<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.expertiza.ncsu.edu/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Cjsoques</id>
	<title>Expertiza_Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.expertiza.ncsu.edu/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Cjsoques"/>
	<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Special:Contributions/Cjsoques"/>
	<updated>2026-05-22T01:18:46Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.41.0</generator>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_5,_Group_4&amp;diff=17000</id>
		<title>CSC 379 SUM2008:Week 5, Group 4</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_5,_Group_4&amp;diff=17000"/>
		<updated>2008-08-10T01:01:17Z</updated>

		<summary type="html">&lt;p&gt;Cjsoques: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Decision Support Systems ==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Decision_support_systems Decision Support Systems (DSS)] are computer-based information systems that aid in decision making.  Ideally, a DSS is a piece of interactive software that provides raw data, documents, knowledge, and/or business models to make decisions or aid in a decision making process.  &lt;br /&gt;
&lt;br /&gt;
The different classifications of Decision Support Systems include:&lt;br /&gt;
*Model-Driven - emphasizes access to and manipulation of a type of model. &lt;br /&gt;
*Communications-Driven - includes more than one person working together.&lt;br /&gt;
*Data-Driven - emphasizes access to and manipulation of internal-company data or other external data.&lt;br /&gt;
*Document-Driven - emphasizes access to and manipulation of unstructured data in varying electronic formats.&lt;br /&gt;
*Knowledge-Driven - provides specialized information and problem-solving expertise.  &lt;br /&gt;
&lt;br /&gt;
===DSS in the Military===&lt;br /&gt;
The military is on the forefront of Decision Support Systems.  Due to the critical life and death nature and the necessity for immediate response, DSS is ideal for assisting in tactical decisions that require limited yet key information at the correct instant.  In particular, the United States military uses DSS in various forms and degrees in some of the following systems:&lt;br /&gt;
&lt;br /&gt;
* Pilot display systems in aircraft&lt;br /&gt;
* Missile and targeting systems for various weaponry&lt;br /&gt;
* Battle commands stations (particularly Naval Battlegroups)&lt;br /&gt;
* Unmanned Aerial Vehicles&lt;br /&gt;
* Radar, Jamming, and Electronic Warfare vehicles&lt;br /&gt;
&lt;br /&gt;
The most advanced forms of DSS uses in the military exist in the latest generation of tactical fighter aircraft.  To reduce training cost and increase aircraft performance, the most advanced fighter aircraft use only one crew member (the pilot).  Previous multi-role aircraft had at least two crew members to split the task of controlling the aircraft, monitoring the radar, handling weapons deployment, and maintaining communications.  With only one pilot, an aircraft usually has too much information to process at any one time.&lt;br /&gt;
&lt;br /&gt;
It was found that pilots were extremely overloaded with so much information that they were unable to make effective decisions, let alone fly the aircraft safely.  It was decided to create a system that would limit the information and allow the aircraft to decide what information should be displayed to the pilot at certain times.  &lt;br /&gt;
&lt;br /&gt;
For example, the latest multi-branch multi-role fighter, the F-35, has only one huge primary screen for the cockpit as well as a high definition heads up display.  Previously, aircraft were equipped with three or four multi-function displays as well as numerous analog displays an and cluttered heads up display.  With a single display and a high definition heads-up-display screen, the pilot is able to customize the information displayed to his liking and the current mission.  In addition, computer systems automatically determine certain information that is important to the pilot at given intervals during the mission (e.g. weapon information during the attack stage, navigation and landing information during approach, etc.)&lt;br /&gt;
&lt;br /&gt;
A challenging and controversial, while also the most important, is the friend and foe identification system.  Systems built into warplanes help determine and tell the pilot whether targeted and identified objects are friendly or enemy.  In a battle, this is the most important information, and at times could be the most difficult to determine.  The computer system does the best job possible based on radar cross section, visual identity through various frequency spectrums, and other data to determine identity.  In the end, it should always be the decision of the pilot to fire weapons.  However, newer systems are increasingly removing the control from the pilot to the computer by means of Unmanned Aerial Vehicles.&lt;br /&gt;
&lt;br /&gt;
With the evolution of DSS in the hands of the military, it is important to improve logic and guarantee that the last critical decision is in the hands of decision making human beings.&lt;br /&gt;
&lt;br /&gt;
===DSS in Health Care===&lt;br /&gt;
Decision support has been around for years for the health care industry in the form of the [http://www.pdr.net/login/Login.aspx Physicians' Desk Reference] (PDR). The PDR is a tool that doctors can use to look up treatment options to certain situations. The PDR has recently become electronic, allowing doctors to have the PDR on their hand held devices. Some health systems are using AI systems to help make diagnosis. You can find a full list here: [http://www.openclinical.org/aisinpracticeDSS.html]. DSS's are a great way for a hospital to ensure the quality of care by being able to monitor treatment and compare it to the expected treatment for a patient. Another way it assists is to speed up work flow by putting doctors on the right track faster. &lt;br /&gt;
&lt;br /&gt;
People who are against DSS in health care say that a computer cannot process all of the complicated issues that go into treating a patient. There are several issues to take into account when treating a patient including finances and religious beliefs. Another reason that people are wary of clinical DSS is that the data behind the systems is not always accurate. Medical science changes often and the data that backs a DSS needs to be updated and verified on a constant basis. Also it is unknown where the sources of this data is. Recently the PDR came under attack for using information about drugs that were still in an experimental phase [http://www.openclinical.org/aisinpracticeDSS.html].&lt;br /&gt;
&lt;br /&gt;
===Other applications===&lt;br /&gt;
Additionally, Decision Support Systems can be utilized in a large number of other disciplines.  Some of the other uses include banking, economics, business and management, agriculture, and transit.  However, DSSs can be applied to any situation that needs organization and decision making.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Assignment definition===&lt;br /&gt;
As we become more willing to incorporate more complex software into our daily lives, we are able to solve problems with fewer people and less complex organizational structures.  To allow one person to take the place of a decision group, decision-support systems have been developed. These systems distill expert knowledge and present it to the individual.  Many decision-support systems are in use in medicine, to guide diagnoses, recommend treatments to practitioners, and assist with risk-assessment of procedures.  Software also helps forestall medical emergencies through patient monitoring.  In the military, decision support systems are everywhere, from the fast-paced environment of a fighter-jet cockpit to command-and-control centers.  Other decision-support systems are used in business and government.&lt;br /&gt;
&lt;br /&gt;
It is easy to see how decision-support systems could cause harm, as well as prevent it.  Examine the ethical considerations raised in the design and use of decision-support systems (in general).  What, if any ethical responsibilities apply to the software engineer in development of a decision-support system where errors in its design or use could result in serious harm?  If a decision-support system is shown to reduce harm, improve quality of life, or otherwise provide a net-benefit to its users (fewer medical errors, battleground casualties, reduced costs of providing an essential public service, etc.), is it unethical to resist its adoption?  Please explain your answers.&lt;br /&gt;
&lt;br /&gt;
* http://en.wikipedia.org/wiki/Decision_support_system&lt;br /&gt;
* http://www.openclinical.org/clinical.html&lt;br /&gt;
* http://www.cioinsight.com/c/a/Past-Opinions/DecisionSupport-Systems-Lessons-from-the-Military/&lt;/div&gt;</summary>
		<author><name>Cjsoques</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_5,_Group_4&amp;diff=16999</id>
		<title>CSC 379 SUM2008:Week 5, Group 4</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_5,_Group_4&amp;diff=16999"/>
		<updated>2008-08-10T00:59:12Z</updated>

		<summary type="html">&lt;p&gt;Cjsoques: /* DSS in the Military */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Decision Support Systems ==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Decision_support_systems Decision Support Systems (DSS)] are computer-based information systems that aid in decision making.  Ideally, a DSS is a piece of interactive software that provides raw data, documents, knowledge, and/or business models to make decisions or aid in a decision making process.  &lt;br /&gt;
&lt;br /&gt;
The different classifications of Decision Support Systems include:&lt;br /&gt;
*Model-Driven - emphasizes access to and manipulation of a type of model. &lt;br /&gt;
*Communications-Driven - includes more than one person working together.&lt;br /&gt;
*Data-Driven - emphasizes access to and manipulation of internal-company data or other external data.&lt;br /&gt;
*Document-Driven - emphasizes access to and manipulation of unstructured data in varying electronic formats.&lt;br /&gt;
*Knowledge-Driven - provides specialized information and problem-solving expertise.  &lt;br /&gt;
&lt;br /&gt;
===DSS in the Military===&lt;br /&gt;
The military is on the forefront of Decision Support Systems.  Due to the critical life and death nature and the necessity for immediate response, DSS is ideal for assisting in tactical decisions that require limited yet key information at the correct instant.  In particular, the United States military uses DSS in various forms and degrees in some of the following systems:&lt;br /&gt;
&lt;br /&gt;
* Pilot display systems in aircraft&lt;br /&gt;
* Missile and targeting systems for various weaponry&lt;br /&gt;
* Battle commands stations (particularly Naval Battlegroups)&lt;br /&gt;
* Unmanned Aerial Vehicles&lt;br /&gt;
* Radar, Jamming, and Electronic Warfare vehicles&lt;br /&gt;
&lt;br /&gt;
The most advanced forms of DSS uses in the military exist in the latest generation of tactical fighter aircraft.  To reduce training cost and increase aircraft performance, the most advanced fighter aircraft use only one crew member (the pilot).  Previous multi-role aircraft had at least two crew members to split the task of controlling the aircraft, monitoring the radar, handling weapons deployment, and maintaining communications.  With only one pilot, an aircraft usually has too much information to process at any one time.&lt;br /&gt;
&lt;br /&gt;
It was found that pilots were extremely overloaded with so much information that they were unable to make effective decisions, let alone fly the aircraft safely.  It was decided to create a system that would limit the information and allow the aircraft to decide what information should be displayed to the pilot at certain times.  &lt;br /&gt;
&lt;br /&gt;
[[Image:F35 1.jpg]]For example, the latest multi-branch multi-role fighter, the F-35, has only one huge primary screen for the cockpit as well as a high definition heads up display.  Previously, aircraft were equipped with three or four multi-function displays as well as numerous analog displays an and cluttered heads up display.  With a single display and a high definition heads-up-display screen, the pilot is able to customize the information displayed to his liking and the current mission.  In addition, computer systems automatically determine certain information that is important to the pilot at given intervals during the mission (e.g. weapon information during the attack stage, navigation and landing information during approach, etc.)&lt;br /&gt;
&lt;br /&gt;
[[Image:F35 1.jpg]]&lt;br /&gt;
&lt;br /&gt;
A challenging and controversial, while also the most important, is the friend and foe identification system.  Systems built into warplanes help determine and tell the pilot whether targeted and identified objects are friendly or enemy.  In a battle, this is the most important information, and at times could be the most difficult to determine.  The computer system does the best job possible based on radar cross section, visual identity through various frequency spectrums, and other data to determine identity.  In the end, it should always be the decision of the pilot to fire weapons.  However, newer systems are increasingly removing the control from the pilot to the computer by means of Unmanned Aerial Vehicles.&lt;br /&gt;
&lt;br /&gt;
With the evolution of DSS in the hands of the military, it is important to improve logic and guarantee that the last critical decision is in the hands of decision making human beings.&lt;br /&gt;
&lt;br /&gt;
===DSS in Health Care===&lt;br /&gt;
Decision support has been around for years for the health care industry in the form of the [http://www.pdr.net/login/Login.aspx Physicians' Desk Reference] (PDR). The PDR is a tool that doctors can use to look up treatment options to certain situations. The PDR has recently become electronic, allowing doctors to have the PDR on their hand held devices. Some health systems are using AI systems to help make diagnosis. You can find a full list here: [http://www.openclinical.org/aisinpracticeDSS.html]. DSS's are a great way for a hospital to ensure the quality of care by being able to monitor treatment and compare it to the expected treatment for a patient. Another way it assists is to speed up work flow by putting doctors on the right track faster. &lt;br /&gt;
&lt;br /&gt;
People who are against DSS in health care say that a computer cannot process all of the complicated issues that go into treating a patient. There are several issues to take into account when treating a patient including finances and religious beliefs. Another reason that people are wary of clinical DSS is that the data behind the systems is not always accurate. Medical science changes often and the data that backs a DSS needs to be updated and verified on a constant basis. Also it is unknown where the sources of this data is. Recently the PDR came under attack for using information about drugs that were still in an experimental phase [http://www.openclinical.org/aisinpracticeDSS.html].&lt;br /&gt;
&lt;br /&gt;
===Other applications===&lt;br /&gt;
Additionally, Decision Support Systems can be utilized in a large number of other disciplines.  Some of the other uses include banking, economics, business and management, agriculture, and transit.  However, DSSs can be applied to any situation that needs organization and decision making.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Assignment definition===&lt;br /&gt;
As we become more willing to incorporate more complex software into our daily lives, we are able to solve problems with fewer people and less complex organizational structures.  To allow one person to take the place of a decision group, decision-support systems have been developed. These systems distill expert knowledge and present it to the individual.  Many decision-support systems are in use in medicine, to guide diagnoses, recommend treatments to practitioners, and assist with risk-assessment of procedures.  Software also helps forestall medical emergencies through patient monitoring.  In the military, decision support systems are everywhere, from the fast-paced environment of a fighter-jet cockpit to command-and-control centers.  Other decision-support systems are used in business and government.&lt;br /&gt;
&lt;br /&gt;
It is easy to see how decision-support systems could cause harm, as well as prevent it.  Examine the ethical considerations raised in the design and use of decision-support systems (in general).  What, if any ethical responsibilities apply to the software engineer in development of a decision-support system where errors in its design or use could result in serious harm?  If a decision-support system is shown to reduce harm, improve quality of life, or otherwise provide a net-benefit to its users (fewer medical errors, battleground casualties, reduced costs of providing an essential public service, etc.), is it unethical to resist its adoption?  Please explain your answers.&lt;br /&gt;
&lt;br /&gt;
* http://en.wikipedia.org/wiki/Decision_support_system&lt;br /&gt;
* http://www.openclinical.org/clinical.html&lt;br /&gt;
* http://www.cioinsight.com/c/a/Past-Opinions/DecisionSupport-Systems-Lessons-from-the-Military/&lt;/div&gt;</summary>
		<author><name>Cjsoques</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_5,_Group_4&amp;diff=16998</id>
		<title>CSC 379 SUM2008:Week 5, Group 4</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_5,_Group_4&amp;diff=16998"/>
		<updated>2008-08-10T00:58:38Z</updated>

