Security and Privacy Workshops. [11] Anubhav Chitrey, Dharmendra Singh, Monark Bag, Vrijendra Singh, A Comprehensive Study of Social 584 P a g e

5 Engineering Based Attacks in India to Develop a Conceptual Model, ISSN: [12] Danesh Irani, Marco Balduzzi Davide Balzarotti, Engin Kirda and Calton Pu - Reverse Social Engineering Attacks in Online Social Networks. [13] Xin (Robert) Luo, Richard Brody, Alessandro Seazzu and Stephen Burd, Social Engineering: The Neglected Human Factor for Information Security Management, Information Resources Management Journal, 24(3), 1-8, July- September [14] M. Milton Joe, Dr.B. Ramakrishan, Enhancing Security Module to Prevent Data Hacking in Online Social Networks, JOURNAL OF EMERGING TECHNOLOGIES IN WEB INTELLIGENCE, VOL. 6, NO. 2, MAY [15] Dr. Biswajit Das and Jyoti Shankar Sahoo, Social Networking Sites A Critical Analysis of Its Impact on Personal and Social Life, nternational Journal of Business and Social Science, pp no , Vol. 2 No. 14. [16] Abhishek Kumar, Subham Kumar Gupta, Animesh Kumar Rai and Sapna Sinha, [17] Social Networking Sites and Their Security Issues, International Journal of Scientific and Research Publications, Volume 3, Issue 4, April P a g e

A Comprehensive Study of Social Engineering Based Attacks in India to Develop a Conceptual Model

A Comprehensive Study of Social Engineering Based Attacks in India to Develop a Conceptual Model Institute of Advanced Engineering and Science International Journal of Information & Network Security (IJINS) Vol.1, No.2, June 2012, pp. 45~53 ISSN: 2089-3299 45 A Comprehensive Study of Social Engineering

More information

Learn to protect yourself from Identity Theft. First National Bank can help.

Learn to protect yourself from Identity Theft. First National Bank can help. Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone

More information

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers. Employee Security Awareness Survey Trenton Bond trent.bond@gmail.com Admin - Version 1.3 Security Awareness One of the most significant security risks that organizations and corporations face today is

More information

An Introduction on How to Better Protect Your Computer and Sensitive Data

An Introduction on How to Better Protect Your Computer and Sensitive Data An Introduction on How to Better Protect Your Computer and Sensitive Data Common Security Problems Computer users who fail to use strong passwords Constant attacks by viruses, worms, key loggers and bots

More information

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft

More information

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One End User Security, IS Control Evaluation & Self- Assessment Information Security Trends and Countermeasures

More information

Social Engineering Test Cases June 9th, 2009

Social Engineering Test Cases June 9th, 2009 Compass Security AG Glärnischstrasse 7 CH-8640 Rapperswil T +41 55 214 41 60 F +41 55 214 41 61 www.csnc.ch Social Engineering Test Cases June 9th, 2009 Document Name: Social_Engineering_V2.0.docx Version:

More information

Guide to Preventing Social Engineering Fraud

Guide to Preventing Social Engineering Fraud Guide to Preventing Social Engineering Fraud GUIDE TO PREVENTING SOCIAL ENGINEERING FRAUD CONTENTS Social Engineering Fraud Fundamentals and Fraud Strategies... 4 The Psychology of Social Engineering (And

More information

WEB ATTACKS AND COUNTERMEASURES

WEB ATTACKS AND COUNTERMEASURES WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in

More information

Infocomm Sec rity is incomplete without U Be aware,

Infocomm Sec rity is incomplete without U Be aware, Infocomm Sec rity is incomplete without U Be aware, responsible secure! HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD [ 2 ] FASTEN

More information

A Proposed Architecture of Intrusion Detection Systems for Internet Banking

A Proposed Architecture of Intrusion Detection Systems for Internet Banking A Proposed Architecture of Intrusion Detection Systems for Internet Banking A B S T R A C T Pritika Mehra Post Graduate Department of Computer Science, Khalsa College for Women Amritsar, India Mehra_priti@yahoo.com

More information

Cyber Security. Securing Your Mobile and Online Banking Transactions

Cyber Security. Securing Your Mobile and Online Banking Transactions Cyber Security Securing Your Mobile and Online Banking Transactions For additional copies or to download this document, please visit: http://msisac.cisecurity.org/resources/guides 2014 Center for Internet

