socially engineered attack vectors openings and closings

10
Alan W Silberberg CEO of DIGIJAKS Presented to California Cyber Security Task Force November 2015. Presented By Alan W Silberberg to Calfiornia Cyber Security Task Force 2015 1

Upload: digijaks

Post on 23-Jan-2018

767 views

Category:

Presentations & Public Speaking


1 download

TRANSCRIPT

Page 1: Socially Engineered Attack Vectors Openings and Closings

Alan W Silberberg

CEO of DIGIJAKS

Presented to California Cyber Security Task Force November 2015.

Presented By Alan W Silberberg to Calfiornia Cyber Security Task Force 2015

1

Page 2: Socially Engineered Attack Vectors Openings and Closings

Opening – Who does this and how do they get in?

Social Engineered Attack as Phishing in Mobile leading to bluejacking, device denial and theft.

Social Engineered Attack using a “Social Graph” as vector to learn more about orgs, people then to commence with phishing, watering-hole and MiTM attacks.

Closing the Barn Door, keeping it shut, while still looking through the window.

Presented By Alan W Silberberg to Calfiornia Cyber Security Task Force 2015

2

Page 3: Socially Engineered Attack Vectors Openings and Closings

3

Presented By Alan W Silberberg to Calfiornia Cyber Security Task Force 2015

Page 4: Socially Engineered Attack Vectors Openings and Closings

Presented By Alan W Silberberg to Calfiornia Cyber Security Task Force 2015

4

Page 5: Socially Engineered Attack Vectors Openings and Closings

Presented By Alan W Silberberg to Calfiornia Cyber Security Task Force 2015

5

Page 6: Socially Engineered Attack Vectors Openings and Closings

Presented By Alan W Silberberg to Calfiornia Cyber Security Task Force 2015

6

Page 7: Socially Engineered Attack Vectors Openings and Closings

Presented By Alan W Silberberg to Calfiornia Cyber Security Task Force 2015

7

Page 8: Socially Engineered Attack Vectors Openings and Closings

8

Presented By Alan W Silberberg to Calfiornia Cyber Security Task Force 2015

Page 9: Socially Engineered Attack Vectors Openings and Closings

Every APP has to be thoroughly vetted even if coming from Apple or Google stores for PUA and Permission Authorities.

Social Media is both the way in and the way to shut them down. It is imperative to be using social media, to be on, and listening but also to have all privacy and safety settings bolted down. True in personal and organizational environments.

Phishing can occur through voice, through SMS, through social media and even through videos and websites.

9

Presented By Alan W Silberberg to Calfiornia Cyber Security Task Force 2015

Page 10: Socially Engineered Attack Vectors Openings and Closings

NODEXL is a free plug in for Microsoft Excel which allows for bulk importation of social media graph data from multiple platforms and allows for complex visualizations to be built using a number of categories including users and hashtags/content.

MENTIONMAPP.COM is excellent for instant social map on twitter.

PAID SERVICES INCLUDE:

RADIAN 6

BOTTLENOSE

Numerous Analytics companies that offer visualizations

10

Presented By Alan W Silberberg to Calfiornia Cyber Security Task Force 2015