


下載本文檔
版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認(rèn)領(lǐng)
文檔簡介
1、social engineering: the human side of hackingby sharon gaudin may 10, 2002: companies spend millions of dollars on firewalls, authentication processes and network monitoring software, but few bother to train employees how to avoid being duped into giving away critical information. a woman calls a co
2、mpany help desk and says shes forgotten her password. in a panic, she adds that if she misses the deadline on a big advertising project her boss might even fire her. the help desk worker feels sorry for her and quickly resets the password - unwittingly giving a hacker clear entrance into the corpora
3、te network. meanwhile, a man is in back of the building loading the companys paper recycling bins into the back of a truck. inside the bins are lists of employee titles and phone numbers, marketing plans and the latest company financials. all free for the taking. hackers, and possibly even corporate
4、 competitors, are breeching companies network security every day. the latest survey by the computer security institute and the fbi shows that 90% of the 503 companies contacted reported break-ins within the last year. what may come as a surprise, according to industry analysts and security experts,
5、is that not every hacker is sitting alone with his computer hacking his way into a corporate vpn or running a program to crack executives passwords. sometimes all they have to do is call up and ask. how to thwart the social engineers: security experts from both government and the private sector offe
6、r suggestions to protect your company from hackers using social engineering techniques. the feds top hacker speaks: keith rhodes, chief technologist with the u.s. general accounting office, discusses what companies should be doing to protect themselves, what risks are looming ahead and what exciting
7、 security technology is coming down the road. theres always the technical way to break into a network but sometimes its easier to go through the people in the company. you just fool them into giving up their own security, says keith a. rhodes, chief technologist at the u.s. general accounting office
8、, which has a congressional mandate to test the network security at 24 different government agencies and departments. companies train their people to be helpful, but they rarely train them to be part of the security process. we use the social connection between people, their desire to be helpful. we
9、 call it social engineering. it works every time, rhodes says, adding that he performs 10 penetration tests a year on agencies such as the irs and the department of agriculture. very few companies are worried about this. every one of them should be. playing off trust social engineering is the human
10、side of breaking into a corporate network. companies with authentication processes, firewalls, vpns and network monitoring software are still wide open to an attack if an employee unwittingly gives away key information in an email, by answering questions over the phone with someone they dont know or
11、 even by talking about a project with coworkers at a local pub after hours. incidents of social engineering are quite high, we believe, says paul robertson, director of risk assessment at herndon, va.-based trusecure corp. a significant portion of the time, people dont even know its happened to them
12、. and with the people who are good at it, their victims dont even know theyve been scammed. robertson says for companies with great security technology in place, its almost always possible to penetrate them using social engineering simply because it preys on the human impulse to be kind and helpful,
13、 and because it executives arent training employees to wary of it. people have been conditioned to expect certain things, says robertson. if you dress in brown and stack a whole bunch of boxes in a cart, people will hold the door open for you because they think youre the delivery guy.sometimes you g
14、rab a pack of cigarettes and stand in the smoking area listening to their conversations. then you just follow them right into the building. guard the perimeter eddie rabinovitch, vice president of global networks and infrastructure operations at stamford, ct.-based cervalis llc, says he is definitel
15、y aware and on alert for various types of security attacks - technical or not. cervalis is a managed hosting and it outsourcing company. we continuously have training about security in general and social engineering in particular, says rabinovitch. people are out there looking for information. theyr
16、e always looking for new ways to get at that information. in many cases, you can deal with it with tools, but it always comes down to procedures and your people. rabinovitch says he deals with social engineering by focusing a lot of training on his people on the perimeter - security guards, receptio
17、nists and help desk workers. for instance, he says security guards are trained to check on visitors if they go out in the smoking area to make sure theyre not handing their admittance badge over to someone else. and he adds that if someone shows up in a utility workers uniform, his visit is confirme
18、d before he is allowed into the building to do any work. rhodes, who has focused on computer security, privacy and e-commerce in his 11 years at the gao, says a lot of companies unwittingly put sensitive information up for grabs. some companies list employees by title and give their phone number and email address on the corporate web site. that allows a hacker to call an office worker and say sally jones in the denver accounting office wants you to change my user id. or rhodes says a company may put ads
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 2025網(wǎng)站開發(fā)合作合同書
- 2025年土地增值合同范本
- 2025外貿(mào)代理合同范本
- 2025資金信托合同(B)信托合同
- 2025高空作業(yè)車租賃合同協(xié)議
- 2025房產(chǎn)贈與合同范本
- 2025年版?zhèn)€人借款合同范本
- 2025普通班的店面租賃合同書
- 電池成品采購合同協(xié)議
- 現(xiàn)場調(diào)試合同協(xié)議書模板
- 高教社馬工程倫理學(xué)(第二版)教學(xué)課件11
- 2025年全國普通話水平測試50套復(fù)習(xí)題庫及答案
- 破釜沉舟成語故事課件全
- 能源行業(yè)碳排放監(jiān)測與減排系統(tǒng)設(shè)計方案
- 《實驗室生物安全》課件
- 攝影師經(jīng)紀(jì)人合作合同
- 手術(shù)室手衛(wèi)生PDCA
- DB31∕T 1038-2017 生態(tài)公益林主要造林樹種苗木質(zhì)量分級
- 【培訓(xùn)課件】跨境服務(wù)免稅政策及管理解讀
- 統(tǒng)編版語文四年級上冊期末復(fù)習(xí)- 一字多義專項選擇題(含答案)
- 學(xué)校墻面彩繪施工合同
評論
0/150
提交評論