More information

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

PROTECT YOUR COMPUTER AND YOUR PRIVACY! PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That

More information

Retail/Consumer Client. Internet Banking Awareness and Education Program

Retail/Consumer Client. Internet Banking Awareness and Education Program Retail/Consumer Client Internet Banking Awareness and Education Program Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 E-mail Risk... 3 Internet

More information

Common Cyber Threats. Common cyber threats include:

Common Cyber Threats. Common cyber threats include: Common Cyber Threats: and Common Cyber Threats... 2 Phishing and Spear Phishing... 3... 3... 4 Malicious Code... 5... 5... 5 Weak and Default Passwords... 6... 6... 6 Unpatched or Outdated Software Vulnerabilities...

More information

Identity Theft Protection

Identity Theft Protection Identity Theft Protection Email Home EDUCATION on DANGER ZONES Internet Payments Telephone ID theft occurs when someone uses your personal information with out your knowledge to commit fraud. Some terms

More information

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks White paper Phishing, Vishing and Smishing: Old Threats Present New Risks How much do you really know about phishing, vishing and smishing? Phishing, vishing, and smishing are not new threats. They have

More information

Security Practices for Online Collaboration and Social Media

Security Practices for Online Collaboration and Social Media Cisco IT Best Practice Collaboration Security Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media January 2012 2013 Cisco and/or its affiliates. All rights reserved.

More information

Cybercrime Prevention and Awareness

Cybercrime Prevention and Awareness April, 2014 Cybercrime Prevention and Awareness Basic Security Principles to Help You Better Navigate Through Cyberspace To join conference call dial (305) 433-6663 option 4 PIN # 42014 Presented by: Miguel

More information

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange The responsibility of safeguarding your personal information starts with you. Your information is critical and it must be protected from unauthorised disclosure, modification or destruction. Here we are

More information

Countermeasures against Spyware

Countermeasures against Spyware (2) Countermeasures against Spyware Are you sure your computer is not infected with Spyware? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Spyware?

More information

AUTHOR CONTACT DETAILS

AUTHOR CONTACT DETAILS AUTHOR CONTACT DETAILS Name Dinesh Shetty Profile Information Security Consultant Email ID dinesh.shetty@live.com Social Engineering Cyber security is an increasingly serious issue for the complete world

More information

What you need to know to keep your computer safe on the Internet

What you need to know to keep your computer safe on the Internet What you need to know to keep your computer safe on the Internet Tip 1: Always install Operating System updates The most important steps for any computer user is to always install updates, especially security

More information

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current

More information

Social Network Security. Frank K. F. Chow Vice-Chairperson Professional Information Security Association (PISA)

Social Network Security. Frank K. F. Chow Vice-Chairperson Professional Information Security Association (PISA) Social Network Security Frank K. F. Chow Vice-Chairperson Professional Information Security Association (PISA) How Do We Communicate Today? I can write you a letter by snail mail. I can write you a letter

More information

Issues in Information Systems Volume 15, Issue I, pp. 81-87, 2014

Issues in Information Systems Volume 15, Issue I, pp. 81-87, 2014 SECURITY REQUIREMENTS IN SOCIAL NETWORKS Mehdi Sagheb-Tehrani (PhD), Columbus State University, tehrani_mehdi@columbusstate.edu Arbi Ghazarian (PhD), Arizona State University, Arbi.Ghazarian@asu.edu ABSTRACT

More information

Client logo placeholder XXX REPORT. Page 1 of 37

Client logo placeholder XXX REPORT. Page 1 of 37 Client logo placeholder XXX REPORT Page 1 of 37 Report Details Title Xxx Penetration Testing Report Version V1.0 Author Tester(s) Approved by Client Classification Confidential Recipient Name Title Company

More information

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER WHITE PAPER CHALLENGES Protecting company systems and data from costly hacker intrusions Finding tools and training to affordably and effectively enhance IT security Building More Secure Companies (and

More information

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Lee Zelyck Network Administrator Regina Public Library Malware, Spyware, Trojans

More information

Technical Testing. Application, Network and Red Team Testing DATA SHEET. Test your security defenses. Expert Testing, Analysis and Assessments

Technical Testing. Application, Network and Red Team Testing DATA SHEET. Test your security defenses. Expert Testing, Analysis and Assessments DATA SHEET Technical Testing Application, Network and Red Team Testing The Dell SecureWorks Technical Testing services deliver the independent expertise, experience and perspective you need to enhance

