The Art of Deception_ Controlling the Human Element of Security - Kevin D. Mitnick [133]
It appears that there are no statistics on social engineering attacks, and if there were, the numbers would be highly unreliable; in most cases a company never knows when a social engineer has “stolen” information, so many attacks go unnoticed and unreported.
Effective countermeasures can be put into place against most types of social engineering attacks. But let’s face reality here—unless everyone in the enterprise understands that security is important and makes it his or her business to know and adhere to a company’s security policies, social engineering attacks will always present a grave risk to the enterprise.
In fact, as improvements are made in the technological weapons against security breaches, the social engineering approach to using people to access proprietary company information or penetrate the corporate network will almost certainly become significantly more frequent and attractive to information thieves. An industrial spy will naturally attempt to accomplish his or her objective using the easiest method and the one involving the least risk of detection. As a matter of fact, a company that has protected its computer systems and network by deploying state-of-the-art security technologies may thereafter be at more risk from attackers who use social engineering strategies, methods, and tactics to accomplish their objectives.
This chapter presents specific policies designed to minimize a company’s risk with respect to social engineering attacks. The policies address attacks that are based not strictly on exploiting technical vulnerabilities. They involve using some kind of pretext or ruse to deceive a trusted employee into providing information or performing an action that gives the perpetrator access to sensitive business information or to enterprise computer systems and networks.
WHAT IS A SECURITY POLICY?
Security policies are clear instructions that provide the guidelines for employee behavior for safeguarding information, and are a fundamental building block in developing effective controls to counter potential security threats. These policies are even more significant when it comes to preventing and detecting social engineering attacks.
Effective security controls are implemented by training employees with well-documented policies and procedures. However, it is important to note that security policies, even if religiously followed by all employees, are not guaranteed to prevent every social engineering attack. Rather, the reasonable goal is always to mitigate the risk to an acceptable level.
The policies presented here include measures that, while not strictly focused on social engineering issues, nonetheless belong here because they deal with techniques commonly used in social engineering attacks. For example, policies about opening email attachments—which could install malicious Trojan Horse software allowing the attacker to take over the victim’s computer—address a method frequently used by computer intruders.
Steps to Developing a Program
A comprehensive information security program usually starts with a risk assessment aimed at determining:
• What enterprise information assets need to be protected?
• What specific threats exist against these assets?
• What damage would be caused to the enterprise if these potential threats were to materialize?
The primary goal of risk assessment is to prioritize which information assets are in need of immediate safeguards, and whether instituting safeguards will be cost-effective based on a cost-benefit analysis. Simply put, what assets are going to be protected first, and how much money should be spent to protect these assets?
It’s essential that senior management buy into and strongly support the necessity of developing security policies and an information security program. As with any other corporate program, if a security program is to succeed, management must do more than merely provide an endorsement, it must demonstrate a commitment by personal example. Employees