Coconote
AI notes
AI voice & video notes
Export note
Try for free
Security Failures and Social Engineering
Jun 19, 2024
🤓
Take quiz
🃏
Review flashcards
Lecture Notes: Security Failures and Social Engineering
Introduction
Speaker
: Jason E. Street
Objective
: Discuss the importance of physical security and social engineering flaws.
Context
: Real-life experiences and encounters to highlight security weaknesses.
Personal Background
Day Job
: VP of Information Security at a financial institution
Responsibilities: Monitor firewalls, watch IDS systems, build infrastructure, Blue Team tasks (defense).
Night Job
: CIO at Stratigos Security Solutions
Pen testing, speaking engagements, authoring "Dissecting the Hack".
Key Security Incidents and Lessons
Outside Industrial Park (2011)
: Standing for an hour, no security check despite visible suspicion.
Job Application
: Overqualified, got their data instead.
Stole a car from a hotel wearing an "I'm a Liability" shirt
.
Valet handed over car without verifying identity.
Ground Zero Office
: High security yet penetrable with a valid badge and a misleading shirt.
Fundamental Rules and Outcomes
Main Fact
: Always able to get in.
Rule 1
: Aim to misbehave.
Rule 2
: Be the bad guy.
Three Outcomes
: Successful penetration, unnoticed behavior, and extraction of sensitive info.
Tools and Techniques for Security Breaches
Using simple tools to bypass security
: Examples include using a pen to disable door latches.
Impersonating officials
: Cloning phones, stealing badges, using forged emails on iPads.
Keyless Entry Manipulation
: Finding default codes (e.g., 0000, 1234) for security locks.
Forging Emails
: Making them look legitimate using urgent and political language.
Exploring Physical Vulnerabilities
: Simple tricks to bypass physical security like checking for unlocked doors.
Importance of Personal Belongings
Personal Impact on Security
: Involving personal items like car keys, driver's licenses, leading to potential threats against employees' families.
Creating Vulnerabilities
: Not securing personal items can lead to significant security breaches.
Countermeasures Against Security Breaches
Employee Education and Awareness
: Regular training and creating awareness about securing their stuff.
No Tailgating
: Preventing unauthorized entry by following others.
Empower Employees
: Encourage employees to report suspicious activities by making them feel part of the security process.
Examples of Real-Life Security Breaches
Hotel Sub-Basement
: Accessing secure areas by disguising as hotel guests (Pepsi pajama incident).
Kitchen Areas in Hotels
: Gaining access without being questioned.
Physical Access Weaknesses
: Locks without padlocks, unsecured data areas.
Impact of Social Engineering
Use of Social Engineering for Pen Tests
: Employees easily manipulated by basic techniques.
Example
: Example in Malaysia where the head chef was questioned without suspicion.
Understanding Workplace Vulnerabilities
: Emphasizing the role of personal and physical security.
Steps Toward Improved Security:
Codewords
: Establish emergency codewords for employees to use in dangerous situations.
Routine Checks
: Conduct regular checks not just on equipment, but also on people's understanding of security protocols.
Limiting Information Leakage
: Encourage employees not to print sensitive data unnecessarily.
Using Technology Wisely
: Emphasize secure usage of technology (DLP solutions).
Final Recommendations
Education
: Focus on properly educating employees to use technology securely.
Empowerment
: Empower employees to contribute to the organization's security proactively.
Positive Reinforcement
: Praise and acknowledge employees' efforts in maintaining security. Make it part of the organizational culture.
Breaking "Stupid Users" Mindset
: Treat employees as part of the security team, not as liabilities.
Additional Resources
Links to websites and additional reading material (not specified in the notes).
📄
Full transcript