More information

Defense Media Activity Guide To Keeping Your Social Media Accounts Secure

Defense Media Activity Guide To Keeping Your Social Media Accounts Secure Guide To Keeping Your Social Media Accounts Secure Social media is an integral part of the strategic communications and public affairs missions of the Department of Defense. Like any asset, it is something

More information

Phishing Scams Security Update Best Practices for General User

Phishing Scams Security Update Best Practices for General User Phishing Scams Security Update Best Practices for General User hishing refers to the malicious attack Pmethod by attackers who imitate legitimate companies in sending emails in order to entice people to

More information

Corporate Account Takeover & Information Security Awareness. Customer Training

Corporate Account Takeover & Information Security Awareness. Customer Training Corporate Account Takeover & Information Security Awareness Customer Training No computer system can provide absolute security under all conditions. NO SECURITY MEASURE OR LIST OF SECURITY MEASURES CAN

More information

Corporate Account Takeover & Information Security Awareness

Corporate Account Takeover & Information Security Awareness Corporate Account Takeover & Information Security Awareness The information contained in this session may contain privileged and confidential information. This presentation is for information purposes

More information

THE HOME LOAN SAVINGS BANK. Corporate Account Takeover & Information Security Awareness

THE HOME LOAN SAVINGS BANK. Corporate Account Takeover & Information Security Awareness THE HOME LOAN SAVINGS BANK Corporate Account Takeover & Information Security Awareness The information contained in this session may contain privileged and confidential information. This presentation is

More information

Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media

Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media January 2012 Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media January 2012 All contents are Copyright 1992 2012 Cisco Systems, Inc. All rights reserved. This document

More information

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,

More information

HACKERS vs. THE I.T. TEAM

HACKERS vs. THE I.T. TEAM HACKERS vs. THE I.T. TEAM IT Staff Multifaceted role As custodians of the network your responsibilities include: supporting servers networking hardware Infrastructure disaster recovery workstations operating

More information

TRAINING FOR AMERICAN MOMENTUM BANK CLIENTS. Corporate Account Takeover & Information Security Awareness

TRAINING FOR AMERICAN MOMENTUM BANK CLIENTS. Corporate Account Takeover & Information Security Awareness TRAINING FOR AMERICAN MOMENTUM BANK CLIENTS Corporate Account Takeover & Information Security Awareness The information contained in this session may contain privileged and confidential information. This

More information

Mifflinburg Bank & Trust. Corporate Account Takeover & Information Security Awareness

Mifflinburg Bank & Trust. Corporate Account Takeover & Information Security Awareness Mifflinburg Bank & Trust Corporate Account Takeover & Information Security Awareness The information contained in this session may contain privileged and confidential information. This presentation is

More information

Information Security. Louis Morgan, CISSP Information Security Officer

Information Security. Louis Morgan, CISSP Information Security Officer Information Security By Louis Morgan, CISSP Information Security Officer Why Bother with IT Security? Recent estimate - 900 million personal computers worldwide. Computer hackers are out there. How long

More information

Information Security Awareness

Information Security Awareness Corporate Account Takeover & Corporate Account Takeover & Information Security Awareness The information contained in this session may contain privileged and confidential information. This presentation

More information

Computer Security Literacy

Computer Security Literacy Computer Security Literacy Staying Safe in a Digital World Douglas Jacobson and Joseph Idziorek CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor & Francis

More information

Universities and Schools Under Cyber-Attack: How to Protect Your Institution of Excellence

Universities and Schools Under Cyber-Attack: How to Protect Your Institution of Excellence Universities and Schools Under Cyber-Attack: How to Protect Your Institution of Excellence About ERM About The Speaker Information Security Expert at ERM B.S. Software Engineering and Information Technology

More information

INFOCOMM SEC RITY. is INCOMPLETE WITHOUT. Be aware, responsible. secure!

INFOCOMM SEC RITY. is INCOMPLETE WITHOUT. Be aware, responsible. secure! INFOCOMM SEC RITY is INCOMPLETE WITHOUT Be aware, responsible secure! U HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD FASTEN UP!

More information

OIG Fraud Alert Phishing

OIG Fraud Alert Phishing U.S. EQUAL EMPLOYMENT OPPORTUNITY COMMISSION Washington, D.C. 20507 Office of Inspector General Aletha L. Brown Inspector General July 22, 2005 OIG Fraud Alert Phishing What is Phishing? Phishing is a

More information

The Importance of Security Awareness Training

The Importance of Security Awareness Training SECURITY The Importance of Security Awareness Training Security Awareness Training provides the knowledge to protect information systems and sensitive data from internal and external threats. Online security

More information

NATIONAL CYBER SECURITY AWARENESS MONTH

NATIONAL CYBER SECURITY AWARENESS MONTH NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the

More information

What are the common online dangers?

What are the common online dangers? ONLINE SECURITY GUIDELINES Internet Banking is convenient and times saving. You can do remittances, place online deposit and other transactions through online banking with the convenience and privacy of

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

82-10-43 Social Engineering and Reverse Social Engineering Ira S. Winkler Payoff

82-10-43 Social Engineering and Reverse Social Engineering Ira S. Winkler Payoff 82-10-43 Social Engineering and Reverse Social Engineering Ira S. Winkler Payoff Social engineering is the term that hackers use to describe attempts to obtain information about computer systems through

More information

Malware & Botnets. Botnets

Malware & Botnets. Botnets - 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online

More information

Information Security Summit 2005

Information Security Summit 2005 Information Security Summit 2005 Forensically Sound Information Security Management in a Risk Compliance Era Keynote Opening Address by Mr. Howard C Dickson Government Chief Information Officer Government

More information

white paper Malware Security and the Bottom Line

white paper Malware Security and the Bottom Line Malware Security Report: Protecting Your BusineSS, Customers, and the Bottom Line Contents 1 Malware is crawling onto web sites everywhere 1 What is Malware? 2 The anatomy of Malware attacks 3 The Malware

More information

2012 North Dakota Information Technology Security Audit Vulnerability Assessment and Penetration Testing Summary Report

2012 North Dakota Information Technology Security Audit Vulnerability Assessment and Penetration Testing Summary Report 2012 North Dakota Information Technology Security Audit Vulnerability Assessment and Penetration Testing Summary Report 28 September 2012 Submitted to: Donald Lafleur IS Audit Manager ND State Auditor

More information

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out

More information

Best Practices Guide to Electronic Banking

Best Practices Guide to Electronic Banking Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have

More information

Protecting your business from fraud

Protecting your business from fraud Protecting your business from fraud KEY TAKEAWAYS > Understand the most common types of fraud and how to identify them. > What to do if you uncover fraudulent activity or suspect you are a victim of fraud.

More information

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies Cyber Security in Taiwan's Government Institutions: From APT To Investigation Policies Ching-Yu, Hung Investigation Bureau, Ministry of Justice, Taiwan, R.O.C. Abstract In this article, we introduce some

More information

How To Protect Your Online Banking From Fraud

How To Protect Your Online Banking From Fraud DETECT MONITORING SERVICES AND DETECT SAFE BROWSING: Empowering Tools to Prevent Account Takeovers SUMMARY The Federal Financial Institutions Examination Council (FFIEC) is planning to update online transaction

More information

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details: Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for

More information

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,

More information

Intrusion Detection. Tianen Liu. May 22, 2003. paper will look at different kinds of intrusion detection systems, different ways of

Intrusion Detection. Tianen Liu. May 22, 2003. paper will look at different kinds of intrusion detection systems, different ways of Intrusion Detection Tianen Liu May 22, 2003 I. Abstract Computers are vulnerable to many threats. Hackers and unauthorized users can compromise systems. Viruses, worms, and other kinds of harmful code

More information

Identity Theft. Providing Your Student with a Safety Net By Sun Ow

Identity Theft. Providing Your Student with a Safety Net By Sun Ow Identity Theft Providing Your Student with a Safety Net By Sun Ow 34% of identity theft victims are college students Did You Know Only 24% of fraudulent charges were first caught by a consumer s financial

More information

HIPAA Training Part III. Health Insurance Portability and Accountability Act

HIPAA Training Part III. Health Insurance Portability and Accountability Act HIPAA Training Part III Health Insurance Portability and Accountability Act POLICIES & PROCEDURES Goals Learn simple ways to protect information. Learn how to continually give training. Learn how to continually

More information

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere.

