Basic HTML version of Foils prepared May 19 99

Foil 33 A Social Engineering Attack

From Computer Crimes: Examples of Network Security attacks Tango Group Internal Technology Seminars -- April 23 99. by Roman Markowski


1 It is an attempt by a computer hacker to persuade a legitimate system user to reveal information, allowing the hacker to break through the system security
2 most common way hackers break into systems
3 the most common attack through the telephone
4 " If you give me your logon ID and password, I can fix it in a few minutes, you can change your password when I am done"
5 hacker takes advantage of the organization size - people do not know each other
6 if you receive a suspicious phone call, ask for a phone number and call the person back.

in Table To:


© Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu

If you have any comments about this server, send e-mail to webmaster@npac.syr.edu.

Page produced by wwwfoil on Mon Aug 16 1999