		<summary type="html">&lt;p&gt;Cjsoques: /* DSS in the Military */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Decision Support Systems ==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Decision_support_systems Decision Support Systems (DSS)] are computer-based information systems that aid in decision making.  Ideally, a DSS is a piece of interactive software that provides raw data, documents, knowledge, and/or business models to make decisions or aid in a decision making process.  &lt;br /&gt;
&lt;br /&gt;
The different classifications of Decision Support Systems include:&lt;br /&gt;
*Model-Driven - emphasizes access to and manipulation of a type of model. &lt;br /&gt;
*Communications-Driven - includes more than one person working together.&lt;br /&gt;
*Data-Driven - emphasizes access to and manipulation of internal-company data or other external data.&lt;br /&gt;
*Document-Driven - emphasizes access to and manipulation of unstructured data in varying electronic formats.&lt;br /&gt;
*Knowledge-Driven - provides specialized information and problem-solving expertise.  &lt;br /&gt;
&lt;br /&gt;
===DSS in the Military===&lt;br /&gt;
The military is on the forefront of Decision Support Systems.  Due to the critical life and death nature and the necessity for immediate response, DSS is ideal for assisting in tactical decisions that require limited yet key information at the correct instant.  In particular, the United States military uses DSS in various forms and degrees in some of the following systems:&lt;br /&gt;
&lt;br /&gt;
* Pilot display systems in aircraft&lt;br /&gt;
* Missile and targeting systems for various weaponry&lt;br /&gt;
* Battle commands stations (particularly Naval Battlegroups)&lt;br /&gt;
* Unmanned Aerial Vehicles&lt;br /&gt;
* Radar, Jamming, and Electronic Warfare vehicles&lt;br /&gt;
&lt;br /&gt;
The most advanced forms of DSS uses in the military exist in the latest generation of tactical fighter aircraft.  To reduce training cost and increase aircraft performance, the most advanced fighter aircraft use only one crew member (the pilot).  Previous multi-role aircraft had at least two crew members to split the task of controlling the aircraft, monitoring the radar, handling weapons deployment, and maintaining communications.  With only one pilot, an aircraft usually has too much information to process at any one time.&lt;br /&gt;
&lt;br /&gt;
It was found that pilots were extremely overloaded with so much information that they were unable to make effective decisions, let alone fly the aircraft safely.  It was decided to create a system that would limit the information and allow the aircraft to decide what information should be displayed to the pilot at certain times.  &lt;br /&gt;
&lt;br /&gt;
[[Image:F35 1.jpg]]For example, the latest multi-branch multi-role fighter, the F-35, has only one huge primary screen for the cockpit as well as a high definition heads up display.  Previously, aircraft were equipped with three or four multi-function displays as well as numerous analog displays an and cluttered heads up display.  With a single display and a high definition heads-up-display screen, the pilot is able to customize the information displayed to his liking and the current mission.  In addition, computer systems automatically determine certain information that is important to the pilot at given intervals during the mission (e.g. weapon information during the attack stage, navigation and landing information during approach, etc.)&lt;br /&gt;
&lt;br /&gt;
A challenging and controversial, while also the most important, is the friend and foe identification system.  Systems built into warplanes help determine and tell the pilot whether targeted and identified objects are friendly or enemy.  In a battle, this is the most important information, and at times could be the most difficult to determine.  The computer system does the best job possible based on radar cross section, visual identity through various frequency spectrums, and other data to determine identity.  In the end, it should always be the decision of the pilot to fire weapons.  However, newer systems are increasingly removing the control from the pilot to the computer by means of Unmanned Aerial Vehicles.&lt;br /&gt;
&lt;br /&gt;
With the evolution of DSS in the hands of the military, it is important to improve logic and guarantee that the last critical decision is in the hands of decision making human beings.&lt;br /&gt;
&lt;br /&gt;
===DSS in Health Care===&lt;br /&gt;
Decision support has been around for years for the health care industry in the form of the [http://www.pdr.net/login/Login.aspx Physicians' Desk Reference] (PDR). The PDR is a tool that doctors can use to look up treatment options to certain situations. The PDR has recently become electronic, allowing doctors to have the PDR on their hand held devices. Some health systems are using AI systems to help make diagnosis. You can find a full list here: [http://www.openclinical.org/aisinpracticeDSS.html]. DSS's are a great way for a hospital to ensure the quality of care by being able to monitor treatment and compare it to the expected treatment for a patient. Another way it assists is to speed up work flow by putting doctors on the right track faster. &lt;br /&gt;
&lt;br /&gt;
People who are against DSS in health care say that a computer cannot process all of the complicated issues that go into treating a patient. There are several issues to take into account when treating a patient including finances and religious beliefs. Another reason that people are wary of clinical DSS is that the data behind the systems is not always accurate. Medical science changes often and the data that backs a DSS needs to be updated and verified on a constant basis. Also it is unknown where the sources of this data is. Recently the PDR came under attack for using information about drugs that were still in an experimental phase [http://www.openclinical.org/aisinpracticeDSS.html].&lt;br /&gt;
&lt;br /&gt;
===Other applications===&lt;br /&gt;
Additionally, Decision Support Systems can be utilized in a large number of other disciplines.  Some of the other uses include banking, economics, business and management, agriculture, and transit.  However, DSSs can be applied to any situation that needs organization and decision making.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Assignment definition===&lt;br /&gt;
As we become more willing to incorporate more complex software into our daily lives, we are able to solve problems with fewer people and less complex organizational structures.  To allow one person to take the place of a decision group, decision-support systems have been developed. These systems distill expert knowledge and present it to the individual.  Many decision-support systems are in use in medicine, to guide diagnoses, recommend treatments to practitioners, and assist with risk-assessment of procedures.  Software also helps forestall medical emergencies through patient monitoring.  In the military, decision support systems are everywhere, from the fast-paced environment of a fighter-jet cockpit to command-and-control centers.  Other decision-support systems are used in business and government.&lt;br /&gt;
&lt;br /&gt;
It is easy to see how decision-support systems could cause harm, as well as prevent it.  Examine the ethical considerations raised in the design and use of decision-support systems (in general).  What, if any ethical responsibilities apply to the software engineer in development of a decision-support system where errors in its design or use could result in serious harm?  If a decision-support system is shown to reduce harm, improve quality of life, or otherwise provide a net-benefit to its users (fewer medical errors, battleground casualties, reduced costs of providing an essential public service, etc.), is it unethical to resist its adoption?  Please explain your answers.&lt;br /&gt;
&lt;br /&gt;
* http://en.wikipedia.org/wiki/Decision_support_system&lt;br /&gt;
* http://www.openclinical.org/clinical.html&lt;br /&gt;
* http://www.cioinsight.com/c/a/Past-Opinions/DecisionSupport-Systems-Lessons-from-the-Military/&lt;/div&gt;</summary>
		<author><name>Cjsoques</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=File:F35_1.jpg&amp;diff=16997</id>
		<title>File:F35 1.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=File:F35_1.jpg&amp;diff=16997"/>
		<updated>2008-08-10T00:56:05Z</updated>

		<summary type="html">&lt;p&gt;Cjsoques: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Cjsoques</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_5,_Group_4&amp;diff=16996</id>
		<title>CSC 379 SUM2008:Week 5, Group 4</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_5,_Group_4&amp;diff=16996"/>
		<updated>2008-08-10T00:49:15Z</updated>

		<summary type="html">&lt;p&gt;Cjsoques: /* DSS in the Military */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Decision Support Systems ==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Decision_support_systems Decision Support Systems (DSS)] are computer-based information systems that aid in decision making.  Ideally, a DSS is a piece of interactive software that provides raw data, documents, knowledge, and/or business models to make decisions or aid in a decision making process.  &lt;br /&gt;
&lt;br /&gt;
The different classifications of Decision Support Systems include:&lt;br /&gt;
*Model-Driven - emphasizes access to and manipulation of a type of model. &lt;br /&gt;
*Communications-Driven - includes more than one person working together.&lt;br /&gt;
*Data-Driven - emphasizes access to and manipulation of internal-company data or other external data.&lt;br /&gt;
*Document-Driven - emphasizes access to and manipulation of unstructured data in varying electronic formats.&lt;br /&gt;
*Knowledge-Driven - provides specialized information and problem-solving expertise.  &lt;br /&gt;
&lt;br /&gt;
===DSS in the Military===&lt;br /&gt;
The military is on the forefront of Decision Support Systems.  Due to the critical life and death nature and the necessity for immediate response, DSS is ideal for assisting in tactical decisions that require limited yet key information at the correct instant.  In particular, the United States military uses DSS in various forms and degrees in some of the following systems:&lt;br /&gt;
&lt;br /&gt;
* Pilot display systems in aircraft&lt;br /&gt;
* Missile and targeting systems for various weaponry&lt;br /&gt;
* Battle commands stations (particularly Naval Battlegroups)&lt;br /&gt;
* Unmanned Aerial Vehicles&lt;br /&gt;
* Radar, Jamming, and Electronic Warfare vehicles&lt;br /&gt;
&lt;br /&gt;
The most advanced forms of DSS uses in the military exist in the latest generation of tactical fighter aircraft.  To reduce training cost and increase aircraft performance, the most advanced fighter aircraft use only one crew member (the pilot).  Previous multi-role aircraft had at least two crew members to split the task of controlling the aircraft, monitoring the radar, handling weapons deployment, and maintaining communications.  With only one pilot, an aircraft usually has too much information to process at any one time.&lt;br /&gt;
&lt;br /&gt;
It was found that pilots were extremely overloaded with so much information that they were unable to make effective decisions, let alone fly the aircraft safely.  It was decided to create a system that would limit the information and allow the aircraft to decide what information should be displayed to the pilot at certain times.  &lt;br /&gt;
&lt;br /&gt;
For example, the latest multi-branch multi-role fighter, the F-35, has only one huge primary screen for the cockpit as well as a high definition heads up display.  Previously, aircraft were equipped with three or four multi-function displays as well as numerous analog displays an and cluttered heads up display.  With a single display and a high definition heads-up-display screen, the pilot is able to customize the information displayed to his liking and the current mission.  In addition, computer systems automatically determine certain information that is important to the pilot at given intervals during the mission (e.g. weapon information during the attack stage, navigation and landing information during approach, etc.)&lt;br /&gt;
&lt;br /&gt;
A challenging and controversial, while also the most important, is the friend and foe identification system.  Systems built into warplanes help determine and tell the pilot whether targeted and identified objects are friendly or enemy.  In a battle, this is the most important information, and at times could be the most difficult to determine.  The computer system does the best job possible based on radar cross section, visual identity through various frequency spectrums, and other data to determine identity.  In the end, it should always be the decision of the pilot to fire weapons.  However, newer systems are increasingly removing the control from the pilot to the computer by means of Unmanned Aerial Vehicles.&lt;br /&gt;
&lt;br /&gt;
With the evolution of DSS in the hands of the military, it is important to improve logic and guarantee that the last critical decision is in the hands of decision making human beings.&lt;br /&gt;
&lt;br /&gt;
===DSS in Health Care===&lt;br /&gt;
Decision support has been around for years for the health care industry in the form of the [http://www.pdr.net/login/Login.aspx Physicians' Desk Reference] (PDR). The PDR is a tool that doctors can use to look up treatment options to certain situations. The PDR has recently become electronic, allowing doctors to have the PDR on their hand held devices. Some health systems are using AI systems to help make diagnosis. You can find a full list here: [http://www.openclinical.org/aisinpracticeDSS.html]. DSS's are a great way for a hospital to ensure the quality of care by being able to monitor treatment and compare it to the expected treatment for a patient. Another way it assists is to speed up work flow by putting doctors on the right track faster. &lt;br /&gt;
&lt;br /&gt;
People who are against DSS in health care say that a computer cannot process all of the complicated issues that go into treating a patient. There are several issues to take into account when treating a patient including finances and religious beliefs. Another reason that people are wary of clinical DSS is that the data behind the systems is not always accurate. Medical science changes often and the data that backs a DSS needs to be updated and verified on a constant basis. Also it is unknown where the sources of this data is. Recently the PDR came under attack for using information about drugs that were still in an experimental phase [http://www.openclinical.org/aisinpracticeDSS.html].&lt;br /&gt;
&lt;br /&gt;
===Other applications===&lt;br /&gt;
Additionally, Decision Support Systems can be utilized in a large number of other disciplines.  Some of the other uses include banking, economics, business and management, agriculture, and transit.  However, DSSs can be applied to any situation that needs organization and decision making.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Assignment definition===&lt;br /&gt;
As we become more willing to incorporate more complex software into our daily lives, we are able to solve problems with fewer people and less complex organizational structures.  To allow one person to take the place of a decision group, decision-support systems have been developed. These systems distill expert knowledge and present it to the individual.  Many decision-support systems are in use in medicine, to guide diagnoses, recommend treatments to practitioners, and assist with risk-assessment of procedures.  Software also helps forestall medical emergencies through patient monitoring.  In the military, decision support systems are everywhere, from the fast-paced environment of a fighter-jet cockpit to command-and-control centers.  Other decision-support systems are used in business and government.&lt;br /&gt;
&lt;br /&gt;
It is easy to see how decision-support systems could cause harm, as well as prevent it.  Examine the ethical considerations raised in the design and use of decision-support systems (in general).  What, if any ethical responsibilities apply to the software engineer in development of a decision-support system where errors in its design or use could result in serious harm?  If a decision-support system is shown to reduce harm, improve quality of life, or otherwise provide a net-benefit to its users (fewer medical errors, battleground casualties, reduced costs of providing an essential public service, etc.), is it unethical to resist its adoption?  Please explain your answers.&lt;br /&gt;
&lt;br /&gt;
* http://en.wikipedia.org/wiki/Decision_support_system&lt;br /&gt;
* http://www.openclinical.org/clinical.html&lt;br /&gt;
* http://www.cioinsight.com/c/a/Past-Opinions/DecisionSupport-Systems-Lessons-from-the-Military/&lt;/div&gt;</summary>
		<author><name>Cjsoques</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_5,_Group_4&amp;diff=16995</id>
		<title>CSC 379 SUM2008:Week 5, Group 4</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_5,_Group_4&amp;diff=16995"/>
		<updated>2008-08-10T00:48:22Z</updated>

		<summary type="html">&lt;p&gt;Cjsoques: /* DSS in the Military */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Decision Support Systems ==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Decision_support_systems Decision Support Systems (DSS)] are computer-based information systems that aid in decision making.  Ideally, a DSS is a piece of interactive software that provides raw data, documents, knowledge, and/or business models to make decisions or aid in a decision making process.  &lt;br /&gt;
&lt;br /&gt;
The different classifications of Decision Support Systems include:&lt;br /&gt;
*Model-Driven - emphasizes access to and manipulation of a type of model. &lt;br /&gt;
*Communications-Driven - includes more than one person working together.&lt;br /&gt;
*Data-Driven - emphasizes access to and manipulation of internal-company data or other external data.&lt;br /&gt;
