skip to main content
10.1145/1029533.1029577acmconferencesArticle/Chapter ViewAbstractPublication PagesiteConference Proceedingsconference-collections
Article

The urgency for effective user privacy-education to counter social engineering attacks on secure computer systems

Published:28 October 2004Publication History

ABSTRACT

Trusted people can fail to be trustworthy when it comes to protecting their aperture of access to secure computer systems due to inadequate education, negligence, and various social pressures. People are often the weakest link in an otherwise secure computer system and, consequently, are targeted for social engineering attacks. Social Engineering is a technique used by hackers or other attackers to gain access to information technology systems by getting the needed information (for example, a username and password) from a person rather than breaking into the system through electronic or algorithmic hacking methods. Such attacks can occur on both a physical and psychological level. The physical setting for these attacks occurs where a victim feels secure: often the workplace, the phone, the trash, and even on-line. Psychology is often used to create a rushed or officious ambiance that helps the social engineer to cajole information about accessing the system from an employee.

Data privacy legislation in the United States and international countries that imposes privacy standards and fines for negligent or willful non-compliance increases the urgency to measure the trustworthiness of people and systems. One metric for determining compliance is to simulate, by audit, a social engineering attack upon an organization required to follow data privacy standards. Such an organization commits to protect the confidentiality of personal data with which it is entrusted.

This paper presents the results of an approved social engineering audit made without notice within an organization where data security is a concern. Areas emphasized include experiences between the Social Engineer and the audited users, techniques used by the Social Engineer, and other findings from the audit. Possible steps to mitigate exposure to the dangers of Social Engineering through improved user education are reviewed.

References

  1. Jones, C. (2003). Social Engineering: Understanding and Auditing. Retrieved on July 22, 2004 from http://www.giac.org/practical/GSEC/Chris_Jones_GSEC.pdfGoogle ScholarGoogle Scholar
  2. Gragg, D. A Multi-Level Defense Against Social Engineering. (2002). Retrieved on July 22, 2004 from http://www.sans.org/rr/papers/51/920.pdf.Google ScholarGoogle Scholar
  3. Littman, J. (1998). Inside jobs: Is there a hacker in the next cubicle? Retrieved on July 22, 2004 from http://www.cnn.com/TECH/computing/9808/13/hacker.idg/.Google ScholarGoogle Scholar
  4. Lively Jr., C. (2003) Psychological Based Social Engineering. Retrieved on July 22, 2004 from http://www.giac.org/practical/GSEC/Charles_Lively_GSEC.pdf.Google ScholarGoogle Scholar
  5. Mitnick, K. My First RSA Conference. Retrieved on July 22, 2004 from http://www.securityfocus.com/news/199.Google ScholarGoogle Scholar
  6. Mitnick, K. and Smith, W. The Art of Deception. Indianapolis, IN: Wiley Publishing Inc, 2002, 245.Google ScholarGoogle Scholar

Index Terms

  1. The urgency for effective user privacy-education to counter social engineering attacks on secure computer systems

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          CITC5 '04: Proceedings of the 5th conference on Information technology education
          October 2004
          300 pages
          ISBN:1581139365
          DOI:10.1145/1029533

          Copyright © 2004 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 28 October 2004

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          Overall Acceptance Rate176of429submissions,41%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader