


下载本文档
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、social engineering: the human side of hackingby sharon gaudin may 10, 2002: companies spend millions of dollars on firewalls, authentication processes and network monitoring software, but few bother to train employees how to avoid being duped into giving away critical information. a woman calls a co
2、mpany help desk and says shes forgotten her password. in a panic, she adds that if she misses the deadline on a big advertising project her boss might even fire her. the help desk worker feels sorry for her and quickly resets the password - unwittingly giving a hacker clear entrance into the corpora
3、te network. meanwhile, a man is in back of the building loading the companys paper recycling bins into the back of a truck. inside the bins are lists of employee titles and phone numbers, marketing plans and the latest company financials. all free for the taking. hackers, and possibly even corporate
4、 competitors, are breeching companies network security every day. the latest survey by the computer security institute and the fbi shows that 90% of the 503 companies contacted reported break-ins within the last year. what may come as a surprise, according to industry analysts and security experts,
5、is that not every hacker is sitting alone with his computer hacking his way into a corporate vpn or running a program to crack executives passwords. sometimes all they have to do is call up and ask. how to thwart the social engineers: security experts from both government and the private sector offe
6、r suggestions to protect your company from hackers using social engineering techniques. the feds top hacker speaks: keith rhodes, chief technologist with the u.s. general accounting office, discusses what companies should be doing to protect themselves, what risks are looming ahead and what exciting
7、 security technology is coming down the road. theres always the technical way to break into a network but sometimes its easier to go through the people in the company. you just fool them into giving up their own security, says keith a. rhodes, chief technologist at the u.s. general accounting office
8、, which has a congressional mandate to test the network security at 24 different government agencies and departments. companies train their people to be helpful, but they rarely train them to be part of the security process. we use the social connection between people, their desire to be helpful. we
9、 call it social engineering. it works every time, rhodes says, adding that he performs 10 penetration tests a year on agencies such as the irs and the department of agriculture. very few companies are worried about this. every one of them should be. playing off trust social engineering is the human
10、side of breaking into a corporate network. companies with authentication processes, firewalls, vpns and network monitoring software are still wide open to an attack if an employee unwittingly gives away key information in an email, by answering questions over the phone with someone they dont know or
11、 even by talking about a project with coworkers at a local pub after hours. incidents of social engineering are quite high, we believe, says paul robertson, director of risk assessment at herndon, va.-based trusecure corp. a significant portion of the time, people dont even know its happened to them
12、. and with the people who are good at it, their victims dont even know theyve been scammed. robertson says for companies with great security technology in place, its almost always possible to penetrate them using social engineering simply because it preys on the human impulse to be kind and helpful,
13、 and because it executives arent training employees to wary of it. people have been conditioned to expect certain things, says robertson. if you dress in brown and stack a whole bunch of boxes in a cart, people will hold the door open for you because they think youre the delivery guy.sometimes you g
14、rab a pack of cigarettes and stand in the smoking area listening to their conversations. then you just follow them right into the building. guard the perimeter eddie rabinovitch, vice president of global networks and infrastructure operations at stamford, ct.-based cervalis llc, says he is definitel
15、y aware and on alert for various types of security attacks - technical or not. cervalis is a managed hosting and it outsourcing company. we continuously have training about security in general and social engineering in particular, says rabinovitch. people are out there looking for information. theyr
16、e always looking for new ways to get at that information. in many cases, you can deal with it with tools, but it always comes down to procedures and your people. rabinovitch says he deals with social engineering by focusing a lot of training on his people on the perimeter - security guards, receptio
17、nists and help desk workers. for instance, he says security guards are trained to check on visitors if they go out in the smoking area to make sure theyre not handing their admittance badge over to someone else. and he adds that if someone shows up in a utility workers uniform, his visit is confirme
18、d before he is allowed into the building to do any work. rhodes, who has focused on computer security, privacy and e-commerce in his 11 years at the gao, says a lot of companies unwittingly put sensitive information up for grabs. some companies list employees by title and give their phone number and email address on the corporate web site. that allows a hacker to call an office worker and say sally jones in the denver accounting office wants you to change my user id. or rhodes says a company may put ads
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 供货分销合同样本样本
- 冰淇淋套餐转让合同样本
- 当月生产计划的有效制定
- ups设备销售合同标准文本
- 2025简易借款合同范本
- 农村供水委托运营合同样本
- 农户养殖种植合同范例
- 关于员工劳动合同范例
- 出口家具订购合同样本
- 2025铁路运输合同简易协议书
- 施耐德电气EcoStruxure:智能电网技术教程.Tex.header
- 5维11步引导式学习地图-人才研修院
- 配电线路工(中级)技能鉴定理论考试题库(浓缩400题)
- 2024年重庆市中考英语试卷真题B卷(含标准答案及解析)+听力音频
- (正式版)QB∕T 2761-2024 室内空气净化产品净化效果测定方法
- DL-T-5161.4-2018电气装置安装工程质量检验及评定规程第4部分:母线装置施工质量检验
- CJJ 232-2016 建筑同层排水工程技术规程
- 三菱PLC应用技术培训(讲稿)第一部分
- 医院感染管理与公共卫生培训
- 中国大学mooc《高级财务会计(暨南大学) 》章节测试答案
- 第7课 全球航路的开辟和欧洲早期殖民扩张(教学课件)-【中职专用】《世界历史》(高教版2023•基础模块)
评论
0/150
提交评论