*Document-Driven - emphasizes access to and manipulation of unstructured data in varying electronic formats.&lt;br /&gt;
*Knowledge-Driven - provides specialized information and problem-solving expertise.  &lt;br /&gt;
&lt;br /&gt;
===DSS in the Military===&lt;br /&gt;
The military is on the forefront of Decision Support Systems.  Due to the critical life and death nature and the necessity for immediate response, DSS is ideal for assisting in tactical decisions that require limited yet key information at the correct instant.  In particular, the United States military uses DSS in various forms and degrees in some of the following systems:&lt;br /&gt;
&lt;br /&gt;
* Pilot display systems in aircraft&lt;br /&gt;
* Missile and targeting systems for various weaponry&lt;br /&gt;
* Battle commands stations (particularly Naval Battlegroups)&lt;br /&gt;
* Unmanned Aerial Vehicles&lt;br /&gt;
* Radar, Jamming, and Electronic Warfare vehicles&lt;br /&gt;
&lt;br /&gt;
The most advanced forms of DSS uses in the military exist in the latest generation of tactical fighter aircraft.  To reduce training cost and increase aircraft performance, the most advanced fighter aircraft use only one crew member (the pilot).  Previous multi-role aircraft had at least two crew members to split the task of controlling the aircraft, monitoring the radar, handling weapons deployment, and maintaining communications.  With only one pilot, an aircraft usually has too much information to process at any one time.&lt;br /&gt;
&lt;br /&gt;
It was found that pilots were extremely overloaded with so much information that they were unable to make effective decisions, let alone fly the aircraft safely.  It was decided to create a system that would limit the information and allow the aircraft to decide what information should be displayed to the pilot at certain times.  &lt;br /&gt;
&lt;br /&gt;
[[Image:http://doshimodo.com/wp-content/uploads/2007/11/f35_1.jpg]]For example, the latest multi-branch multi-role fighter, the F-35, has only one huge primary screen for the cockpit as well as a high definition heads up display.  Previously, aircraft were equipped with three or four multi-function displays as well as numerous analog displays an and cluttered heads up display.  With a single display and a high definition heads-up-display screen, the pilot is able to customize the information displayed to his liking and the current mission.  In addition, computer systems automatically determine certain information that is important to the pilot at given intervals during the mission (e.g. weapon information during the attack stage, navigation and landing information during approach, etc.)&lt;br /&gt;
&lt;br /&gt;
A challenging and controversial, while also the most important, is the friend and foe identification system.  Systems built into warplanes help determine and tell the pilot whether targeted and identified objects are friendly or enemy.  In a battle, this is the most important information, and at times could be the most difficult to determine.  The computer system does the best job possible based on radar cross section, visual identity through various frequency spectrums, and other data to determine identity.  In the end, it should always be the decision of the pilot to fire weapons.  However, newer systems are increasingly removing the control from the pilot to the computer by means of Unmanned Aerial Vehicles.&lt;br /&gt;
&lt;br /&gt;
With the evolution of DSS in the hands of the military, it is important to improve logic and guarantee that the last critical decision is in the hands of decision making human beings.&lt;br /&gt;
&lt;br /&gt;
===DSS in Health Care===&lt;br /&gt;
Decision support has been around for years for the health care industry in the form of the [http://www.pdr.net/login/Login.aspx Physicians' Desk Reference] (PDR). The PDR is a tool that doctors can use to look up treatment options to certain situations. The PDR has recently become electronic, allowing doctors to have the PDR on their hand held devices. Some health systems are using AI systems to help make diagnosis. You can find a full list here: [http://www.openclinical.org/aisinpracticeDSS.html]. DSS's are a great way for a hospital to ensure the quality of care by being able to monitor treatment and compare it to the expected treatment for a patient. Another way it assists is to speed up work flow by putting doctors on the right track faster. &lt;br /&gt;
&lt;br /&gt;
People who are against DSS in health care say that a computer cannot process all of the complicated issues that go into treating a patient. There are several issues to take into account when treating a patient including finances and religious beliefs. Another reason that people are wary of clinical DSS is that the data behind the systems is not always accurate. Medical science changes often and the data that backs a DSS needs to be updated and verified on a constant basis. Also it is unknown where the sources of this data is. Recently the PDR came under attack for using information about drugs that were still in an experimental phase [http://www.openclinical.org/aisinpracticeDSS.html].&lt;br /&gt;
&lt;br /&gt;
===Other applications===&lt;br /&gt;
Additionally, Decision Support Systems can be utilized in a large number of other disciplines.  Some of the other uses include banking, economics, business and management, agriculture, and transit.  However, DSSs can be applied to any situation that needs organization and decision making.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Assignment definition===&lt;br /&gt;
As we become more willing to incorporate more complex software into our daily lives, we are able to solve problems with fewer people and less complex organizational structures.  To allow one person to take the place of a decision group, decision-support systems have been developed. These systems distill expert knowledge and present it to the individual.  Many decision-support systems are in use in medicine, to guide diagnoses, recommend treatments to practitioners, and assist with risk-assessment of procedures.  Software also helps forestall medical emergencies through patient monitoring.  In the military, decision support systems are everywhere, from the fast-paced environment of a fighter-jet cockpit to command-and-control centers.  Other decision-support systems are used in business and government.&lt;br /&gt;
&lt;br /&gt;
It is easy to see how decision-support systems could cause harm, as well as prevent it.  Examine the ethical considerations raised in the design and use of decision-support systems (in general).  What, if any ethical responsibilities apply to the software engineer in development of a decision-support system where errors in its design or use could result in serious harm?  If a decision-support system is shown to reduce harm, improve quality of life, or otherwise provide a net-benefit to its users (fewer medical errors, battleground casualties, reduced costs of providing an essential public service, etc.), is it unethical to resist its adoption?  Please explain your answers.&lt;br /&gt;
&lt;br /&gt;
* http://en.wikipedia.org/wiki/Decision_support_system&lt;br /&gt;
* http://www.openclinical.org/clinical.html&lt;br /&gt;
* http://www.cioinsight.com/c/a/Past-Opinions/DecisionSupport-Systems-Lessons-from-the-Military/&lt;/div&gt;</summary>
		<author><name>Cjsoques</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_5,_Group_4&amp;diff=16994</id>
		<title>CSC 379 SUM2008:Week 5, Group 4</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_5,_Group_4&amp;diff=16994"/>
		<updated>2008-08-09T23:32:54Z</updated>

		<summary type="html">&lt;p&gt;Cjsoques: /* DSS in the Military */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Decision Support Systems ==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Decision_support_systems Decision Support Systems (DSS)] are computer-based information systems that aid in decision making.  Ideally, a DSS is a piece of interactive software that provides raw data, documents, knowledge, and/or business models to make decisions or aid in a decision making process.  &lt;br /&gt;
&lt;br /&gt;
The different classifications of Decision Support Systems include:&lt;br /&gt;
*Model-Driven - emphasizes access to and manipulation of a type of model. &lt;br /&gt;
*Communications-Driven - includes more than one person working together.&lt;br /&gt;
*Data-Driven - emphasizes access to and manipulation of internal-company data or other external data.&lt;br /&gt;
*Document-Driven - emphasizes access to and manipulation of unstructured data in varying electronic formats.&lt;br /&gt;
*Knowledge-Driven - provides specialized information and problem-solving expertise.  &lt;br /&gt;
&lt;br /&gt;
===DSS in the Military===&lt;br /&gt;
The military is on the forefront of Decision Support Systems.  Due to the critical life and death nature and the necessity for immediate response, DSS is ideal for assisting in tactical decisions that require limited yet key information at the correct instant.  In particular, the United States military uses DSS in various forms and degrees in some of the following systems:&lt;br /&gt;
&lt;br /&gt;
* Pilot display systems in aircraft&lt;br /&gt;
* Missile and targeting systems for various weaponry&lt;br /&gt;
* Battle commands stations (particularly Naval Battlegroups)&lt;br /&gt;
* Unmanned Aerial Vehicles&lt;br /&gt;
* Radar, Jamming, and Electronic Warfare vehicles&lt;br /&gt;
&lt;br /&gt;
The most advanced forms of DSS uses in the military exist in the latest generation of tactical fighter aircraft.  To reduce training cost and increase aircraft performance, the most advanced fighter aircraft use only one crew member (the pilot).  Previous multi-role aircraft had at least two crew members to split the task of controlling the aircraft, monitoring the radar, handling weapons deployment, and maintaining communications.  With only one pilot, an aircraft usually has too much information to process at any one time.&lt;br /&gt;
&lt;br /&gt;
It was found that pilots were extremely overloaded with so much information that they were unable to make effective decisions, let alone fly the aircraft safely.  It was decided to create a system that would limit the information and allow the aircraft to decide what information should be displayed to the pilot at certain times.  &lt;br /&gt;
&lt;br /&gt;
For example, the latest multi-branch multi-role fighter, the F-35, has only one huge primary screen for the cockpit as well as a high definition heads up display.  Previously, aircraft were equipped with three or four multi-function displays as well as numerous analog displays an and cluttered heads up display.&lt;br /&gt;
&lt;br /&gt;
===DSS in Health Care===&lt;br /&gt;
Decision support has been around for years for the health care industry in the form of the [http://www.pdr.net/login/Login.aspx Physicians' Desk Reference] (PDR). The PDR is a tool that doctors can use to look up treatment options to certain situations. The PDR has recently become electronic, allowing doctors to have the PDR on their hand held devices. Some health systems are using AI systems to help make diagnosis. You can find a full list here: [http://www.openclinical.org/aisinpracticeDSS.html]. DSS's are a great way for a hospital to ensure the quality of care by being able to monitor treatment and compare it to the expected treatment for a patient. Another way it assists is to speed up work flow by putting doctors on the right track faster. &lt;br /&gt;
&lt;br /&gt;
People who are against DSS in health care say that a computer cannot process all of the complicated issues that go into treating a patient. There are several issues to take into account when treating a patient including finances and religious beliefs. Another reason that people are wary of clinical DSS is that the data behind the systems is not always accurate. Medical science changes often and the data that backs a DSS needs to be updated and verified on a constant basis. Also it is unknown where the sources of this data is. Recently the PDR came under attack for using information about drugs that were still in an experimental phase [http://www.openclinical.org/aisinpracticeDSS.html].&lt;br /&gt;
&lt;br /&gt;
===Other applications===&lt;br /&gt;
Additionally, Decision Support Systems can be utilized in a large number of other disciplines.  Some of the other uses include banking, economics, business and management, agriculture, and transit.  However, DSSs can be applied to any situation that needs organization and decision making.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Assignment definition===&lt;br /&gt;
As we become more willing to incorporate more complex software into our daily lives, we are able to solve problems with fewer people and less complex organizational structures.  To allow one person to take the place of a decision group, decision-support systems have been developed. These systems distill expert knowledge and present it to the individual.  Many decision-support systems are in use in medicine, to guide diagnoses, recommend treatments to practitioners, and assist with risk-assessment of procedures.  Software also helps forestall medical emergencies through patient monitoring.  In the military, decision support systems are everywhere, from the fast-paced environment of a fighter-jet cockpit to command-and-control centers.  Other decision-support systems are used in business and government.&lt;br /&gt;
&lt;br /&gt;
It is easy to see how decision-support systems could cause harm, as well as prevent it.  Examine the ethical considerations raised in the design and use of decision-support systems (in general).  What, if any ethical responsibilities apply to the software engineer in development of a decision-support system where errors in its design or use could result in serious harm?  If a decision-support system is shown to reduce harm, improve quality of life, or otherwise provide a net-benefit to its users (fewer medical errors, battleground casualties, reduced costs of providing an essential public service, etc.), is it unethical to resist its adoption?  Please explain your answers.&lt;br /&gt;
&lt;br /&gt;
* http://en.wikipedia.org/wiki/Decision_support_system&lt;br /&gt;
* http://www.openclinical.org/clinical.html&lt;br /&gt;
* http://www.cioinsight.com/c/a/Past-Opinions/DecisionSupport-Systems-Lessons-from-the-Military/&lt;/div&gt;</summary>
		<author><name>Cjsoques</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=16880</id>
		<title>Social Engineering</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=16880"/>
		<updated>2008-08-06T12:13:20Z</updated>

		<summary type="html">&lt;p&gt;Cjsoques: /* Useful Resources */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Social engineering a method of fraud and hacking that utilizes the humanity and nature of people to retrieve information.  If one can fool a person into giving away information, then creating a program or hack to retrieve that information by force is not required.  Furthermore, it can be much simpler and efficient to get information from someone through social engineering than it would ever be to steal that information via a computer program or password cracker.  &lt;br /&gt;
&lt;br /&gt;
Defense against social engineering requires guardians of information to be very proactive.  For example, you can use an antivirus program that will passively scan your computer for viruses automatically. However, the human must be actively on the defense for social-engineering tricks and tactics that may be used against them.  Over the years, general guidelines for companies and employees have been developed to give the knowledge necessary to be vigilant and alert for social engineering fraud attempts.&lt;br /&gt;
&lt;br /&gt;
==STUDY GUIDE==&lt;br /&gt;
This study guide relates to security precautions against Social Engineering.  For the main Security Precautions study guide, go [http://ethics.csc.ncsu.edu/risks/security/precautions/study.php here].&lt;br /&gt;
&lt;br /&gt;
===Tactics and Methods===&lt;br /&gt;
There are various means of utilizing social engineering to obtain confidential and secret information such as passwords and private data.  All of these methods work through some medium in which the attacker has to actually converse with the victim in some way, whether directly or indirectly.  In all methods, feedback from the victim is required.  This feedback is usually the necessary information the attacker was looking for.&lt;br /&gt;
&lt;br /&gt;
Although social engineering tactics are heavily performed through electronic and computer media, there are many ways to do social engineering through the physical realm.  As long as there can be some form of communication between the attacker and the victim, any medium may be used.  Social engineering is so successful because it takes advantage of the fallacies of the human being.  Whether by means of flattery, impersonation, and greed; social engineering is considered to some an art form of psychology.&lt;br /&gt;
&lt;br /&gt;
Social Engineering can be extremely simple to perform, but have dire effects and consequences.  There are even [http://news.cnet.com/8301-1009_3-9995253-83.html guides and tips] on how hackers have used social engineering in extremely simple ways.  Social engineering is considered so dangerous that [http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick], a renowned hacker and early user of social enginering, was considered the most dangerous hacker.  The FBI thought that Mitnick could start a nuclear war by simply utilizing social engineering.  &lt;br /&gt;
&lt;br /&gt;
====Phishing====&lt;br /&gt;
The main way of retrieving electronic information from victim voluntarily is through [http://en.wikipedia.org/wiki/Phishing phishing].  Phishing, like social engineering, can be performed over various electronic and physical mediums.  In a general term, phishing is pretending to be something legitimate, when you are not.  When you fool the victim into thinking you are the legitimate source that is being faked, they will reveal all the information that would normally be required to use that source.  This may include account numbers, usernames, passwords, or even Social Security numbers.&lt;br /&gt;
&lt;br /&gt;
A major medium of phishing is through e-mail.  The example of a bank and customer is extremely common.  The attacker will send the victim an e-mail notifying them of some required account information to be updated.  This e-mail will look exactly like the standard e-mail the victim may have received from the bank before.  The victim will be required to login and update their information as soon as possible.  However, the link will not be sent to the bank website, but to a separate server that was set up by the attacker to retrieve the information.  This website, like the e-mail, will look exactly like the actual bank website.  Once the person types their login information, the attacker then has all the information they needed from the victim.&lt;br /&gt;
&lt;br /&gt;
In unusual cases, phishing may also be performed over the phone by pretending to be a representative of some company that is requesting some kind of account information.  The attacker may even know some basic information about the victim to prove that (s)he is legitimate.  Usually, a victim will not question the caller's authority and will provide the necessary information.  The attacker can then use this information to take advantage of the victim by means of identity or property theft.&lt;br /&gt;
&lt;br /&gt;
====Pretexting====&lt;br /&gt;
[http://www.ftc.gov/bcp/conline/pubs/credit/pretext.shtm Pretexting] is a form of using information about the victim to obtain even more information or to use it against the victim.  Through pretexting the attacker uses the limited information gained to obtain more information.  Once enough information is gained.  The attacker may use credit pretending to be the victim, to make purchases acting as the victim, or to manipulate the records of the victim.&lt;br /&gt;
&lt;br /&gt;
The goal of pretexting is to prove to someone that you are legitimately the victim.  This may be done from proving that you know their name, address, phone number, and Social Security Number.  This could also be done by knowing the victim's username and password that was retrieved through phishing.&lt;br /&gt;
&lt;br /&gt;
====Trojan Horse====&lt;br /&gt;
A [http://www.tech-faq.com/trojan-horse-virus.shtml Trojan Horse] a technological form of social engineering.  Not only does it fool the victim that it is from a legitimate source, but it also fools the computer the victim is using.  A Trojan horse is a program that may seem to perform a legitimate action, but in fact is collecting sensitive information or stealing data in the background.  This is, of course, derived from the tactic used by the Spartans to invade Troy by presenting the Trojans with a gift horse containing Spartan soldiers (this is an ancient example of social engineering).&lt;br /&gt;
&lt;br /&gt;
To be specific, a ''gimme'' is a type of Trojan Horse that plays off of social engineering.  This tactic goes in conjunction with spamming or phishing.  The user will receive a pop-up ad or e-mail ad notifying the victim of some software that would benefit them.  Because of their curiosity and the seeming innocence of the program, the victim will install it on their machine.  The software may even perform as advertised, but in the background is obtaining account information and other confidential data.&lt;br /&gt;
&lt;br /&gt;
This is where a computer program pretends to be something it is not.  Instead of an actual human being performing the pretexting, it is done by an automated computer program.&lt;br /&gt;
&lt;br /&gt;
===Security, Precautions, and Defenses===&lt;br /&gt;
There are many precautions and defenses against social engineering.  However, users lack education on the methods to defend against this tactic.  Various methods include rigorous identity verification, minimizing the number of people with access to sensitive information, as well as reducing the trust level of those in control of information.  Many companies have developed security policies and guidelines that employees should follow to minimize the risk of social engineering exploits.&lt;br /&gt;
&lt;br /&gt;
====Proactive Social Defenses====&lt;br /&gt;
SANS Network Security has a [http://www.sans.org/reading_room/whitepapers/engineering/511.php brief guide] for employees to maintain a proactive awareness against social engineering.  Through proactive self-defense a company should develop a detailed policy on security and data release.  This policy should detail who is able to release information, what information, and to who that information may be released to. &lt;br /&gt;
&lt;br /&gt;
There should be detailed access approval to any secured area or information.  A company should set up a defense against social engineering by always having a detailed access approval process, instead of simply not challenging the requester of information. The company should have a designated help desk and support center that is knowledgeable in the policies of data release.  Information such as employee IDs, account information, and passwords should always be challenged with a detailed approval policy.&lt;br /&gt;
&lt;br /&gt;
By detailing who is allowed to release information and what information can be released, a company can minimize the amount of violations through social-engineering.  Usually social engineering succeeds because there is no preset guideline for giving out information for rare instances that social engineers exploit.&lt;br /&gt;
&lt;br /&gt;
===Employee Training===&lt;br /&gt;
Since the human being is the reason for social engineering exploits, the employee is the number-one defense against attacks.  By [http://techrepublic.com.com/5208-6230-0.html?forumID=102&amp;amp;threadID=232696 being trained on case studies], employees gain an understanding of how easy it is for social engineering to work.  Training to employees to reduce their trust value and not take request for information at face value will discourage attackers from requesting further information.  If in doubt, the employee should never give out confidential information, but take the request to the next person in command.&lt;br /&gt;
&lt;br /&gt;
====Security Software and Electronics====&lt;br /&gt;
Since the goal of social engineering exploits are to bypass technological and security barriers, there are few electronic and software means to stop social engineering.  One main way to combat and reduce the risk is to have in place strict identity verification technologies that combat counterfeit and impersonation attacks.  Social engineering attacks are so easy because it is so easy to appear legitimate.  If identify verification were scrutinized at both a human and electronic level, the legitimacy of identity would be much harder to prove.&lt;br /&gt;
&lt;br /&gt;
In addition, companies can install [http://ca.com/us/securityadvisor/documents/collateral.aspx?cid=157506 software] that will reduce the number of social engineering solicitations that employees receive through e-mail and Web sites.  By filtering out known threatening sources, this software can prevent the employee from even having to make the decision of whether the source is legitimate.&lt;br /&gt;
&lt;br /&gt;
===Legal and Ethical Concerns===&lt;br /&gt;
In the United States, there are laws against pretexting and falsifying identity.  The [http://en.wikipedia.org/wiki/Gramm-Leach-Bliley_Act Gramm-Leach-Billey Act (GLBA)] makes it illegal to do the following&lt;br /&gt;
&lt;br /&gt;
* To falsify information or make false statements to retrieve information from a financial institution or even a customer of that institution&lt;br /&gt;
&lt;br /&gt;
* To use forged or stolen documents to receive information from a financial institution or a customer of that institution&lt;br /&gt;
&lt;br /&gt;
* Ask another person to obtain information by using the above two means&lt;br /&gt;
&lt;br /&gt;
In addition, the [http://en.wikipedia.org/wiki/Federal_Trade_Commission_Act Federal Trade Commission Act] prohibits pretexting for customer information.&lt;br /&gt;
&lt;br /&gt;
===Some Helpful Information===&lt;br /&gt;
&lt;br /&gt;
'''1. Why Are Security Precautions Necessary to Safeguard Against Social Engineering?'''&lt;br /&gt;
&lt;br /&gt;
* In the United States, identity, both personal and financial, are held digitally.  Typical social engineering attacks aim at stealing the digital identities of people.  This can ruin their credit and ability to purchase things, as well as reputations when it comes to employment.  [http://www.ftc.gov/bcp/edu/microsites/idtheft/ Here] are some tips from the FTC on safeguarding your information.  You should never give out information unless you are certain of the source.  You should also limit the amount of information you allow organizations to have.  They are also prone to hacking and social engineering threats that could steal your identity.&lt;br /&gt;
&lt;br /&gt;
* If security precautions are not taken against social engineering, a skilled hacker could forge his way into nearly any system.  It is said that the famous social engineer [http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick] would be able to set off nuclear missiles from his phone using social-engineering tactics.  It is important that organizations and individuals be aware of the threat of social engineering.  Do not take everything at face value.&lt;br /&gt;
&lt;br /&gt;
* Social-engineering attacks are not just made through electronic means.  Social-engineering tricks play on the fallacy of a human and their associated emotions.  It is important for an individual to be aware of the threats and tactics of social engineering.  Social engineers typically target gullible members of a company to obtain small bits of information and work their way up, gaining more information.  If you are alert to these threads, you are better defender against both your identity, your employer, as well as your clients.&lt;br /&gt;
&lt;br /&gt;
* It is sometimes very hard to tell when you are being tricked by a fraudulent act.  Employees in control of sensitive information must go through rigorous training to sense when they are being tricked.&lt;br /&gt;
&lt;br /&gt;
'''2. Social Engineering Security Precautions Are Not Easy'''&lt;br /&gt;
&lt;br /&gt;
* Since social engineering does not necessarily require any special technical skill set, like hacking, it is open to many types of attackers who are adept at fooling an individual.  &lt;br /&gt;
&lt;br /&gt;
* It is hard to devise structured policies to defend against the leak of confidential information through the means of social engineering.  There is no single solution for solving the problem of social engineering.  It is up to the company to do the best job they can creating useful policies for the release of sensitive data.  Employees much also be aware of the various methods and tactics used by social engineers to obtain information.&lt;br /&gt;
&lt;br /&gt;
* Unlike hacking or stealing by force, social engineering is very elusive.  Almost always, when information is released, the victim has no idea they gave it to someone posing as a legitimate source.&lt;br /&gt;
&lt;br /&gt;
==Useful Resources==&lt;br /&gt;
&lt;br /&gt;
Definitions and Descriptions of Social Engineering:&lt;br /&gt;
&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/risks/security/precautions/ Security Precautions (Old Project Page)]&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Social_engineering_%28security%29 Social Engineering (Wikipedia)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.securityfocus.com/infocus/1527 Social Engineering Fundamentals]&lt;br /&gt;
&lt;br /&gt;
* [http://searchfinancialsecurity.techtarget.com/tip/0,289483,sid185_gci1294530,00.html Social Engineering Attacks]&lt;br /&gt;
&lt;br /&gt;
* [http://news.cnet.com/8301-1009_3-9995253-83.html Social Engineering: Hackers show how it is done]&lt;br /&gt;
&lt;br /&gt;
Defense and Tips against Social Engineering Attacks:&lt;br /&gt;
&lt;br /&gt;
* [http://www.sans.org/reading_room/whitepapers/engineering/511.php Proactive Defense to Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://www.morehouse.org/hin/blckcrwl/hack/soceng.txt Social Engineering FAQ]&lt;br /&gt;
&lt;br /&gt;
* [http://www.hackinthebox.org/modules.php?op=modload&amp;amp;name=News&amp;amp;file=article&amp;amp;sid=15170&amp;amp;mode=thread&amp;amp;order=0&amp;amp;thold=0 Social Engineering Defense 101]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cioupdate.com/trends/article.php/3638951 Best Defense Against Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://techrepublic.com.com/5208-6230-0.html?forumID=102&amp;amp;threadID=232696 Social Engineering Self-defense]&lt;br /&gt;
&lt;br /&gt;
* [http://www.infosecwriters.com/text_resources/pdf/Social_Engineering_CRhodes.pdf Safeguarding Against Social Engineering]&lt;br /&gt;
&lt;br /&gt;
Current News and Information on Social Engineering&lt;br /&gt;
&lt;br /&gt;
* [http://www.expresscomputeronline.com/20080728/securityspecial07.shtml Why 2008 is the Year of Social Engineering and Malware]&lt;br /&gt;
&lt;br /&gt;
* [http://www.vnunet.com/vnunet/news/2223358/adobe-warns-fake-flash-peddlers Adobe Warns of Fake Flash Codec and Social Engineering Scam]&lt;br /&gt;
&lt;br /&gt;
* [http://www.vnunet.com/vnunet/news/2223350/phishing-attack-hits-beijing-olympics Phishing Attacks Hit Beijing Olympics]&lt;br /&gt;
&lt;br /&gt;
* [http://www.gamesdog.co.uk/news/news.phtml/7895/8919/Phishing-scam-hits-Xbox-Live.phtml Phishing Scam Hits Xbox Live]&lt;br /&gt;
&lt;br /&gt;
* [http://www.coloradodaily.com/news/2008/jul/31/word-jump-line-here-phishing-lures-malicious-e/ Phishing Lures Dangled at Campus E-mail Addresses]&lt;/div&gt;</summary>
		<author><name>Cjsoques</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=16879</id>
		<title>Social Engineering</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=16879"/>
		<updated>2008-08-06T12:09:16Z</updated>

		<summary type="html">&lt;p&gt;Cjsoques: /* Useful Resources */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Social engineering a method of fraud and hacking that utilizes the humanity and nature of people to retrieve information.  If one can fool a person into giving away information, then creating a program or hack to retrieve that information by force is not required.  Furthermore, it can be much simpler and efficient to get information from someone through social engineering than it would ever be to steal that information via a computer program or password cracker.  &lt;br /&gt;
&lt;br /&gt;
Defense against social engineering requires guardians of information to be very proactive.  For example, you can use an antivirus program that will passively scan your computer for viruses automatically. However, the human must be actively on the defense for social-engineering tricks and tactics that may be used against them.  Over the years, general guidelines for companies and employees have been developed to give the knowledge necessary to be vigilant and alert for social engineering fraud attempts.&lt;br /&gt;
&lt;br /&gt;
==STUDY GUIDE==&lt;br /&gt;
This study guide relates to security precautions against Social Engineering.  For the main Security Precautions study guide, go [http://ethics.csc.ncsu.edu/risks/security/precautions/study.php here].&lt;br /&gt;
&lt;br /&gt;
===Tactics and Methods===&lt;br /&gt;
There are various means of utilizing social engineering to obtain confidential and secret information such as passwords and private data.  All of these methods work through some medium in which the attacker has to actually converse with the victim in some way, whether directly or indirectly.  In all methods, feedback from the victim is required.  This feedback is usually the necessary information the attacker was looking for.&lt;br /&gt;
&lt;br /&gt;
Although social engineering tactics are heavily performed through electronic and computer media, there are many ways to do social engineering through the physical realm.  As long as there can be some form of communication between the attacker and the victim, any medium may be used.  Social engineering is so successful because it takes advantage of the fallacies of the human being.  Whether by means of flattery, impersonation, and greed; social engineering is considered to some an art form of psychology.&lt;br /&gt;
&lt;br /&gt;
Social Engineering can be extremely simple to perform, but have dire effects and consequences.  There are even [http://news.cnet.com/8301-1009_3-9995253-83.html guides and tips] on how hackers have used social engineering in extremely simple ways.  Social engineering is considered so dangerous that [http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick], a renowned hacker and early user of social enginering, was considered the most dangerous hacker.  The FBI thought that Mitnick could start a nuclear war by simply utilizing social engineering.  &lt;br /&gt;
&lt;br /&gt;
====Phishing====&lt;br /&gt;
The main way of retrieving electronic information from victim voluntarily is through [http://en.wikipedia.org/wiki/Phishing phishing].  Phishing, like social engineering, can be performed over various electronic and physical mediums.  In a general term, phishing is pretending to be something legitimate, when you are not.  When you fool the victim into thinking you are the legitimate source that is being faked, they will reveal all the information that would normally be required to use that source.  This may include account numbers, usernames, passwords, or even Social Security numbers.&lt;br /&gt;