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere. Benefits & Features CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere. What can I do with Internet Banking? You can inquire

More information

A B S T R A C T. Index Terms : Framework, threats, skill, social engineering, risks, insider. I. INTRODUCTION

A B S T R A C T. Index Terms : Framework, threats, skill, social engineering, risks, insider. I. INTRODUCTION A Framework to Mitigate the Social Engineering Threat to Information Security Rakesh Kumar*, Dr Hardeep Singh. Khalsa college for women, Amritsar, Guru Nanak Dev University, Amritsar rakeshmaster1980@rediffmail.com*,

More information

Acceptable Usage Guidelines. e-governance

Acceptable Usage Guidelines. e-governance Acceptable Usage Guidelines for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S/L Type

More information

Technical Testing. Network Testing DATA SHEET

Technical Testing. Network Testing DATA SHEET DATA SHEET Technical Testing Network Testing The Dell SecureWorks Technical Testing services deliver the independent expertise, experience and perspective you need to enhance your security posture, reduce

More information

Don t Fall Victim to Cybercrime:

Don t Fall Victim to Cybercrime: Don t Fall Victim to Cybercrime: Best Practices to Safeguard Your Business Agenda Cybercrime Overview Corporate Account Takeover Computer Hacking, Phishing, Malware Breach Statistics Internet Security

More information

Must score 89% or above. If you score below 89%, we will be contacting you to go over the material individually.

Must score 89% or above. If you score below 89%, we will be contacting you to go over the material individually. April 23, 2014 Must score 89% or above. If you score below 89%, we will be contacting you to go over the material individually. What is it? Electronic Protected Health Information There are 18 specific

More information

BE SAFE ONLINE: Lesson Plan

BE SAFE ONLINE: Lesson Plan BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take

More information

Web Vulnerability Scanner by Using HTTP Method

Web Vulnerability Scanner by Using HTTP Method Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 9, September 2015,

More information

Student Tech Security Training. ITS Security Office

Student Tech Security Training. ITS Security Office Student Tech Security Training ITS Security Office ITS Security Office Total Security is an illusion security will always be slightly broken. Find strategies for living with it. Monitor our Network with

More information

Computer Network and Internet Security Awareness and Responsible Use. Indian River County School District 2014-2015

Computer Network and Internet Security Awareness and Responsible Use. Indian River County School District 2014-2015 Computer Network and Internet Security Awareness and Responsible Use Indian River County School District 2014-2015 1 Through the availability of electronic resources provided by the School District of

More information

Welcome to Information Security Training

Welcome to Information Security Training Welcome to Information Security Training Welcome to Georgia Perimeter College s Information Security Training. Information security consists of processes, measures, and technologies employed to protect

More information

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent

More information

Effective Software Security Management

Effective Software Security Management Effective Software Security Management choosing the right drivers for applying application security Author: Dharmesh M Mehta dharmeshmm@mastek.com / dharmeshmm@owasp.org Table of Contents Abstract... 1

More information

Protecting Yourself from Identity Theft

Protecting Yourself from Identity Theft Protecting Yourself from Identity Theft Identity theft is everywhere. In fact, according to a 2013 report by Javelin Research, there is one incident of identity fraud every two seconds. While we cannot

More information

Network and Host-based Vulnerability Assessment

Network and Host-based Vulnerability Assessment Network and Host-based Vulnerability Assessment A guide for information systems and network security professionals 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free:

More information

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015 Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence AIBA Quarterly Meeting September 10, 2015 The Answer 2 Everyone The relationship between the board, C-suite, IT, and compliance leaders

More information

Kali Linux Social Engineering

Kali Linux Social Engineering Kali Linux Social Engineering Rahul Singh Patel Chapter No. 1 "Introduction to Social Engineering Attacks" In this package, you will find: A Biography of the author of the book A preview chapter from the

More information

EXIN Information Security Foundation based on ISO/IEC 27002. Sample Exam

EXIN Information Security Foundation based on ISO/IEC 27002. Sample Exam EXIN Information Security Foundation based on ISO/IEC 27002 Sample Exam Edition June 2016 Copyright 2016 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored

More information

Banking Security using Honeypot

Banking Security using Honeypot Banking Security using Honeypot Sandeep Chaware D.J.Sanghvi College of Engineering, Mumbai smchaware@gmail.com Abstract New threats are constantly emerging to the security of organization s information

More information

1. Threat Types Express familiarity with different threat types such as Virus, Malware, Trojan, Spyware, and Downloaders.

