5.4 Cyber Security Social Engineering EMK Notes 2022
5.4 Cyber Security Social Engineering EMK Notes 2022
Objective:
Describe processes involved in, and aim of carrying out cyber security threats related to
Social Engineering.
Social Engineering occurs when cybercriminal creates a social situation that can lead to a
potential victim dropping their guard. It involves manipulation of people into breaking their
normal security procedures and not following best practice.
There is no hacking involved, since user is willingly allowing cybercriminal to have access to
their computer, to download malicious software or visit fake websites; user is rushed into
making rash decisions.
Types of threats Used in Social Engineering
Instant Messaging:
Malicious links are embedded into instant messages; for example, an
important software upgrade. This relies on user’s curiosity.
Scareware:
This is done using pop-up message that claims that user’s computer is infected
with a virus; user is told they need to download fake anti-virus immediately. This relies on
user’s fear.
Emails/Phishing Scams:
Phishing occurs when a cybercriminal sends out legitimate-looking emails
to users. When user click on emails links it will take user to a fake website that trick user
into responding with personal data. This fake email appears to be genuine coming from a
known bank or service provider. This relies on user’s trust of well-known companies.
Baiting:
Cybercriminal leaves a malware-infected memory stick somewhere, where it can
be found. Finder picks up memory stick and plugs it into their computer (just to see who it
belongs to) and unintentionally downloads malicious malware. This relies on user curiosity.
Phone calls:
Cybercriminal call user on their mobile claiming their device has been
compromised in some way. User is advised to download some special software that
allows cybercriminal to take over the user’s device giving them access to personal
information. This relies on user fear.
Social Engineering is based on exploitation of following Human Emotions:
➢ Fear:
User is panicked into believing their computer is in danger and isn’t given time to
logically decide if danger is genuine or not. Fear is a powerful emotion that can easily
be exploited by a cybercriminal.
➢ Curiosity:
User can be tricked into believing they have won a car or they find an infected
memory stick lying around. They give their details willingly to win the car (credit card
details to pay for delivery) or they are curious who memory stick belongs to; without
thinking clearly, their curiosity gets better of them and damage is done.
➢ Empathy and Trust:
A real belief that all genuine-sounding companies can be trusted,
therefore emails or phone calls coming from such companies must be safe.
Data Security
Data Security means data is recoverable if lost or corrupted. Data can be said to be 'secure' if
it is available for use when needed and data made available is data that was stored originally.
Security of data has been breached if data has been lost or corrupted. Data security is a
prerequisite for ensuring data integrity and data privacy.
Access levels through User Account
In computer systems, user accounts control a user’s
rights and have a hierarchy of access levels depending on a person’s level of security. This is
usually achieved using user name and password.
When using databases, levels of access are essential to determine who has right to read,
write and delete data.
Access Level in Social Networking Website:
Users are allowed to use privacy settings rather than passwords to decide level of access in
social networking website.
➢ Public access refers to data anyone from general public can access.
➢ Friends only people identified as ‘friends’ by owner of data can see certain data.
➢ Custom: This allows user to further refine what data can be seen by ‘friends’ allowing
them to exclude certain content from selected people.
➢ Data Owner: This type of data can be seen by data owner only. We call this as private
data access.
Anti-Malware
Two most common types of anti-malware are anti-virus and anti-spyware.
Anti-Virus:
It is a utility software used for scanning and removing viruses from computer.
Primary purpose of antivirus is to protect computers from viruses and remove any viruses
that are found.
How Antivirus works?
Antivirus contain list all of all known viruses and check each file
extensions on all storage media in computer. When it finds one it deletes it.
Tasks carried out by anti-virus software:
➢ Scans files for viruses // detects/identifies a virus
➢ Can constantly run in background
➢ Can run a scheduled scan
➢ Can automatically updating virus definitions
➢ Can quarantine a virus
➢ Can delete a virus
➢ Notifies user of a possible virus
Anti-Spyware:
Anti-spyware software detects and removes spyware programs installed
illegally on a user’s computer system.
Anti-Spyware Software is based on one of following two methods:
➢ Rules: Anti-Spyware Software looks for typical features which are usually associated
with spyware thus identifying any potential security issues
➢ File Structures: There are certain file structures associated with potential spyware
which allows them to be identified by Anti-Spyware software.
Features of anti-spyware:
➢ Detect and remove spyware already installed on device
➢ Prevent a user from downloading spyware.
➢ Encrypt files to make data more secure in case it is ‘spied’ on.
➢ Encryption of keyboard strokes to help remove risk posed by keylogging aspects of
spyware.
➢ Blocks access to a user’s webcam and microphone .
➢ Scans for signs that user’s personal information has been stolen and warns user if this
has happened.
ESQ: How can we add precaution in case unauthorised person has tried to change user’s
password.
Ans: When using online website, if user forgets their password or they need to reset it, they
will be sent an email which contains link to web page where they can reset their password.
➢ Biometrics can be used as a way of identifying a user. Biometrics relies on certain
unique characteristics of human beings. Examples: Fingerprint Scans, Retina Scans,
Face Recognition , Voice Recognition.
Application of Biometric:
❖ Biometrics is used in a number of applications as a security device. Example, Latest
mobile phones use fingerprint matching before they can be operated.
❖ Pharmaceutical companies use face recognition or retina scans to allow entry to
secure areas.
➢ Fingerprint Scans:
Images of fingerprints are compared against previously scanned fingerprints
stored in a database; if they match then access is allowed; system compares patterns of
‘ridges’ and ‘valleys’ which are fairly unique.
Security devices (such as magnetic cards to gain entry to building) can be lost or even stolen
which makes them less effective.
Application: At many airports, 2-D photograph in the passport is scanned. Passenger’s face is
also photographed using a digital camera. Two digital images are compared using face
recognition and detection software. Key parts of the face are compared.
Data such as:
• Distance between eyes • width of nose • shape of cheek bones • length of jaw line • shape
of eyebrows
Above key positions on face determine whether or not two images represent same face.
Person stands facing retina scanner. Scanned data is sent via an ADC (analogue-digital
converter) to a microprocessor. Microprocessor compares the data received with retina scan
data already stored in a database. If the two sets of data match, a signal is sent to turn a light
from red to green and also unlock the security door. Door is controlled by a DAC (digital-
analogue converter) and an actuator. If the retina scan data and database data don’t match,
then entry is denied and the light remains red.
Two-Step Verification
Two-step verification requires two methods of authentication to
verify who a user is. It is mostly used when a user makes an online purchase using a
credit/debit card as payment method.
Example: Suppose a user logs into website using her computer. This requires to enter a user
name and a password, which is step 1 of authentication process. To improve security, few
digit PIN (OTP) is sent back to user either in an email or as a text message to registered
mobile phone (Second stage of authentication process). User now enters PIN into computer
and is now authorized to use website.
Automatic Software Updates Automatic software updates mean software on
computers and mobile phones is kept up-to-date. Sometimes this is done overnight or when
you log off the device. These updates are vital since they may contain patches that update
the software security (to protect against malware) or improve the software performance (for
example, removal of bugs and addition of new features).
Downside to this is the potential for updates to disrupt your device following installation. If
this happens, the user either has to wait for another patch to put this right, or use the
techniques that reverse the clock time to an earlier date before the updates were made.
Checking URL spelling and tone of Email Communication
To ensure that email is from trusted source, User need
to follow following steps before clicking on link:
➢ Check out spellings in email and in links; professional, genuine organisations will not
send out emails which contain spelling or major grammatical errors.
➢ Carefully check tone used in email message; if it is rushing you into doing something or
if language used seems inappropriate or incorrect, then it could be a phishing email.
➢ Check email address as no legitimate company will use an email address such as:
@gmail.com. Carefully check part of address after ‘@’ symbol which should match
company’s name.
➢ Misspelling of domain names in a link are very common errors found in emails sent by
scammers and fraudsters. www.gougle.com www.amozon.com. This is known as typo
squatting where names close to genuine names are used to fool you.
➢ Errors to look out for are just plain spelling mistakes. Look at this address from
TKMaxx; find three errors:
http://www.tkmax.co.ie
» since company involve online payments, so it should use secure links https
» Spelling of the company is incorrect.
» it is more likely to see .com since they are a large company.
Firewalls Firewall sits between the user’s computer and an external network and filters
information in and out of the computer. It can be either software or hardware. Firewalls are
primary defence to any computer system to help protect it from hacking, malware (viruses
and spyware), phishing and pharming.
PROXY SERVERS
It act as an intermediary between the user and a web server. It prevents
direct access to the webserver. If an attack is launched it hits the proxy server instead and
help prevent hacking of webserver.
Privacy Settings Privacy settings are controls available on web browsers, social networks
and other websites that are designed to limit who can access and see a user’s personal
profile.
Privacy Settings can refer to:
➢ A ‘do not track’ setting stop websites collecting and using browsing data which leads
to improved security.
➢ A check to see if payment methods have been saved on websites; this is a safety
feature which prevents need to type in payment details again.
➢ Safer Browsing; an alert is given when browser encounters a potentially dangerous
website (the undesirable website will be in a ‘blacklist’ stored on the user’s computer)
➢ Web Browser privacy options (e.g. storing browsing history, storing cookies)
➢ Website advertising: Website may be tracked by any number of third parties who
gather information about your browsing behaviour for advertising purposes.
➢ Apps; Sharing of location data in map apps can be switched off.
computers to communicate with each other across a network. SSL allows data to be sent and
received securely over internet.
When user logs onto website, SSL encrypts data – only user’s computer and the web server
are able to make sense of what is being transmitted.
User will know if SSL is being applied when they see https or small padlock in status bar at
top of screen. P11 May 16
Stages a web browser goes through to detect whether website is secure. P11 May 16
Web browser attempts to connect to a web site which is secured by SSL
Web browser requests web server to identify itself and view (SSL) certificate.
Web browser receives a copy of (SSL) certificate, sent from webserver.
Web browser checks if SSL certificate is authentic.
Web browser sends signal back to webserver that the certificate is authentic.
Web server will then send back some form of acknowledgement to allow SSL
encrypted session to begin.
Encrypted data is then shared securely between web browser and web server.
SSL Certificate is form of digital certificate which is used to authenticate a website. This
means any communication data exchange between browser and website is secure provided
this certificate can be authenticated.
ESQ: How SSL protocol help to keep the data safe over internet during transmission?
SSL encrypts the data – only user’s computer and web server are able to make
sense of what is being transmitted.
encryption is asymmetric / symmetric / both
makes use of (public and private) keys
Data is meaningless without decryption key if intercepted.
Record layer: this part of the communication can be used with or without encryption and
it contains the data being transferred over the internet.
Comparison between SSL and TLS:
➢ TLS separates handshaking process from record protocol (layer) which holds all data.
➢ It is possible to extend TLS by adding new authentication methods.
➢ TLS can make use of SESSION CACHING which improves overall performance
compared to SSL.
Session Caching:
When opening TLS session, it requires lot of computer time due to complex encryption keys
being used. Use of session caching can avoid the need to utilize so much computer time for each
connection. TLS can either establish a new session or attempt to resume an existing session
which can considerably boost system performance.
*************