&lt;br /&gt;
A major medium of phishing is through e-mail.  The example of a bank and customer is extremely common.  The attacker will send the victim an e-mail notifying them of some required account information to be updated.  This e-mail will look exactly like the standard e-mail the victim may have received from the bank before.  The victim will be required to login and update their information as soon as possible.  However, the link will not be sent to the bank website, but to a separate server that was set up by the attacker to retrieve the information.  This website, like the e-mail, will look exactly like the actual bank website.  Once the person types their login information, the attacker then has all the information they needed from the victim.&lt;br /&gt;
&lt;br /&gt;
In unusual cases, phishing may also be performed over the phone by pretending to be a representative of some company that is requesting some kind of account information.  The attacker may even know some basic information about the victim to prove that (s)he is legitimate.  Usually, a victim will not question the caller's authority and will provide the necessary information.  The attacker can then use this information to take advantage of the victim by means of identity or property theft.&lt;br /&gt;
&lt;br /&gt;
====Pretexting====&lt;br /&gt;
[http://www.ftc.gov/bcp/conline/pubs/credit/pretext.shtm Pretexting] is a form of using information about the victim to obtain even more information or to use it against the victim.  Through pretexting the attacker uses the limited information gained to obtain more information.  Once enough information is gained.  The attacker may use credit pretending to be the victim, to make purchases acting as the victim, or to manipulate the records of the victim.&lt;br /&gt;
&lt;br /&gt;
The goal of pretexting is to prove to someone that you are legitimately the victim.  This may be done from proving that you know their name, address, phone number, and Social Security Number.  This could also be done by knowing the victim's username and password that was retrieved through phishing.&lt;br /&gt;
&lt;br /&gt;
====Trojan Horse====&lt;br /&gt;
A [http://www.tech-faq.com/trojan-horse-virus.shtml Trojan Horse] a technological form of social engineering.  Not only does it fool the victim that it is from a legitimate source, but it also fools the computer the victim is using.  A Trojan horse is a program that may seem to perform a legitimate action, but in fact is collecting sensitive information or stealing data in the background.  This is, of course, derived from the tactic used by the Spartans to invade Troy by presenting the Trojans with a gift horse containing Spartan soldiers (this is an ancient example of social engineering).&lt;br /&gt;
&lt;br /&gt;
To be specific, a ''gimme'' is a type of Trojan Horse that plays off of social engineering.  This tactic goes in conjunction with spamming or phishing.  The user will receive a pop-up ad or e-mail ad notifying the victim of some software that would benefit them.  Because of their curiosity and the seeming innocence of the program, the victim will install it on their machine.  The software may even perform as advertised, but in the background is obtaining account information and other confidential data.&lt;br /&gt;
&lt;br /&gt;
This is where a computer program pretends to be something it is not.  Instead of an actual human being performing the pretexting, it is done by an automated computer program.&lt;br /&gt;
&lt;br /&gt;
===Security, Precautions, and Defenses===&lt;br /&gt;
There are many precautions and defenses against social engineering.  However, users lack education on the methods to defend against this tactic.  Various methods include rigorous identity verification, minimizing the number of people with access to sensitive information, as well as reducing the trust level of those in control of information.  Many companies have developed security policies and guidelines that employees should follow to minimize the risk of social engineering exploits.&lt;br /&gt;
&lt;br /&gt;
====Proactive Social Defenses====&lt;br /&gt;
SANS Network Security has a [http://www.sans.org/reading_room/whitepapers/engineering/511.php brief guide] for employees to maintain a proactive awareness against social engineering.  Through proactive self-defense a company should develop a detailed policy on security and data release.  This policy should detail who is able to release information, what information, and to who that information may be released to. &lt;br /&gt;
&lt;br /&gt;
There should be detailed access approval to any secured area or information.  A company should set up a defense against social engineering by always having a detailed access approval process, instead of simply not challenging the requester of information. The company should have a designated help desk and support center that is knowledgeable in the policies of data release.  Information such as employee IDs, account information, and passwords should always be challenged with a detailed approval policy.&lt;br /&gt;
&lt;br /&gt;
By detailing who is allowed to release information and what information can be released, a company can minimize the amount of violations through social-engineering.  Usually social engineering succeeds because there is no preset guideline for giving out information for rare instances that social engineers exploit.&lt;br /&gt;
&lt;br /&gt;
===Employee Training===&lt;br /&gt;
Since the human being is the reason for social engineering exploits, the employee is the number-one defense against attacks.  By [http://techrepublic.com.com/5208-6230-0.html?forumID=102&amp;amp;threadID=232696 being trained on case studies], employees gain an understanding of how easy it is for social engineering to work.  Training to employees to reduce their trust value and not take request for information at face value will discourage attackers from requesting further information.  If in doubt, the employee should never give out confidential information, but take the request to the next person in command.&lt;br /&gt;
&lt;br /&gt;
====Security Software and Electronics====&lt;br /&gt;
Since the goal of social engineering exploits are to bypass technological and security barriers, there are few electronic and software means to stop social engineering.  One main way to combat and reduce the risk is to have in place strict identity verification technologies that combat counterfeit and impersonation attacks.  Social engineering attacks are so easy because it is so easy to appear legitimate.  If identify verification were scrutinized at both a human and electronic level, the legitimacy of identity would be much harder to prove.&lt;br /&gt;
&lt;br /&gt;
In addition, companies can install [http://ca.com/us/securityadvisor/documents/collateral.aspx?cid=157506 software] that will reduce the number of social engineering solicitations that employees receive through e-mail and Web sites.  By filtering out known threatening sources, this software can prevent the employee from even having to make the decision of whether the source is legitimate.&lt;br /&gt;
&lt;br /&gt;
===Legal and Ethical Concerns===&lt;br /&gt;
In the United States, there are laws against pretexting and falsifying identity.  The [http://en.wikipedia.org/wiki/Gramm-Leach-Bliley_Act Gramm-Leach-Billey Act (GLBA)] makes it illegal to do the following&lt;br /&gt;
&lt;br /&gt;
* To falsify information or make false statements to retrieve information from a financial institution or even a customer of that institution&lt;br /&gt;
&lt;br /&gt;
* To use forged or stolen documents to receive information from a financial institution or a customer of that institution&lt;br /&gt;
&lt;br /&gt;
* Ask another person to obtain information by using the above two means&lt;br /&gt;
&lt;br /&gt;
In addition, the [http://en.wikipedia.org/wiki/Federal_Trade_Commission_Act Federal Trade Commission Act] prohibits pretexting for customer information.&lt;br /&gt;
&lt;br /&gt;
===Some Helpful Information===&lt;br /&gt;
&lt;br /&gt;
'''1. Why Are Security Precautions Necessary to Safeguard Against Social Engineering?'''&lt;br /&gt;
&lt;br /&gt;
* In the United States, identity, both personal and financial, are held digitally.  Typical social engineering attacks aim at stealing the digital identities of people.  This can ruin their credit and ability to purchase things, as well as reputations when it comes to employment.  [http://www.ftc.gov/bcp/edu/microsites/idtheft/ Here] are some tips from the FTC on safeguarding your information.  You should never give out information unless you are certain of the source.  You should also limit the amount of information you allow organizations to have.  They are also prone to hacking and social engineering threats that could steal your identity.&lt;br /&gt;
&lt;br /&gt;
* If security precautions are not taken against social engineering, a skilled hacker could forge his way into nearly any system.  It is said that the famous social engineer [http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick] would be able to set off nuclear missiles from his phone using social-engineering tactics.  It is important that organizations and individuals be aware of the threat of social engineering.  Do not take everything at face value.&lt;br /&gt;
&lt;br /&gt;
* Social-engineering attacks are not just made through electronic means.  Social-engineering tricks play on the fallacy of a human and their associated emotions.  It is important for an individual to be aware of the threats and tactics of social engineering.  Social engineers typically target gullible members of a company to obtain small bits of information and work their way up, gaining more information.  If you are alert to these threads, you are better defender against both your identity, your employer, as well as your clients.&lt;br /&gt;
&lt;br /&gt;
* It is sometimes very hard to tell when you are being tricked by a fraudulent act.  Employees in control of sensitive information must go through rigorous training to sense when they are being tricked.&lt;br /&gt;
&lt;br /&gt;
'''2. Social Engineering Security Precautions Are Not Easy'''&lt;br /&gt;
&lt;br /&gt;
* Since social engineering does not necessarily require any special technical skill set, like hacking, it is open to many types of attackers who are adept at fooling an individual.  &lt;br /&gt;
&lt;br /&gt;
* It is hard to devise structured policies to defend against the leak of confidential information through the means of social engineering.  There is no single solution for solving the problem of social engineering.  It is up to the company to do the best job they can creating useful policies for the release of sensitive data.  Employees much also be aware of the various methods and tactics used by social engineers to obtain information.&lt;br /&gt;
&lt;br /&gt;
* Unlike hacking or stealing by force, social engineering is very elusive.  Almost always, when information is released, the victim has no idea they gave it to someone posing as a legitimate source.&lt;br /&gt;
&lt;br /&gt;
==Useful Resources==&lt;br /&gt;
&lt;br /&gt;
Definitions and Descriptions of Social Engineering:&lt;br /&gt;
&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/risks/security/precautions/ Security Precautions (Old Project Page)]&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Social_engineering_%28security%29 Social Engineering (Wikipedia)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.securityfocus.com/infocus/1527 Social Engineering Fundamentals]&lt;br /&gt;
&lt;br /&gt;
* [http://searchfinancialsecurity.techtarget.com/tip/0,289483,sid185_gci1294530,00.html Social Engineering Attacks]&lt;br /&gt;
&lt;br /&gt;
* [http://news.cnet.com/8301-1009_3-9995253-83.html Social Engineering: Hackers show how it is done]&lt;br /&gt;
&lt;br /&gt;
Defense and Tips against Social Engineering Attacks:&lt;br /&gt;
&lt;br /&gt;
* [http://www.sans.org/reading_room/whitepapers/engineering/511.php Proactive Defense to Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://www.morehouse.org/hin/blckcrwl/hack/soceng.txt Social Engineering FAQ]&lt;br /&gt;
&lt;br /&gt;
* [http://www.hackinthebox.org/modules.php?op=modload&amp;amp;name=News&amp;amp;file=article&amp;amp;sid=15170&amp;amp;mode=thread&amp;amp;order=0&amp;amp;thold=0 Social Engineering Defense 101]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cioupdate.com/trends/article.php/3638951 Best Defense Against Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://techrepublic.com.com/5208-6230-0.html?forumID=102&amp;amp;threadID=232696 Social Engineering Self-defense]&lt;br /&gt;
&lt;br /&gt;
* [http://www.infosecwriters.com/text_resources/pdf/Social_Engineering_CRhodes.pdf Safeguarding Against Social Engineering]&lt;br /&gt;
&lt;br /&gt;
Current News and Information on Social Engineering&lt;br /&gt;
&lt;br /&gt;
* [http://www.expresscomputeronline.com/20080728/securityspecial07.shtml Why 2008 is the Year of Social Engineering and Malware]&lt;br /&gt;
&lt;br /&gt;
* [http://www.vnunet.com/vnunet/news/2223358/adobe-warns-fake-flash-peddlers Adobe Warns of Fake Flash Codec]&lt;br /&gt;
&lt;br /&gt;
* [http://www.vnunet.com/vnunet/news/2223350/phishing-attack-hits-beijing-olympics Phishing Attacks Hit Beijing Olympics]&lt;br /&gt;
&lt;br /&gt;
* [http://www.gamesdog.co.uk/news/news.phtml/7895/8919/Phishing-scam-hits-Xbox-Live.phtml Phishing Scam Hits Xbox Live]&lt;/div&gt;</summary>
		<author><name>Cjsoques</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=16878</id>
		<title>Social Engineering</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=16878"/>
		<updated>2008-08-06T11:59:38Z</updated>

		<summary type="html">&lt;p&gt;Cjsoques: /* STUDY GUIDE */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Social engineering a method of fraud and hacking that utilizes the humanity and nature of people to retrieve information.  If one can fool a person into giving away information, then creating a program or hack to retrieve that information by force is not required.  Furthermore, it can be much simpler and efficient to get information from someone through social engineering than it would ever be to steal that information via a computer program or password cracker.  &lt;br /&gt;
&lt;br /&gt;
Defense against social engineering requires guardians of information to be very proactive.  For example, you can use an antivirus program that will passively scan your computer for viruses automatically. However, the human must be actively on the defense for social-engineering tricks and tactics that may be used against them.  Over the years, general guidelines for companies and employees have been developed to give the knowledge necessary to be vigilant and alert for social engineering fraud attempts.&lt;br /&gt;
&lt;br /&gt;
==STUDY GUIDE==&lt;br /&gt;
This study guide relates to security precautions against Social Engineering.  For the main Security Precautions study guide, go [http://ethics.csc.ncsu.edu/risks/security/precautions/study.php here].&lt;br /&gt;
&lt;br /&gt;
===Tactics and Methods===&lt;br /&gt;
There are various means of utilizing social engineering to obtain confidential and secret information such as passwords and private data.  All of these methods work through some medium in which the attacker has to actually converse with the victim in some way, whether directly or indirectly.  In all methods, feedback from the victim is required.  This feedback is usually the necessary information the attacker was looking for.&lt;br /&gt;
&lt;br /&gt;
Although social engineering tactics are heavily performed through electronic and computer media, there are many ways to do social engineering through the physical realm.  As long as there can be some form of communication between the attacker and the victim, any medium may be used.  Social engineering is so successful because it takes advantage of the fallacies of the human being.  Whether by means of flattery, impersonation, and greed; social engineering is considered to some an art form of psychology.&lt;br /&gt;
&lt;br /&gt;
Social Engineering can be extremely simple to perform, but have dire effects and consequences.  There are even [http://news.cnet.com/8301-1009_3-9995253-83.html guides and tips] on how hackers have used social engineering in extremely simple ways.  Social engineering is considered so dangerous that [http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick], a renowned hacker and early user of social enginering, was considered the most dangerous hacker.  The FBI thought that Mitnick could start a nuclear war by simply utilizing social engineering.  &lt;br /&gt;
&lt;br /&gt;
====Phishing====&lt;br /&gt;
The main way of retrieving electronic information from victim voluntarily is through [http://en.wikipedia.org/wiki/Phishing phishing].  Phishing, like social engineering, can be performed over various electronic and physical mediums.  In a general term, phishing is pretending to be something legitimate, when you are not.  When you fool the victim into thinking you are the legitimate source that is being faked, they will reveal all the information that would normally be required to use that source.  This may include account numbers, usernames, passwords, or even Social Security numbers.&lt;br /&gt;
&lt;br /&gt;
A major medium of phishing is through e-mail.  The example of a bank and customer is extremely common.  The attacker will send the victim an e-mail notifying them of some required account information to be updated.  This e-mail will look exactly like the standard e-mail the victim may have received from the bank before.  The victim will be required to login and update their information as soon as possible.  However, the link will not be sent to the bank website, but to a separate server that was set up by the attacker to retrieve the information.  This website, like the e-mail, will look exactly like the actual bank website.  Once the person types their login information, the attacker then has all the information they needed from the victim.&lt;br /&gt;
