Saturday, November 30, 2013

Countermeasures against Social Engineering


Countermeasures against Social Engineering

In my Article published in PenTest Magazine I have discussed the Social Engineering as most Dangerous Weapon used by Hackers. In this Blog Post will Learn the Countermeasures against Social Engineering.

Social Engineering : According to Wiki “Social Engineering is the act of manipulating people into performing actions or divulging confidential information, rather than by breaking in or using technical cracking techniques.”Social Engineering is not a new thing at all it’s the art of lie and to get confidential information to access/Hacked into System.

Social Engineering attacks are one of the hardest threats to defend against because they invole the human element.

à Be suspicious of unsolicited phone calls, visits, or email messages from individuals asking about employees or other internal information. If an unknown individual claims to be from a legitimate organization, try to verify his or her identity directly with the company.

àDo not provide personal information or information about your organization, including its structure or networks, unless you are certain of a person's authority to have the information.

àDo not reveal personal or financial information in email, and do not respond to email solicitations for this information. This includes following links sent in email.

àDon't send sensitive information over the Internet before checking a website's security (see Protecting Your Privacy for more information).

à Pay attention to the URL of a website. Malicious websites may look identical to a legitimate site, but the URL may use a variation in spelling or a different domain (e.g., .com vs. .net).

àIf you are unsure whether an email request is legitimate, try to verify it by contacting the company directly. Do not use contact information provided on a website connected to the request; instead, check previous statements for contact information. Information about known phishing attacks is also available online from groups such as the Anti-Phishing Working Group (http://www.antiphishing.org).

Other Important Points are :

           IT Security and other Units

Physical and IT security personnel often have an uneasy and distant relationship, even in institutions where they share a common node of the management tree.

     IT personnel should at least understand the need for physical controls and have some involvement in the physical securing of IT equipment, especially when sophisticated technical controls such as handheld authentication devices are employed.
     Non-IT security people need at least a basic understanding of how IT hardware hangs together in order to appreciate where the weakness are: not only in terms of sabotage, theft and espionage, but even in terms of accidental damage. In many cases, they’ll be the first line of defence against breaches of the physical perimeter.


General Education

General users should not be expected to become security experts. Indeed, it’s unrealistic to expect them to be particularly IT-literate beyond the requirements of their work. This makes the quality of the educational and other resources available to them particularly important, not only in terms of accuracy and pertinence, but also accessibility. Training and first-line documentation should be as brief and clear as possible, but more detailed resources should be available and known to be available. In particular, such documentation should make as few assumptions as possible about the technical knowledge of the reader: unfortunately, this is not always consistent with the equally pressing requirement that it should be as short as possible.

 Risk Analysis

I hope I’ve convinced you that social engineering is a significant threat. However, it’s seriously under-documented, and committing major resources to deal with a threat many people have never heard of or considered is not always easy. This paper gives some background, but useful statistics are scarce: I can’t point you to a survey which tells you how much a year social engineering costs the ‘average’ organization. Statistics on security breaches in general are easier to come by, but they don’t tell you how much use individual intruders made of social engineering, so you have to approach it from the other end: gathering information on how vulnerable you are to this threat, and what measures are available to counter it.

 Security Policies and Insurance Policies


Security is a cost centre. Like fire insurance, it’s a large expense set against the risk of an attack which may never come, though with social engineering it’s probably truer to say that such attacks are frequent, but not necessarily recognised as such. Security policies aren’t popular: they take time to put together properly and are of no practical use without a realistic educational program to back them up.


Hope this will be helpful for your organisation and for you to stay away from Social Engineers.


No comments:

Post a Comment