Вы находитесь на странице: 1из 2

CSC EXECUTIVE EXCHANGE

Always Connected, Always Vulnerable:


Can the Enterprise be Protected?
November 5 – 8, 2006

The Art of Deception


Kevin Mitnick, Legendary Hacker and Security Specialist

When it comes to information security, most security executives invest the


bulk of their time and budget dollars on thwarting technological factors
that can snatch data.
At a recent CSC Executive Exchange, a renowned hacker-gone-good
said those executives should be investing just as much time and money
protecting their enterprises against the human factor which, he said, can
snatch that data just as smoothly and easily.
Kevin Mitnick is the president of Mitnick Security Consulting and the
Kevin Mitnick
author of the best-selling books “The Art of Deception” and “The Art of
Intrusion.”
“Most companies don’t realize the extent to which bad guys these days
resort to what I call social engineering in order to gain entry into corporate
networks and data,” said Mitnick. The consultant who spent five years in
prison for hacking into some of the United States’ most advanced computer
systems during the 1980s and 1990s went on to say, “you can have the best
firewalls, encryption tools and such in place, but they will neither detect nor
protect you from a social engineering attack.”
Mitnick defined social engineering as “using personal manipulation, deception
and influence to get some target to reveal sensitive information, which then
can enable a more technologically based attack on one’s network or data.”
Executive Exchange “The most basic and amateurish form of social engineering,” he said, “is
is sponsored by CSC Consulting what occurs when one person calls another posing as a business
Group and designed for — and professional and asking for the other’s person’s password, hoping the target is
strictly limited to — audiences
distracted enough at the time to reveal it.” “Social engineering has taken
comprising senior executives
from major organizations.
on much more sophisticated approaches than that,” Mitnick warned.
For more information on “A slightly more novel scam is one where someone poses as an employee
upcoming events, agendas and calls the help desk claiming they can’t access the network after having
and attendees contact your recently reset their password,” he said. “The help desk asks for an
CSC Account Executive or authentication credential — last four digits of the person’s social security
Norm Staniford at 214.523.5527
number for example —– and the intruder now knows what credential the
company uses for authentication.”
“That person then researches such information about The best way to prevent the human firewalls from
other employees in the company, which is easy to find coming tumbling down is to build resistance to social
on the Internet, and calls back a few days later using a engineering into one’s workforce. Getting top manage-
different employee’s name and authentication ment buy-in is key, Mitnick said, and, “a great way to
credential. The password gets reset…and then the achieve that is to conduct a stealth attack on a manager’s
intruder, posing this time as a help desk clerk, calls the personal information before a training session and then
victimized employee to tell them their password had to present the results of the attack during the training,” he
be reset and not to change it for a few weeks. The intruder said. “If you use social engineering tactics to gain access
then uses the new password at will, undetectable for to their data before the meeting, people will be less on
several weeks.” guard than if you try to do it during the meeting.”
Other savvier forms of social engineering include calling Mitnick also recommended developing clear procedures
someone in accounts payable claiming to be from the for classifying, sharing and trashing data and assessing
phone company and then asking that all phone numbers the company’s security awareness by performing attacks
not on the Centrex be faxed to them so some billing that rely on social engineering tactics.
issues can be resolved. What gets included in that fax
“I also consider it wise to develop “keep-it-simple-stupid
are the phone numbers for any dial-up modems in the
security protocols,” Mitnick said. “Rather than expect
firm, through which the intruder gains access to the
employees to read a security handbook on the intranet,
network. Or, a flash drive gets “left” in a parking lot or
create protocols for different classes of data. Then, when
bathroom and when the employee who finds it pops it
employees encounter a security situation, they can then
into his or her laptop, it takes control of their computer
refer to the electronic handbook for guidance.”
giving the intruder full access to data.
Mitnick left his audience shaken, but better equipped to
“Security managers need to understand that sometimes,
stave off attacks via social engineering. Those attending
the bad guy doesn’t care about getting into your infra-
learned that today’s bad guy needs a false I.D. to gain
structure or network,” Mitnick said. “Sometimes all he
trust, and therefore might use a spoof caller I.D. to appear
wants is to get to your data.”
to be calling from a location within the company rather
“Managers,” he said, “need to be on the lookout for several than a nearby coffeehouse. That bad guy also needs an
varieties of holes that can appear in their organizations’ out in case an employee does seem hesitant to reveal
human firewalls. At times, it’s the illusion of invulner- precious information, so all should be wary of the caller
ability that will cause a slip up. At other times, a rupture who says a supervisor will call back to get the data later
occurs when an employee decides that the established or that they suddenly have another call coming in.
security protocols are too cumbersome so they, for
Security managers even need to scan what the company
example, take a password and leave it taped to their
says on its Web site and what it tosses into the trash.
computer monitor for easy access (by everyone). One
employee slips because she underestimates the value of “Hackers these days will carefully reconstruct any
the information she’s sharing, another falters when he documents you have shredded by hand,” he said. “They
wants to be seen as helpful and still others inadvertently will also search your Web site to learn the lingo of your
hand over the keys, because their lack of technical company so they can more effectively pose as an employee,
acumen causes them to be unaware of the security and they’ll dive into dumpsters to find source code or
consequences of their actions,” he said. tossed CDs full of great internal data they can use to
wreak even more havoc on your organization.”

About CSC

Computer Sciences Corporation helps clients achieve strategic goals and


profit from the use of information technology.

With the broadest range of capabilities, CSC offers clients the solutions they
need to manage complexity, focus on core businesses, collaborate with
partners and clients, and improve operations.

CSC makes a special point of understanding its clients and provides experts Computer Sciences Corporation
with real-world experience to work with them. CSC is vendor-independent,
delivering solutions that best meet each client’s unique requirements. Consulting Group
266 Second Avenue
For more than 45 years, clients in industries and governments worldwide Waltham, Massachusetts 02451
have trusted CSC with their business process and information systems +1.781.890.7446
outsourcing, systems integration and consulting needs.

The company trades on the New York Stock Exchange under the Copyright © 2006 Computer Sciences Corporation. All rights reserved.
symbol “CSC.” ny06_0367

Вам также может понравиться