Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Objective
In this lab, you will research examplesof social engineering and identify ways to recognize and prevent it.
Resources
Computer with Internet Access
© 2019Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 3
Lab Title Only Here - No Numbering
She asked me if I had seen anything. I told her I hadn’t but convinced her to sit down and think about
what was in the bag. A phone. Make-up. A little cash. And her credit cards. Bingo!
I asked who she banked with and then told her that I worked for that bank. What a stroke of luck! I
reassured her that everything would be fine, but she would need to cancel her credit card right away. I
called the “help-desk” number, which was actually Alex, and handed my phone to her.
Alex was in a van in the parking garage. On the dashboard, a CD player was playing office noises. He
assured the mark that her card could easily be canceled but, to verify her identity, she needed to enter
her PIN on the keypad of the phone she was using. My phone and my keypad.
When we had her PIN, I left. If we were real thieves, we would have had access to her account via ATM
withdrawals and PIN purchases. Fortunately for her, it was just a TV show."
"Hacking VS Social Engineering -by Christopher Hadnagy http://www.hackersgarage.com/hacking-vs-
social-engineering.html
Remember: “Those who build walls think differently than those who seek to go over, under, around, or
through them." Paul Wilson - The Real Hustle
Research ways to recognize social engineering.Describe three examples found in your research.
If Tech Support Calls You, Suspect a Social Engineering Attack
If you receive an unsolicited call from someone claiming to be tech support, this is a huge red flag that you are
likely being set up for a social engineering attack. Tech support has enough incoming calls and doesn't need
to go looking for problems. Hackers and social engineers who claim to be tech support try to obtain
information such as passwords or direct you to visit malware sites so they can infect or take control of your
computer.
Beware of Unscheduled Inspections
Social engineers often pose as IT inspectors as a pretext. They carry clipboards and wear uniforms to sell
their pretext. Their goal is usually to get access to restricted areas to obtain information or install software
such as keyloggers onto computers within the organization that they are targeting.
Don't Fall for 'Act Now' False Urgency Requests
The pressure to act quickly may override your ability to stop and think about what is happening. Never make
quick decisions because people you don't know are pressuring you. Tell them they will have to come back
later when you can vet their story, or tell them you will call them back after you have verified their story with a
third party.
© 2019 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 3
Lab Title Only Here - No Numbering
5. Using visitor badges. Require that all visitors check in upon arrival, and then issue them a visitor’s badge.
Badges can also be color coded for the type of access they are allowed.
Use the Internet to research procedures that other organizations use to prevent social engineers from gaining
access to confidential information.List your findings.
Security sponsor. A senior manager, probably board-level, who can provide the necessary authority
toensure that all staff take the business of security seriously. Security manager. A management-level
employee who has responsibility for orchestrating the development and upkeep of a security policy. ITsecurity
officer. A technical staff member who has responsibility for developing the IT infrastructure andoperational
security policies and procedures. Facilities security officer. A member of the facilities team who is responsible
for developing site and operational security policies and procedures. Security awareness officer. A
management-level member of staff—often from within the human resources or personnel development
department—who is responsible for the development and execution of securityawareness campaigns.
© 2019 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 3