&lt;br /&gt;
In unusual cases, phishing may also be performed over the phone by pretending to be a representative of some company that is requesting some kind of account information.  The attacker may even know some basic information about the victim to prove that (s)he is legitimate.  Usually, a victim will not question the caller's authority and will provide the necessary information.  The attacker can then use this information to take advantage of the victim by means of identity or property theft.&lt;br /&gt;
&lt;br /&gt;
====Pretexting====&lt;br /&gt;
[http://www.ftc.gov/bcp/conline/pubs/credit/pretext.shtm Pretexting] is a form of using information about the victim to obtain even more information or to use it against the victim.  Through pretexting the attacker uses the limited information gained to obtain more information.  Once enough information is gained.  The attacker may use credit pretending to be the victim, to make purchases acting as the victim, or to manipulate the records of the victim.&lt;br /&gt;
&lt;br /&gt;
The goal of pretexting is to prove to someone that you are legitimately the victim.  This may be done from proving that you know their name, address, phone number, and Social Security Number.  This could also be done by knowing the victim's username and password that was retrieved through phishing.&lt;br /&gt;
&lt;br /&gt;
====Trojan Horse====&lt;br /&gt;
A [http://www.tech-faq.com/trojan-horse-virus.shtml Trojan Horse] a technological form of social engineering.  Not only does it fool the victim that it is from a legitimate source, but it also fools the computer the victim is using.  A Trojan horse is a program that may seem to perform a legitimate action, but in fact is collecting sensitive information or stealing data in the background.  This is, of course, derived from the tactic used by the Spartans to invade Troy by presenting the Trojans with a gift horse containing Spartan soldiers (this is an ancient example of social engineering).&lt;br /&gt;
&lt;br /&gt;
To be specific, a ''gimme'' is a type of Trojan Horse that plays off of social engineering.  This tactic goes in conjunction with spamming or phishing.  The user will receive a pop-up ad or e-mail ad notifying the victim of some software that would benefit them.  Because of their curiosity and the seeming innocence of the program, the victim will install it on their machine.  The software may even perform as advertised, but in the background is obtaining account information and other confidential data.&lt;br /&gt;
&lt;br /&gt;
This is where a computer program pretends to be something it is not.  Instead of an actual human being performing the pretexting, it is done by an automated computer program.&lt;br /&gt;
&lt;br /&gt;
===Security, Precautions, and Defenses===&lt;br /&gt;
There are many precautions and defenses against social engineering.  However, users lack education on the methods to defend against this tactic.  Various methods include rigorous identity verification, minimizing the number of people with access to sensitive information, as well as reducing the trust level of those in control of information.  Many companies have developed security policies and guidelines that employees should follow to minimize the risk of social engineering exploits.&lt;br /&gt;
&lt;br /&gt;
====Proactive Social Defenses====&lt;br /&gt;
SANS Network Security has a [http://www.sans.org/reading_room/whitepapers/engineering/511.php brief guide] for employees to maintain a proactive awareness against social engineering.  Through proactive self-defense a company should develop a detailed policy on security and data release.  This policy should detail who is able to release information, what information, and to who that information may be released to. &lt;br /&gt;
&lt;br /&gt;
There should be detailed access approval to any secured area or information.  A company should set up a defense against social engineering by always having a detailed access approval process, instead of simply not challenging the requester of information. The company should have a designated help desk and support center that is knowledgeable in the policies of data release.  Information such as employee IDs, account information, and passwords should always be challenged with a detailed approval policy.&lt;br /&gt;
&lt;br /&gt;
By detailing who is allowed to release information and what information can be released, a company can minimize the amount of violations through social-engineering.  Usually social engineering succeeds because there is no preset guideline for giving out information for rare instances that social engineers exploit.&lt;br /&gt;
&lt;br /&gt;
===Employee Training===&lt;br /&gt;
Since the human being is the reason for social engineering exploits, the employee is the number-one defense against attacks.  By [http://techrepublic.com.com/5208-6230-0.html?forumID=102&amp;amp;threadID=232696 being trained on case studies], employees gain an understanding of how easy it is for social engineering to work.  Training to employees to reduce their trust value and not take request for information at face value will discourage attackers from requesting further information.  If in doubt, the employee should never give out confidential information, but take the request to the next person in command.&lt;br /&gt;
&lt;br /&gt;
====Security Software and Electronics====&lt;br /&gt;
Since the goal of social engineering exploits are to bypass technological and security barriers, there are few electronic and software means to stop social engineering.  One main way to combat and reduce the risk is to have in place strict identity verification technologies that combat counterfeit and impersonation attacks.  Social engineering attacks are so easy because it is so easy to appear legitimate.  If identify verification were scrutinized at both a human and electronic level, the legitimacy of identity would be much harder to prove.&lt;br /&gt;
&lt;br /&gt;
In addition, companies can install [http://ca.com/us/securityadvisor/documents/collateral.aspx?cid=157506 software] that will reduce the number of social engineering solicitations that employees receive through e-mail and Web sites.  By filtering out known threatening sources, this software can prevent the employee from even having to make the decision of whether the source is legitimate.&lt;br /&gt;
&lt;br /&gt;
===Legal and Ethical Concerns===&lt;br /&gt;
In the United States, there are laws against pretexting and falsifying identity.  The [http://en.wikipedia.org/wiki/Gramm-Leach-Bliley_Act Gramm-Leach-Billey Act (GLBA)] makes it illegal to do the following&lt;br /&gt;
&lt;br /&gt;
* To falsify information or make false statements to retrieve information from a financial institution or even a customer of that institution&lt;br /&gt;
&lt;br /&gt;
* To use forged or stolen documents to receive information from a financial institution or a customer of that institution&lt;br /&gt;
&lt;br /&gt;
* Ask another person to obtain information by using the above two means&lt;br /&gt;
&lt;br /&gt;
In addition, the [http://en.wikipedia.org/wiki/Federal_Trade_Commission_Act Federal Trade Commission Act] prohibits pretexting for customer information.&lt;br /&gt;
&lt;br /&gt;
===Some Helpful Information===&lt;br /&gt;
&lt;br /&gt;
'''1. Why Are Security Precautions Necessary to Safeguard Against Social Engineering?'''&lt;br /&gt;
&lt;br /&gt;
* In the United States, identity, both personal and financial, are held digitally.  Typical social engineering attacks aim at stealing the digital identities of people.  This can ruin their credit and ability to purchase things, as well as reputations when it comes to employment.  [http://www.ftc.gov/bcp/edu/microsites/idtheft/ Here] are some tips from the FTC on safeguarding your information.  You should never give out information unless you are certain of the source.  You should also limit the amount of information you allow organizations to have.  They are also prone to hacking and social engineering threats that could steal your identity.&lt;br /&gt;
&lt;br /&gt;
* If security precautions are not taken against social engineering, a skilled hacker could forge his way into nearly any system.  It is said that the famous social engineer [http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick] would be able to set off nuclear missiles from his phone using social-engineering tactics.  It is important that organizations and individuals be aware of the threat of social engineering.  Do not take everything at face value.&lt;br /&gt;
&lt;br /&gt;
* Social-engineering attacks are not just made through electronic means.  Social-engineering tricks play on the fallacy of a human and their associated emotions.  It is important for an individual to be aware of the threats and tactics of social engineering.  Social engineers typically target gullible members of a company to obtain small bits of information and work their way up, gaining more information.  If you are alert to these threads, you are better defender against both your identity, your employer, as well as your clients.&lt;br /&gt;
&lt;br /&gt;
* It is sometimes very hard to tell when you are being tricked by a fraudulent act.  Employees in control of sensitive information must go through rigorous training to sense when they are being tricked.&lt;br /&gt;
&lt;br /&gt;
'''2. Social Engineering Security Precautions Are Not Easy'''&lt;br /&gt;
&lt;br /&gt;
* Since social engineering does not necessarily require any special technical skill set, like hacking, it is open to many types of attackers who are adept at fooling an individual.  &lt;br /&gt;
&lt;br /&gt;
* It is hard to devise structured policies to defend against the leak of confidential information through the means of social engineering.  There is no single solution for solving the problem of social engineering.  It is up to the company to do the best job they can creating useful policies for the release of sensitive data.  Employees much also be aware of the various methods and tactics used by social engineers to obtain information.&lt;br /&gt;
&lt;br /&gt;
* Unlike hacking or stealing by force, social engineering is very elusive.  Almost always, when information is released, the victim has no idea they gave it to someone posing as a legitimate source.&lt;br /&gt;
&lt;br /&gt;
==Useful Resources==&lt;br /&gt;
&lt;br /&gt;
Definitions and Descriptions of Social Engineering:&lt;br /&gt;
&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/risks/security/precautions/ Security Precautions (Old Project Page)]&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Social_engineering_%28security%29 Social Engineering (Wikipedia)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.securityfocus.com/infocus/1527 Social Engineering Fundamentals]&lt;br /&gt;
&lt;br /&gt;
* [http://searchfinancialsecurity.techtarget.com/tip/0,289483,sid185_gci1294530,00.html Social Engineering Attacks]&lt;br /&gt;
&lt;br /&gt;
* [http://news.cnet.com/8301-1009_3-9995253-83.html Social Engineering: Hackers show how it is done]&lt;br /&gt;
&lt;br /&gt;
Defense and Tips against Social Engineering Attacks:&lt;br /&gt;
&lt;br /&gt;
* [http://www.sans.org/reading_room/whitepapers/engineering/511.php Proactive Defense to Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://www.morehouse.org/hin/blckcrwl/hack/soceng.txt Social Engineering FAQ]&lt;br /&gt;
&lt;br /&gt;
* [http://www.hackinthebox.org/modules.php?op=modload&amp;amp;name=News&amp;amp;file=article&amp;amp;sid=15170&amp;amp;mode=thread&amp;amp;order=0&amp;amp;thold=0 Social Engineering Defense 101]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cioupdate.com/trends/article.php/3638951 Best Defense Against Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://techrepublic.com.com/5208-6230-0.html?forumID=102&amp;amp;threadID=232696 Social Engineering Self-defense]&lt;br /&gt;
&lt;br /&gt;
* [http://www.infosecwriters.com/text_resources/pdf/Social_Engineering_CRhodes.pdf Safeguarding Against Social Engineering]&lt;/div&gt;</summary>
		<author><name>Cjsoques</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=16877</id>
		<title>Social Engineering</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=16877"/>
		<updated>2008-08-06T11:56:52Z</updated>

		<summary type="html">&lt;p&gt;Cjsoques: /* Tactics and Methods */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Social engineering a method of fraud and hacking that utilizes the humanity and nature of people to retrieve information.  If one can fool a person into giving away information, then creating a program or hack to retrieve that information by force is not required.  Furthermore, it can be much simpler and efficient to get information from someone through social engineering than it would ever be to steal that information via a computer program or password cracker.  &lt;br /&gt;
&lt;br /&gt;
Defense against social engineering requires guardians of information to be very proactive.  For example, you can use an antivirus program that will passively scan your computer for viruses automatically. However, the human must be actively on the defense for social-engineering tricks and tactics that may be used against them.  Over the years, general guidelines for companies and employees have been developed to give the knowledge necessary to be vigilant and alert for social engineering fraud attempts.&lt;br /&gt;
&lt;br /&gt;
=STUDY GUIDE=&lt;br /&gt;
==Tactics and Methods==&lt;br /&gt;
There are various means of utilizing social engineering to obtain confidential and secret information such as passwords and private data.  All of these methods work through some medium in which the attacker has to actually converse with the victim in some way, whether directly or indirectly.  In all methods, feedback from the victim is required.  This feedback is usually the necessary information the attacker was looking for.&lt;br /&gt;
&lt;br /&gt;
Although social engineering tactics are heavily performed through electronic and computer media, there are many ways to do social engineering through the physical realm.  As long as there can be some form of communication between the attacker and the victim, any medium may be used.  Social engineering is so successful because it takes advantage of the fallacies of the human being.  Whether by means of flattery, impersonation, and greed; social engineering is considered to some an art form of psychology.&lt;br /&gt;
&lt;br /&gt;
Social Engineering can be extremely simple to perform, but have dire effects and consequences.  There are even [http://news.cnet.com/8301-1009_3-9995253-83.html guides and tips] on how hackers have used social engineering in extremely simple ways.  Social engineering is considered so dangerous that [http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick], a renowned hacker and early user of social enginering, was considered the most dangerous hacker.  The FBI thought that Mitnick could start a nuclear war by simply utilizing social engineering.  &lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
The main way of retrieving electronic information from victim voluntarily is through [http://en.wikipedia.org/wiki/Phishing phishing].  Phishing, like social engineering, can be performed over various electronic and physical mediums.  In a general term, phishing is pretending to be something legitimate, when you are not.  When you fool the victim into thinking you are the legitimate source that is being faked, they will reveal all the information that would normally be required to use that source.  This may include account numbers, usernames, passwords, or even Social Security numbers.&lt;br /&gt;
&lt;br /&gt;
A major medium of phishing is through e-mail.  The example of a bank and customer is extremely common.  The attacker will send the victim an e-mail notifying them of some required account information to be updated.  This e-mail will look exactly like the standard e-mail the victim may have received from the bank before.  The victim will be required to login and update their information as soon as possible.  However, the link will not be sent to the bank website, but to a separate server that was set up by the attacker to retrieve the information.  This website, like the e-mail, will look exactly like the actual bank website.  Once the person types their login information, the attacker then has all the information they needed from the victim.&lt;br /&gt;
&lt;br /&gt;
In unusual cases, phishing may also be performed over the phone by pretending to be a representative of some company that is requesting some kind of account information.  The attacker may even know some basic information about the victim to prove that (s)he is legitimate.  Usually, a victim will not question the caller's authority and will provide the necessary information.  The attacker can then use this information to take advantage of the victim by means of identity or property theft.&lt;br /&gt;
&lt;br /&gt;
===Pretexting===&lt;br /&gt;
[http://www.ftc.gov/bcp/conline/pubs/credit/pretext.shtm Pretexting] is a form of using information about the victim to obtain even more information or to use it against the victim.  Through pretexting the attacker uses the limited information gained to obtain more information.  Once enough information is gained.  The attacker may use credit pretending to be the victim, to make purchases acting as the victim, or to manipulate the records of the victim.&lt;br /&gt;
&lt;br /&gt;
The goal of pretexting is to prove to someone that you are legitimately the victim.  This may be done from proving that you know their name, address, phone number, and Social Security Number.  This could also be done by knowing the victim's username and password that was retrieved through phishing.&lt;br /&gt;
&lt;br /&gt;
===Trojan Horse===&lt;br /&gt;
A [http://www.tech-faq.com/trojan-horse-virus.shtml Trojan Horse] a technological form of social engineering.  Not only does it fool the victim that it is from a legitimate source, but it also fools the computer the victim is using.  A Trojan horse is a program that may seem to perform a legitimate action, but in fact is collecting sensitive information or stealing data in the background.  This is, of course, derived from the tactic used by the Spartans to invade Troy by presenting the Trojans with a gift horse containing Spartan soldiers (this is an ancient example of social engineering).&lt;br /&gt;
&lt;br /&gt;
To be specific, a ''gimme'' is a type of Trojan Horse that plays off of social engineering.  This tactic goes in conjunction with spamming or phishing.  The user will receive a pop-up ad or e-mail ad notifying the victim of some software that would benefit them.  Because of their curiosity and the seeming innocence of the program, the victim will install it on their machine.  The software may even perform as advertised, but in the background is obtaining account information and other confidential data.&lt;br /&gt;
&lt;br /&gt;
This is where a computer program pretends to be something it is not.  Instead of an actual human being performing the pretexting, it is done by an automated computer program.&lt;br /&gt;
&lt;br /&gt;
==Security, Precautions, and Defenses==&lt;br /&gt;
There are many precautions and defenses against social engineering.  However, users lack education on the methods to defend against this tactic.  Various methods include rigorous identity verification, minimizing the number of people with access to sensitive information, as well as reducing the trust level of those in control of information.  Many companies have developed security policies and guidelines that employees should follow to minimize the risk of social engineering exploits.&lt;br /&gt;
&lt;br /&gt;
===Proactive Social Defenses===&lt;br /&gt;
SANS Network Security has a [http://www.sans.org/reading_room/whitepapers/engineering/511.php brief guide] for employees to maintain a proactive awareness against social engineering.  Through proactive self-defense a company should develop a detailed policy on security and data release.  This policy should detail who is able to release information, what information, and to who that information may be released to. &lt;br /&gt;
&lt;br /&gt;
There should be detailed access approval to any secured area or information.  A company should set up a defense against social engineering by always having a detailed access approval process, instead of simply not challenging the requester of information. The company should have a designated help desk and support center that is knowledgeable in the policies of data release.  Information such as employee IDs, account information, and passwords should always be challenged with a detailed approval policy.&lt;br /&gt;
&lt;br /&gt;
By detailing who is allowed to release information and what information can be released, a company can minimize the amount of violations through social-engineering.  Usually social engineering succeeds because there is no preset guideline for giving out information for rare instances that social engineers exploit.&lt;br /&gt;
&lt;br /&gt;
===Employee Training===&lt;br /&gt;
Since the human being is the reason for social engineering exploits, the employee is the number-one defense against attacks.  By [http://techrepublic.com.com/5208-6230-0.html?forumID=102&amp;amp;threadID=232696 being trained on case studies], employees gain an understanding of how easy it is for social engineering to work.  Training to employees to reduce their trust value and not take request for information at face value will discourage attackers from requesting further information.  If in doubt, the employee should never give out confidential information, but take the request to the next person in command.&lt;br /&gt;
&lt;br /&gt;
===Security Software and Electronics===&lt;br /&gt;
Since the goal of social engineering exploits are to bypass technological and security barriers, there are few electronic and software means to stop social engineering.  One main way to combat and reduce the risk is to have in place strict identity verification technologies that combat counterfeit and impersonation attacks.  Social engineering attacks are so easy because it is so easy to appear legitimate.  If identify verification were scrutinized at both a human and electronic level, the legitimacy of identity would be much harder to prove.&lt;br /&gt;
&lt;br /&gt;
In addition, companies can install [http://ca.com/us/securityadvisor/documents/collateral.aspx?cid=157506 software] that will reduce the number of social engineering solicitations that employees receive through e-mail and Web sites.  By filtering out known threatening sources, this software can prevent the employee from even having to make the decision of whether the source is legitimate.&lt;br /&gt;
&lt;br /&gt;
==Legal and Ethical Concerns==&lt;br /&gt;
In the United States, there are laws against pretexting and falsifying identity.  The [http://en.wikipedia.org/wiki/Gramm-Leach-Bliley_Act Gramm-Leach-Billey Act (GLBA)] makes it illegal to do the following&lt;br /&gt;
&lt;br /&gt;
* To falsify information or make false statements to retrieve information from a financial institution or even a customer of that institution&lt;br /&gt;
&lt;br /&gt;
* To use forged or stolen documents to receive information from a financial institution or a customer of that institution&lt;br /&gt;
&lt;br /&gt;
* Ask another person to obtain information by using the above two means&lt;br /&gt;
&lt;br /&gt;
In addition, the [http://en.wikipedia.org/wiki/Federal_Trade_Commission_Act Federal Trade Commission Act] prohibits pretexting for customer information.&lt;br /&gt;
&lt;br /&gt;
==Study Guide==&lt;br /&gt;
This study guide relates to security precautions against Social Engineering.  For the main Security Precautions study guide, go [http://ethics.csc.ncsu.edu/risks/security/precautions/study.php here].&lt;br /&gt;
&lt;br /&gt;
'''1. Why Are Security Precautions Necessary to Safeguard Against Social Engineering?'''&lt;br /&gt;
&lt;br /&gt;
* In the United States, identity, both personal and financial, are held digitally.  Typical social engineering attacks aim at stealing the digital identities of people.  This can ruin their credit and ability to purchase things, as well as reputations when it comes to employment.  [http://www.ftc.gov/bcp/edu/microsites/idtheft/ Here] are some tips from the FTC on safeguarding your information.  You should never give out information unless you are certain of the source.  You should also limit the amount of information you allow organizations to have.  They are also prone to hacking and social engineering threats that could steal your identity.&lt;br /&gt;
&lt;br /&gt;
* If security precautions are not taken against social engineering, a skilled hacker could forge his way into nearly any system.  It is said that the famous social engineer [http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick] would be able to set off nuclear missiles from his phone using social-engineering tactics.  It is important that organizations and individuals be aware of the threat of social engineering.  Do not take everything at face value.&lt;br /&gt;
&lt;br /&gt;
* Social-engineering attacks are not just made through electronic means.  Social-engineering tricks play on the fallacy of a human and their associated emotions.  It is important for an individual to be aware of the threats and tactics of social engineering.  Social engineers typically target gullible members of a company to obtain small bits of information and work their way up, gaining more information.  If you are alert to these threads, you are better defender against both your identity, your employer, as well as your clients.&lt;br /&gt;
&lt;br /&gt;
* It is sometimes very hard to tell when you are being tricked by a fraudulent act.  Employees in control of sensitive information must go through rigorous training to sense when they are being tricked.&lt;br /&gt;
&lt;br /&gt;
'''2. Social Engineering Security Precautions Are Not Easy'''&lt;br /&gt;
&lt;br /&gt;
* Since social engineering does not necessarily require any special technical skill set, like hacking, it is open to many types of attackers who are adept at fooling an individual.  &lt;br /&gt;
&lt;br /&gt;
* It is hard to devise structured policies to defend against the leak of confidential information through the means of social engineering.  There is no single solution for solving the problem of social engineering.  It is up to the company to do the best job they can creating useful policies for the release of sensitive data.  Employees much also be aware of the various methods and tactics used by social engineers to obtain information.&lt;br /&gt;
&lt;br /&gt;
* Unlike hacking or stealing by force, social engineering is very elusive.  Almost always, when information is released, the victim has no idea they gave it to someone posing as a legitimate source.&lt;br /&gt;
&lt;br /&gt;
==Useful Resources==&lt;br /&gt;
&lt;br /&gt;
Definitions and Descriptions of Social Engineering:&lt;br /&gt;
&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/risks/security/precautions/ Security Precautions (Old Project Page)]&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Social_engineering_%28security%29 Social Engineering (Wikipedia)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.securityfocus.com/infocus/1527 Social Engineering Fundamentals]&lt;br /&gt;
&lt;br /&gt;
* [http://searchfinancialsecurity.techtarget.com/tip/0,289483,sid185_gci1294530,00.html Social Engineering Attacks]&lt;br /&gt;
&lt;br /&gt;
* [http://news.cnet.com/8301-1009_3-9995253-83.html Social Engineering: Hackers show how it is done]&lt;br /&gt;
&lt;br /&gt;
Defense and Tips against Social Engineering Attacks:&lt;br /&gt;
&lt;br /&gt;
* [http://www.sans.org/reading_room/whitepapers/engineering/511.php Proactive Defense to Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://www.morehouse.org/hin/blckcrwl/hack/soceng.txt Social Engineering FAQ]&lt;br /&gt;
&lt;br /&gt;
* [http://www.hackinthebox.org/modules.php?op=modload&amp;amp;name=News&amp;amp;file=article&amp;amp;sid=15170&amp;amp;mode=thread&amp;amp;order=0&amp;amp;thold=0 Social Engineering Defense 101]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cioupdate.com/trends/article.php/3638951 Best Defense Against Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://techrepublic.com.com/5208-6230-0.html?forumID=102&amp;amp;threadID=232696 Social Engineering Self-defense]&lt;br /&gt;
&lt;br /&gt;
* [http://www.infosecwriters.com/text_resources/pdf/Social_Engineering_CRhodes.pdf Safeguarding Against Social Engineering]&lt;/div&gt;</summary>
		<author><name>Cjsoques</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=16876</id>
		<title>Social Engineering</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=16876"/>
		<updated>2008-08-06T11:54:06Z</updated>

		<summary type="html">&lt;p&gt;Cjsoques: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Social engineering a method of fraud and hacking that utilizes the humanity and nature of people to retrieve information.  If one can fool a person into giving away information, then creating a program or hack to retrieve that information by force is not required.  Furthermore, it can be much simpler and efficient to get information from someone through social engineering than it would ever be to steal that information via a computer program or password cracker.  &lt;br /&gt;
&lt;br /&gt;
Defense against social engineering requires guardians of information to be very proactive.  For example, you can use an antivirus program that will passively scan your computer for viruses automatically. However, the human must be actively on the defense for social-engineering tricks and tactics that may be used against them.  Over the years, general guidelines for companies and employees have been developed to give the knowledge necessary to be vigilant and alert for social engineering fraud attempts.&lt;br /&gt;
&lt;br /&gt;
==Tactics and Methods==&lt;br /&gt;
There are various means of utilizing social engineering to obtain confidential and secret information such as passwords and private data.  All of these methods work through some medium in which the attacker has to actually converse with the victim in some way, whether directly or indirectly.  In all methods, feedback from the victim is required.  This feedback is usually the necessary information the attacker was looking for.&lt;br /&gt;
&lt;br /&gt;
Although social engineering tactics are heavily performed through electronic and computer media, there are many ways to do social engineering through the physical realm.  As long as there can be some form of communication between the attacker and the victim, any medium may be used.  Social engineering is so successful because it takes advantage of the fallacies of the human being.  Whether by means of flattery, impersonation, and greed; social engineering is considered to some an art form of psychology.&lt;br /&gt;
&lt;br /&gt;
Social Engineering can be extremely simple to perform, but have dire effects and consequences.  There are even [http://news.cnet.com/8301-1009_3-9995253-83.html guides and tips] on how hackers have used social engineering in extremely simple ways.  Social engineering is considered so dangerous that [http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick], a renowned hacker and early user of social enginering, was considered the most dangerous hacker.  The FBI thought that Mitnick could start a nuclear war by simply utilizing social engineering.  &lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
The main way of retrieving electronic information from victim voluntarily is through [http://en.wikipedia.org/wiki/Phishing phishing].  Phishing, like social engineering, can be performed over various electronic and physical mediums.  In a general term, phishing is pretending to be something legitimate, when you are not.  When you fool the victim into thinking you are the legitimate source that is being faked, they will reveal all the information that would normally be required to use that source.  This may include account numbers, usernames, passwords, or even Social Security numbers.&lt;br /&gt;
&lt;br /&gt;
A major medium of phishing is through e-mail.  The example of a bank and customer is extremely common.  The attacker will send the victim an e-mail notifying them of some required account information to be updated.  This e-mail will look exactly like the standard e-mail the victim may have received from the bank before.  The victim will be required to login and update their information as soon as possible.  However, the link will not be sent to the bank website, but to a separate server that was set up by the attacker to retrieve the information.  This website, like the e-mail, will look exactly like the actual bank website.  Once the person types their login information, the attacker then has all the information they needed from the victim.&lt;br /&gt;
&lt;br /&gt;
In unusual cases, phishing may also be performed over the phone by pretending to be a representative of some company that is requesting some kind of account information.  The attacker may even know some basic information about the victim to prove that (s)he is legitimate.  Usually, a victim will not question the caller's authority and will provide the necessary information.  The attacker can then use this information to take advantage of the victim by means of identity or property theft.&lt;br /&gt;
&lt;br /&gt;
===Pretexting===&lt;br /&gt;
[http://www.ftc.gov/bcp/conline/pubs/credit/pretext.shtm Pretexting] is a form of using information about the victim to obtain even more information or to use it against the victim.  Through pretexting the attacker uses the limited information gained to obtain more information.  Once enough information is gained.  The attacker may use credit pretending to be the victim, to make purchases acting as the victim, or to manipulate the records of the victim.&lt;br /&gt;
&lt;br /&gt;
The goal of pretexting is to prove to someone that you are legitimately the victim.  This may be done from proving that you know their name, address, phone number, and Social Security Number.  This could also be done by knowing the victim's username and password that was retrieved through phishing.&lt;br /&gt;
&lt;br /&gt;
===Trojan Horse===&lt;br /&gt;
A [http://www.tech-faq.com/trojan-horse-virus.shtml Trojan Horse] a technological form of social engineering.  Not only does it fool the victim that it is from a legitimate source, but it also fools the computer the victim is using.  A Trojan horse is a program that may seem to perform a legitimate action, but in fact is collecting sensitive information or stealing data in the background.  This is, of course, derived from the tactic used by the Spartans to invade Troy by presenting the Trojans with a gift horse containing Spartan soldiers (this is an ancient example of social engineering).&lt;br /&gt;
&lt;br /&gt;
To be specific, a ''gimme'' is a type of Trojan Horse that plays off of social engineering.  This tactic goes in conjunction with spamming or phishing.  The user will receive a pop-up ad or e-mail ad notifying the victim of some software that would benefit them.  Because of their curiosity and the seeming innocence of the program, the victim will install it on their machine.  The software may even perform as advertised, but in the background is obtaining account information and other confidential data.&lt;br /&gt;
&lt;br /&gt;
This is where a computer program pretends to be something it is not.  Instead of an actual human being performing the pretexting, it is done by an automated computer program.&lt;br /&gt;
