Social engineering (computer security)
|
In the field of computer security, social engineering is the practice of obtaining confidential information by manipulation of legitimate users. A social engineer will commonly use the telephone or Internet to trick people into revealing sensitive information or getting them to do something that is against typical policies. By this method, social engineers exploit the natural tendency of a person to trust his or her word, rather than exploiting computer security holes. It is generally agreed upon that “users are the weak link” in security and this principle is what makes social engineering possible.
A contemporary example of a social engineering attack is the use of e-mail attachments that contain malicious payloads (that, for instance, use the victim's machine to send massive quantities of spam). After earlier malicious e-mails led software vendors to disable automatic execution of attachments, users now have to explicitly activate attachments for this to occur. Many users, however, will blindly click on any attachments they receive, thus allowing the attack to work.
Perhaps the simplest, but still effective attack is tricking a user into thinking one is an administrator and requesting a password for various purposes. Users of Internet systems frequently receive messages that request password or credit card information in order to "set up their account" or "reactivate settings" or some other benign operation in what are called phishing attacks. Users of these systems must be warned early and frequently not to divulge sensitive information, passwords or otherwise, to people claiming to be administrators. In reality, administrators of computer systems rarely, if ever, need to know the user's password to perform administrative tasks. However, even this might not be necessary — in an Infosecurity survey, 90% of office workers gave away their password in exchange for a cheap pen.
Social engineering also applies to the act of face-to-face manipulation to gain physical access to computer systems.
Training users about security policies and ensuring that they are followed is the primary defense against social engineering.
One of the most famous social engineers in recent history is Kevin Mitnick.
References
- John Leyden, April 18, 2003. Office workers give away passwords for a cheap pen (http://www.theregister.co.uk/2003/04/18/office_workers_give_away_passwords/). The Register. Retrieved 2004-09-09.
- Kevin D. Mitnick, William L. Simon, Steve Wozniak. The Art of Deception: Controlling the Human Element of Security. John Wiley & Sons, 2002. ISBN 0471237124.
- SirRoss, January 19, 2005. A Guide to Social Engineering, Volume 1 (http://www.astalavista.com/?section=dir&cmd=file&id=3487/) A Guide to Social Engineering, Volume 2 (http://www.astalavista.com/?section=dir&cmd=file&id=3488/). AstaLavista.de:Social Engineering
ja:ソーシャル・エンジニアリング fr:Ingénierie sociale pl:Social engineering pt:Engenharia Social