Let us try to understand the concept of Social Engineering attacks through some examples.
Example 1
You
 must have noticed old company documents being thrown into dustbins as 
garbage. These documents might contain sensitive information such as 
Names, Phone Numbers, Account Numbers, Social Security Numbers, 
Addresses, etc. Many companies still use carbon paper in their fax 
machines and once the roll is over, its carbon goes into dustbin which 
may have traces of sensitive data. Although it sounds improbable, but 
attackers can easily retrieve information from the company dumpsters by 
pilfering through the garbage.
Example 2
An
 attacker may befriend a company personnel and establish good 
relationship with him over a period of time. This relationship can be 
established online through social networks, chatting rooms, or offline 
at a coffee table, in a playground, or through any other means. The 
attacker takes the office personnel in confidence and finally digs out 
the required sensitive information without giving a clue.
Example 3
A
 social engineer may pretend to be an employee or a valid user or an VIP
 by faking an identification card or simply by convincing employees of 
his position in the company. Such an attacker can gain physical access 
to restricted areas, thus providing further opportunities for attacks.
Example 4
It happens in most of the cases that an attacker might be around you and can do shoulder surfing while you are typing sensitive information like user ID and password, account PIN, etc.
Phishing Attack
A
 phishing attack is a computer-based social engineering, where an 
attacker crafts an email that appears legitimate. Such emails have the 
same look and feel as those received from the original site, but they 
might contain links to fake websites. If you are not smart enough, then 
you will type your user ID and password and will try to login which will
 result in failure and by that time, the attacker will have your ID and 
password to attack your original account.
Quick Fix
- You should enforce a good security policy in your organization and conduct required trainings to make all the employees aware of the possible Social Engineering attacks and their consequences.
 - Document shredding should be a mandatory activity in your company.
 - Make double sure that any links that you receive in your email is coming from authentic sources and that they point to correct websites. Otherwise you might end up as a victim of Phishing.
 - Be professional and never share your ID and password with anybody else in any case.
 
No comments:
Write comments