Basic HTML version of Foils prepared May 19 99

Foil 33 A Social Engineering Attack

From Computer Crimes: Examples of Network Security attacks Tango Group Internal Technology Seminars -- April 23 99. by Roman Markowski


It is an attempt by a computer hacker to persuade a legitimate system user to reveal information, allowing the hacker to break through the system security
most common way hackers break into systems
the most common attack through the telephone
" If you give me your logon ID and password, I can fix it in a few minutes, you can change your password when I am done"
hacker takes advantage of the organization size - people do not know each other
if you receive a suspicious phone call, ask for a phone number and call the person back.



© Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu

If you have any comments about this server, send e-mail to webmaster@npac.syr.edu.

Page produced by wwwfoil on Mon Aug 16 1999