Social Engineering Answers PDF
Document Details
Uploaded by StableBagpipes
Coombe Girls' School
Abhinaya Bahirathan
Tags
Summary
This document provides answers to social engineering questions, outlining various prevention measures, examples of attacks, and strategies for organizations to address social engineering risks. It covers techniques for employees to identify and mitigate threats.
Full Transcript
**Pharming** redirects users from legitimate websites to fraudulent ones without their knowledge. This is often achieved by tampering with DNS settings or compromising a legitimate website. **Example:** A user types in a banking website's URL but is redirected to a fake site that harvests their log...
**Pharming** redirects users from legitimate websites to fraudulent ones without their knowledge. This is often achieved by tampering with DNS settings or compromising a legitimate website. **Example:** A user types in a banking website's URL but is redirected to a fake site that harvests their login credentials. **Prevention:** Website Verification: Educate employees to check for HTTPS and the legitimacy of URLs. Antimalware Tools: Deploy software to detect and remove DNS-altering malware. Secure Access: Avoid using public Wi-Fi for accessing sensitive information. **Phishing** involves fraudulent communication (usually emails or texts) that tricks recipients into sharing sensitive data, like passwords or credit card numbers. **Example:** An email impersonating IT support asks employees to reset their password via a malicious link. **Prevention:** Email Filters: Use advanced spam and phishing filters to detect and block fraudulent emails. Training: Educate employees on how to identify phishing attempts, such as suspicious links, sender details, and grammatical errors. Multi-Factor Authentication (MFA): Require MFA for account access to limit damage from stolen credentials. **Blagging (Pretexting)** involves creating a false scenario to trick individuals into revealing sensitive information. Attackers often impersonate trusted authorities or colleagues. **Example:** A caller pretends to be a bank employee verifying account details. **Prevention:** Identity Verification: Train employees to verify identities through independent channels before sharing sensitive information. Strict Policies: Implement clear guidelines for handling sensitive information, including refusing to share it over unverified channels. User Access Rights/Control: Limit employee access to only the data they need for their role. **Shoulder Surfing** Shoulder surfing involves visually eavesdropping on a person's screen, keyboard, or device to steal sensitive information, such as passwords or PINs. **Example:** An attacker observes an employee typing their password in a public space. **Prevention:** Screen Privacy Filters: Use privacy screens to prevent unauthorized viewing of monitors. Secure Workspaces: Design office layouts to reduce the risk of shoulder surfing, such as by placing screens away from public view. Employee Awareness: Train employees to be cautious in public spaces and use physical shielding techniques. **Baiting** entices victims to engage with a malicious item, like a USB drive labeled "Confidential" or a download link for free software. **Example**: An employee plugs in a found USB drive, which installs malware on their computer. **Prevention:** Device Policies: Block unauthorized USB devices or external media on corporate systems. Education: Warn employees about the risks of using unknown devices or downloading unverified files. Endpoint Protection: Use security software to scan and block malicious devices or files. **[General Strategies for Organisations to Prevent Social Engineering Risks]** Security Awareness Training:Regularly educate employees on the latest social engineering techniques and how to identify them. Conduct simulated attacks (e.g., phishing tests) to evaluate and improve staff awareness. Strong Authentication:Enforce the use of multi-factor authentication (MFA) to secure access to systems and accounts. Incident Response Plan: Establish a clear procedure for reporting suspicious activities or breaches to the IT department. Access Controls: Implement role-based access control (RBAC) to limit data exposure to only those who need it for their job. Regular Updates: Ensure systems, software, and firmware are regularly updated to address vulnerabilities. Secure Communication: Use encrypted communication channels for sharing sensitive information (e.g., VPNs, secure email). Monitoring and Auditing: Use monitoring tools to detect unusual behavior, such as multiple failed login attempts or large data transfers. Physical Security: Restrict access to sensitive areas and ensure proper disposal of documents containing confidential information.