8 hours 53 minutes
social engineering refers to techniques used to trick users into giving away useful information to an attacker.
So it involves fooling users into giving away information,
or instant messaging or phones,
or getting a user into click a link in an email to download malicious software
or clicking on a link that takes you to a malicious website
on that website is not what you think it is. For example, you might think you're going to your bank's website, but it may actually be a spoof website that they've set up that looks like your bank's website.
So have a look at this e mail that I received.
So there's an example of a social engineering trick.
So it says, Good morning, Ali. Tonight the I T team will be performing scheduled maintenance on the service.
We're contacting a cross section of star for help with this.
It's already, you know, I'm feeling kind of special because I've been picked out is one of the people.
And they said, carries on after maintenance is complete. We need to verify that the systems are operating normally and users can still log on without a problem.
For this, we're gonna need your password,
please simply hit, reply and just type in your password.
And as you can see, the email appears to come from the director off T,
um, and so on. On trusting an unwary user
might take that at face value, hit the reply button
and type in the password.
And they've just given away their password to whoever sent that email.
But worse than that,
just opening that email could have downloaded or attempted to download a virus.
If you look down here,
you'll see that there was an attempt to download a virus.
Fortunately, that failed because I have an anti virus program running that detected that this was militias and prevented it from getting downloaded.
Or what about this?
is fairly alarming.
Security alert. Your account has been compromised. You must click this link and update your password immediately.
So social engineering often works by creating a sense of panic or urgency. So people stop thinking rationally or being careful.
So if we look at this e mail,
you'll see up there, says Bank of America. There's the official logo, online banking.
All of that looks real,
but if you look down here.
Look at that. You are l
at a quick glance. It says Bank of America.
But actually it says back of America.
So what would happen? Clicking on that link
would take you to a fake website that again would look like the bank's website.
And because you've just been told your account's been compromised,
what you would see on that website is a message, apparently from your bank saying, because your account has been compromised, you need to do the following please enter your current password and then choose a new one.
Now the moment you enter your current password
that captured it.
And then before you realize what's happened, they're locking on to Bank of America with your credentials
on possibly emptying your bank account
on some social engineering doesn't have to be all that sophisticated.
So this was a kind of informal survey
done at Liverpool Street Station in London
and what they did well, just stop passers by and they offered them chocolate in return for their passwords.
70% of people said yes, they would reveal their password in exchange for a bar of chocolate,
but what really a standing is that 34% of respondents volunteered their password without even needing to be bribed with chocolate.
Now, of course, this is not a scientific survey. Because, of course, what most people would do is say, Okay, give me the chocolate and they tell you a fake password, not their real one,
but still, the fact that they didn't just say
Get out of here, you don't know. I'm not giving you my password.
That's a bit worrying.
Fishing refers to try to obtain a user's information using email,
so you've seen a couple of examples of that. So there was, what, the first email that tried to get my password,
and then the second email tried to get me to go to a fake website.
So very often these said, Dad, this is These are sent out as spam.
Spam is answer solicited E mail being sent out randomly to maybe thousands or millions of users.
Fishing is the same kind of thing, but done by phone. So instead of getting that email asking me for my password,
I could have received a phone call
and the phone call might have gone like this.
Hi, this is the I T department here We're going to be doing some maintenance tonight, and we need to verify off. The maintenance is complete. That I use is constant log on. So, Ali, could you let me know your password?
And if I get if I'm not
being careful, I might just reply to it and give him the password, because apparently it's somebody from the I T department that's calling
spearfishing relies on targeting particular uses,
for example, stuff in your finance department.
Now that requires having some prior knowledge of the company, so this often involves earlier reconnaissance.
But once I figured I
somebody who works in the Finance Department, I could send them an email.
And then I could attach to that email
they wouldn't think is unusual.
Cyclops Circe This email is a receipt or an invoice
with a little link that says, Download the receipt or download the invoice.
So because that's the kind of email they expect to get,
they caught off guard and they click on the link. And the moment they do that, militants software's downloaded to their system.
And to take that one step further, we have wailing.
Wailing refers to targeting high value individuals such as your CEO or your chief financial officer.
That again requires some reconnaissance, having figured out who these people are and then sending the emails to them.
So that brings us to united the issue. Spam suspend generally is just unsolicited. Email often send our center randomly.
Sometimes it just contains advertisements, and it's not malicious.
But sometimes it is malicious, contains malicious attachments, or it contains links. When you click on them, they download.
We are Malicious Software will take you to fake websites.
Spam can be blocked at the perimeter of the network,
meaning at the point where your network connects to the Internet.
You can have appliances such as those made by Barrack Oda that monitor all your incoming email,
and they look for spire meant. Block that,
and they also look for malicious attachments for malicious links with an email
so that could be one layer of security.
But then that email. If all the email that gets past that appliance gets delivered to your mail server,
so you can also do checking at the mail server
and then when users download their email from the mail server.
Very own email application might also check for spam on try and block it.
So there's again that concept of multi layered security.
Users should be educated to never open unsolicited e mails and if they do, never click on any links inside it or download any attachments.
CompTIA IT Fundamentals FC0-U61 Practice Test
The IT Fundamentals exam preparation bundle helps prepare students for the CompTIA IT Fundamentals certification ...
Introduction to IT & Cybersecurity
In this course, We will cover several cybersecurity career roles - Network Administrator, Incident Responder, ...
2 CEU/CPE Hours Available
Certificate of Completion Offered