The Art of Deception_ Controlling the Human Element of Security - Kevin D. Mitnick [175]
verification
See also training
employee number, disclosing
employment agency, social engineering use by
employment status, verification
encryption
of backup and stored files
keys
password.
voice message
Web site information
entry, illegal
enumeration
espionage, corporate (industrial)
F
favors, returning
fax
electronic
forwarding of
use policy
fear, use of
Federal Bureau of Investigation (FBI)
files, transfer of
File Transfer Protocol (FTP)
financial industry, vulnerability of
firewall
foreign country, email drops in
G
gender, of social engineers
government, information available on the Internet
gratitude, playing upon
grifters
guest account
gzip
H
hackers
hash, password
head-hunters, social engineering use by
help desk policies
human nature, tendencies of
human resources, policies for
I
identification
two-factor authentication
verification
identity theft
illusion, of security
impersonation
of company employee
of police officer
incident reporting
information
disclosure
gaining access to seemingly innocuous
hidden value of
as poker chip
responding to request for
information broker
Information Owner
information technology (IT) policies
innocence, organizational
insiders, threat from
installation, silent
Internal data classification
Internet
dead drop site
government information available on
hacking tools available on
password default list available on
phony sites
intimidation, by using authority
intranet, content of
intruders
K
keystrokes, monitoring
L
L0phterack3 utility
labeling items
law enforcement agencies
eavesdropping on
NCIC manual
procedures, learning about
thrill of deceiving
least privilege, rule of
license plate, old
lingo
LOCK-11
lock icon, Web page.
locks, picking
login simulator
loop-around phone number
M
mail bin, intracompany
mailbox, general departmental
mail drop
malicious code
malware (malicious software)
mark
marketing company case study
Mechanized Line Assignment Center (MLAC)
media, disposal of
Merchant ID,
modem, dial-in
monitoring program, computer
movie industry case study
N
name-dropping.
names, planting in corporate database
National Crime Information Center (NCIC)
need to know, verification
network outage case study
newsgroups
non-employees, criteria for verifying
O
obscurity, security through
operating system configuration
Oracle Corporation
out-of-towner case study
P
parents, social engineering by
password
brute force attack
choosing
dial-up remote access
default
delivery of new.
dictionary attack
disclosure of
discovery by login simulator use
dynamic
encryption.
guest account
hacking program
hash
null
plaintext
policies
resetting
screen saver
sharing
shoulder surfing to obtain
spyware capture ot
telephone switch
training on security of
patch
PayPal
payroll files, accessing
penetration testing
persuasion, art of friendly
phone administration policies
phone numbers
ANI (automatic number identification)
caller ID,
for Customer Name and Address bureau
dial-in access, disclosing
finding with cable and pair number
internal, disclosing
line verification
loop-around
reprogramming
restricted extensions
reverse lookup.
for telephone switch
Test Number Directory
unlisted, obtaining
on voice mail greeting
phone system, automated
phreaks, phone
physical security, policies for
piggybacking
poker chip, information
police scam case study
policies, security
consequences for violating
data classification
definition
development, steps in
employee
computer use
email use
fax use
general
passwords
phone use
voice mail use
human resources
incident