1. Threat Types Express familiarity with different threat types such as Virus, Malware, Trojan, Spyware, and Downloaders. Threat Protection Tools and Best Practices Objectives 1. Threat Types Express familiarity with different threat types such as Virus, Malware, Trojan, Spyware, and Downloaders. 2. Threat Vectors Be familiar

More information

Information Security Training 2012

Information Security Training 2012 Information Security Training 2012 Authored by: Gwinnett Medical Center Information Security Department Modified for affiliated schools students & instructors by: Linda Horst, RN, BSN, BC Objectives After

More information

IBM Global Technology Services May 2007. The vishing guide. Gunter Ollmann

IBM Global Technology Services May 2007. The vishing guide. Gunter Ollmann IBM Global Technology Services May 2007 The vishing guide. Gunter Ollmann Page 2 Contents 2 Executice summary 3 What is vishing? 5 Attack vectors 6 Initiating the attack 15 Conclusions Executive summary

More information

COB 302 Management Information System (Lesson 8)

COB 302 Management Information System (Lesson 8) COB 302 Management Information System (Lesson 8) Dr. Stanley Wong Macau University of Science and Technology Chapter 13 Security and Ethical Challenges 安 全 與 倫 理 挑 戰 Remarks: Some of the contents in this

More information

Spyware. Michael Glenn Technology Management Michael.Glenn@Qwest.com. 2004 Qwest Communications International Inc.

Spyware. Michael Glenn Technology Management Michael.Glenn@Qwest.com. 2004 Qwest Communications International Inc. Spyware Michael Glenn Technology Management Michael.Glenn@Qwest.com Agenda Security Fundamentals Current Issues Spyware Definitions Overlaps of Threats Best Practices What Service Providers are Doing References

More information

Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives

Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives Estimated time: 45 minutes Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives Overview: Students learn strategies for guarding against

More information

Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May 2014. TrustInAds.org. Keeping people safe from bad online ads

Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May 2014. TrustInAds.org. Keeping people safe from bad online ads Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams May 2014 TrustInAds.org Keeping people safe from bad online ads OVERVIEW Today, even the most tech savvy individuals can find themselves

More information

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 14 Risk Mitigation

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 14 Risk Mitigation Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 14 Risk Mitigation Objectives Explain how to control risk List the types of security policies Describe how awareness and training

More information

Cyber Security: Beginners Guide to Firewalls

Cyber Security: Beginners Guide to Firewalls Cyber Security: Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers This appendix is a supplement to the Cyber Security: Getting Started

More information

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS $ ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS Boston Private Bank & Trust Company takes great care to safeguard the security of your Online Banking transactions. In addition to our robust security

More information

GUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE

GUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE GUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE Defense Media Activity TABLE OF CONTENTS PROTECTIVE MEASURES... 2 PREPARATION CHECKLIST... 2 IF YOU SUSPECT YOUR ACCOUNT IS COMPROMISED, THE FOLLOWING

More information

IDENTITY THEFT: MINIMIZING YOUR RISK

IDENTITY THEFT: MINIMIZING YOUR RISK IDENTITY THEFT: MINIMIZING YOUR RISK What is Identity Theft? Identity theft occurs when someone uses another person s information to commit fraud or other crimes. Information such as your name, Social

More information

How To Protect The Time System From Being Hacked

How To Protect The Time System From Being Hacked WISCONSIN TIME SYSTEM Training Materials TIME SYSTEM SECURITY AWARENESS HANDOUT Revised 11/21/13 2014 Security Awareness Handout All System Security The TIME/NCIC Systems are criminal justice computer

More information

Dolvara Gunatilaka,dgunatilaka@wustl.edu

Dolvara Gunatilaka,dgunatilaka@wustl.edu 1 of 12 Dolvara Gunatilaka,dgunatilaka@wustl.edu Download Social networking sites such as Facebook and Twitter have gained more popularity in recent years. Because of its large user base, and large amount

More information

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Protect Yourself. Who is asking? What information are they asking for? Why do they need it? Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary

More information

The information contained in this session may contain privileged and confidential information. This presentation is for information purposes only.

The information contained in this session may contain privileged and confidential information. This presentation is for information purposes only. The information contained in this session may contain privileged and confidential information. This presentation is for information purposes only. Before acting on any ideas presented in this session;

More information