&lt;br /&gt;
==Security, Precautions, and Defenses==&lt;br /&gt;
There are many precautions and defenses against social engineering.  However, users lack education on the methods to defend against this tactic.  Various methods include rigorous identity verification, minimizing the number of people with access to sensitive information, as well as reducing the trust level of those in control of information.  Many companies have developed security policies and guidelines that employees should follow to minimize the risk of social engineering exploits.&lt;br /&gt;
&lt;br /&gt;
===Proactive Social Defenses===&lt;br /&gt;
SANS Network Security has a [http://www.sans.org/reading_room/whitepapers/engineering/511.php brief guide] for employees to maintain a proactive awareness against social engineering.  Through proactive self-defense a company should develop a detailed policy on security and data release.  This policy should detail who is able to release information, what information, and to who that information may be released to. &lt;br /&gt;
&lt;br /&gt;
There should be detailed access approval to any secured area or information.  A company should set up a defense against social engineering by always having a detailed access approval process, instead of simply not challenging the requester of information. The company should have a designated help desk and support center that is knowledgeable in the policies of data release.  Information such as employee IDs, account information, and passwords should always be challenged with a detailed approval policy.&lt;br /&gt;
&lt;br /&gt;
By detailing who is allowed to release information and what information can be released, a company can minimize the amount of violations through social-engineering.  Usually social engineering succeeds because there is no preset guideline for giving out information for rare instances that social engineers exploit.&lt;br /&gt;
&lt;br /&gt;
===Employee Training===&lt;br /&gt;
Since the human being is the reason for social engineering exploits, the employee is the number-one defense against attacks.  By [http://techrepublic.com.com/5208-6230-0.html?forumID=102&amp;amp;threadID=232696 being trained on case studies], employees gain an understanding of how easy it is for social engineering to work.  Training to employees to reduce their trust value and not take request for information at face value will discourage attackers from requesting further information.  If in doubt, the employee should never give out confidential information, but take the request to the next person in command.&lt;br /&gt;
&lt;br /&gt;
===Security Software and Electronics===&lt;br /&gt;
Since the goal of social engineering exploits are to bypass technological and security barriers, there are few electronic and software means to stop social engineering.  One main way to combat and reduce the risk is to have in place strict identity verification technologies that combat counterfeit and impersonation attacks.  Social engineering attacks are so easy because it is so easy to appear legitimate.  If identify verification were scrutinized at both a human and electronic level, the legitimacy of identity would be much harder to prove.&lt;br /&gt;
&lt;br /&gt;
In addition, companies can install [http://ca.com/us/securityadvisor/documents/collateral.aspx?cid=157506 software] that will reduce the number of social engineering solicitations that employees receive through e-mail and Web sites.  By filtering out known threatening sources, this software can prevent the employee from even having to make the decision of whether the source is legitimate.&lt;br /&gt;
&lt;br /&gt;
==Legal and Ethical Concerns==&lt;br /&gt;
In the United States, there are laws against pretexting and falsifying identity.  The [http://en.wikipedia.org/wiki/Gramm-Leach-Bliley_Act Gramm-Leach-Billey Act (GLBA)] makes it illegal to do the following&lt;br /&gt;
&lt;br /&gt;
* To falsify information or make false statements to retrieve information from a financial institution or even a customer of that institution&lt;br /&gt;
&lt;br /&gt;
* To use forged or stolen documents to receive information from a financial institution or a customer of that institution&lt;br /&gt;
&lt;br /&gt;
* Ask another person to obtain information by using the above two means&lt;br /&gt;
&lt;br /&gt;
In addition, the [http://en.wikipedia.org/wiki/Federal_Trade_Commission_Act Federal Trade Commission Act] prohibits pretexting for customer information.&lt;br /&gt;
&lt;br /&gt;
==Study Guide==&lt;br /&gt;
This study guide relates to security precautions against Social Engineering.  For the main Security Precautions study guide, go [http://ethics.csc.ncsu.edu/risks/security/precautions/study.php here].&lt;br /&gt;
&lt;br /&gt;
'''1. Why Are Security Precautions Necessary to Safeguard Against Social Engineering?'''&lt;br /&gt;
&lt;br /&gt;
* In the United States, identity, both personal and financial, are held digitally.  Typical social engineering attacks aim at stealing the digital identities of people.  This can ruin their credit and ability to purchase things, as well as reputations when it comes to employment.  [http://www.ftc.gov/bcp/edu/microsites/idtheft/ Here] are some tips from the FTC on safeguarding your information.  You should never give out information unless you are certain of the source.  You should also limit the amount of information you allow organizations to have.  They are also prone to hacking and social engineering threats that could steal your identity.&lt;br /&gt;
&lt;br /&gt;
* If security precautions are not taken against social engineering, a skilled hacker could forge his way into nearly any system.  It is said that the famous social engineer [http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick] would be able to set off nuclear missiles from his phone using social-engineering tactics.  It is important that organizations and individuals be aware of the threat of social engineering.  Do not take everything at face value.&lt;br /&gt;
&lt;br /&gt;
* Social-engineering attacks are not just made through electronic means.  Social-engineering tricks play on the fallacy of a human and their associated emotions.  It is important for an individual to be aware of the threats and tactics of social engineering.  Social engineers typically target gullible members of a company to obtain small bits of information and work their way up, gaining more information.  If you are alert to these threads, you are better defender against both your identity, your employer, as well as your clients.&lt;br /&gt;
&lt;br /&gt;
* It is sometimes very hard to tell when you are being tricked by a fraudulent act.  Employees in control of sensitive information must go through rigorous training to sense when they are being tricked.&lt;br /&gt;
&lt;br /&gt;
'''2. Social Engineering Security Precautions Are Not Easy'''&lt;br /&gt;
&lt;br /&gt;
* Since social engineering does not necessarily require any special technical skill set, like hacking, it is open to many types of attackers who are adept at fooling an individual.  &lt;br /&gt;
&lt;br /&gt;
* It is hard to devise structured policies to defend against the leak of confidential information through the means of social engineering.  There is no single solution for solving the problem of social engineering.  It is up to the company to do the best job they can creating useful policies for the release of sensitive data.  Employees much also be aware of the various methods and tactics used by social engineers to obtain information.&lt;br /&gt;
&lt;br /&gt;
* Unlike hacking or stealing by force, social engineering is very elusive.  Almost always, when information is released, the victim has no idea they gave it to someone posing as a legitimate source.&lt;br /&gt;
&lt;br /&gt;
==Useful Resources==&lt;br /&gt;
&lt;br /&gt;
Definitions and Descriptions of Social Engineering:&lt;br /&gt;
&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/risks/security/precautions/ Security Precautions (Old Project Page)]&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Social_engineering_%28security%29 Social Engineering (Wikipedia)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.securityfocus.com/infocus/1527 Social Engineering Fundamentals]&lt;br /&gt;
&lt;br /&gt;
* [http://searchfinancialsecurity.techtarget.com/tip/0,289483,sid185_gci1294530,00.html Social Engineering Attacks]&lt;br /&gt;
&lt;br /&gt;
* [http://news.cnet.com/8301-1009_3-9995253-83.html Social Engineering: Hackers show how it is done]&lt;br /&gt;
&lt;br /&gt;
Defense and Tips against Social Engineering Attacks:&lt;br /&gt;
&lt;br /&gt;
* [http://www.sans.org/reading_room/whitepapers/engineering/511.php Proactive Defense to Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://www.morehouse.org/hin/blckcrwl/hack/soceng.txt Social Engineering FAQ]&lt;br /&gt;
&lt;br /&gt;
* [http://www.hackinthebox.org/modules.php?op=modload&amp;amp;name=News&amp;amp;file=article&amp;amp;sid=15170&amp;amp;mode=thread&amp;amp;order=0&amp;amp;thold=0 Social Engineering Defense 101]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cioupdate.com/trends/article.php/3638951 Best Defense Against Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://techrepublic.com.com/5208-6230-0.html?forumID=102&amp;amp;threadID=232696 Social Engineering Self-defense]&lt;br /&gt;
&lt;br /&gt;
* [http://www.infosecwriters.com/text_resources/pdf/Social_Engineering_CRhodes.pdf Safeguarding Against Social Engineering]&lt;/div&gt;</summary>
		<author><name>Cjsoques</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=16875</id>
		<title>Social Engineering</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=16875"/>
		<updated>2008-08-06T11:53:22Z</updated>

		<summary type="html">&lt;p&gt;Cjsoques: /* Study Guide */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Social engineering a method of fraud and hacking that utilizes the humanity and nature of people to retrieve information.  If one can fool a person into giving away information, then creating a program or hack to retrieve that information by force is not required.  Furthermore, it can be much simpler and efficient to get information from someone through social engineering than it would ever be to steal that information via a computer program or password cracker.  &lt;br /&gt;
&lt;br /&gt;
This form of forcing users to disclose information must be done through some human means.  The point of social engineering is to utilize the fallacies of human logic and biases to trick the target into revealing confidential information through various methods and tactics.&lt;br /&gt;
&lt;br /&gt;
Social engineering requires guardians of information to be very proactive.  For example, you can use an antivirus program that will passively scan your computer for viruses automatically. However, the human must be actively on the defense for social-engineering tricks and tactics that may be used against them.  Over the years, general guidelines for companies and employees have been developed to give the knowledge necessary to be vigilant and alert for social engineering fraud attempts.&lt;br /&gt;
&lt;br /&gt;
==Tactics and Methods==&lt;br /&gt;
There are various means of utilizing social engineering to obtain confidential and secret information such as passwords and private data.  All of these methods work through some medium in which the attacker has to actually converse with the victim in some way, whether directly or indirectly.  In all methods, feedback from the victim is required.  This feedback is usually the necessary information the attacker was looking for.&lt;br /&gt;
&lt;br /&gt;
Although social engineering tactics are heavily performed through electronic and computer media, there are many ways to do social engineering through the physical realm.  As long as there can be some form of communication between the attacker and the victim, any medium may be used.  Social engineering is so successful because it takes advantage of the fallacies of the human being.  Whether by means of flattery, impersonation, and greed; social engineering is considered to some an art form of psychology.&lt;br /&gt;
&lt;br /&gt;
Social Engineering can be extremely simple to perform, but have dire effects and consequences.  There are even [http://news.cnet.com/8301-1009_3-9995253-83.html guides and tips] on how hackers have used social engineering in extremely simple ways.  Social engineering is considered so dangerous that [http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick], a renowned hacker and early user of social enginering, was considered the most dangerous hacker.  The FBI thought that Mitnick could start a nuclear war by simply utilizing social engineering.  &lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
The main way of retrieving electronic information from victim voluntarily is through [http://en.wikipedia.org/wiki/Phishing phishing].  Phishing, like social engineering, can be performed over various electronic and physical mediums.  In a general term, phishing is pretending to be something legitimate, when you are not.  When you fool the victim into thinking you are the legitimate source that is being faked, they will reveal all the information that would normally be required to use that source.  This may include account numbers, usernames, passwords, or even Social Security numbers.&lt;br /&gt;
&lt;br /&gt;
A major medium of phishing is through e-mail.  The example of a bank and customer is extremely common.  The attacker will send the victim an e-mail notifying them of some required account information to be updated.  This e-mail will look exactly like the standard e-mail the victim may have received from the bank before.  The victim will be required to login and update their information as soon as possible.  However, the link will not be sent to the bank website, but to a separate server that was set up by the attacker to retrieve the information.  This website, like the e-mail, will look exactly like the actual bank website.  Once the person types their login information, the attacker then has all the information they needed from the victim.&lt;br /&gt;
&lt;br /&gt;
In unusual cases, phishing may also be performed over the phone by pretending to be a representative of some company that is requesting some kind of account information.  The attacker may even know some basic information about the victim to prove that (s)he is legitimate.  Usually, a victim will not question the caller's authority and will provide the necessary information.  The attacker can then use this information to take advantage of the victim by means of identity or property theft.&lt;br /&gt;
&lt;br /&gt;
===Pretexting===&lt;br /&gt;
[http://www.ftc.gov/bcp/conline/pubs/credit/pretext.shtm Pretexting] is a form of using information about the victim to obtain even more information or to use it against the victim.  Through pretexting the attacker uses the limited information gained to obtain more information.  Once enough information is gained.  The attacker may use credit pretending to be the victim, to make purchases acting as the victim, or to manipulate the records of the victim.&lt;br /&gt;
&lt;br /&gt;
The goal of pretexting is to prove to someone that you are legitimately the victim.  This may be done from proving that you know their name, address, phone number, and Social Security Number.  This could also be done by knowing the victim's username and password that was retrieved through phishing.&lt;br /&gt;
&lt;br /&gt;
===Trojan Horse===&lt;br /&gt;
A [http://www.tech-faq.com/trojan-horse-virus.shtml Trojan Horse] a technological form of social engineering.  Not only does it fool the victim that it is from a legitimate source, but it also fools the computer the victim is using.  A Trojan horse is a program that may seem to perform a legitimate action, but in fact is collecting sensitive information or stealing data in the background.  This is, of course, derived from the tactic used by the Spartans to invade Troy by presenting the Trojans with a gift horse containing Spartan soldiers (this is an ancient example of social engineering).&lt;br /&gt;
&lt;br /&gt;
To be specific, a ''gimme'' is a type of Trojan Horse that plays off of social engineering.  This tactic goes in conjunction with spamming or phishing.  The user will receive a pop-up ad or e-mail ad notifying the victim of some software that would benefit them.  Because of their curiosity and the seeming innocence of the program, the victim will install it on their machine.  The software may even perform as advertised, but in the background is obtaining account information and other confidential data.&lt;br /&gt;
&lt;br /&gt;
This is where a computer program pretends to be something it is not.  Instead of an actual human being performing the pretexting, it is done by an automated computer program.&lt;br /&gt;
&lt;br /&gt;
==Security, Precautions, and Defenses==&lt;br /&gt;
There are many precautions and defenses against social engineering.  However, users lack education on the methods to defend against this tactic.  Various methods include rigorous identity verification, minimizing the number of people with access to sensitive information, as well as reducing the trust level of those in control of information.  Many companies have developed security policies and guidelines that employees should follow to minimize the risk of social engineering exploits.&lt;br /&gt;
&lt;br /&gt;
===Proactive Social Defenses===&lt;br /&gt;
SANS Network Security has a [http://www.sans.org/reading_room/whitepapers/engineering/511.php brief guide] for employees to maintain a proactive awareness against social engineering.  Through proactive self-defense a company should develop a detailed policy on security and data release.  This policy should detail who is able to release information, what information, and to who that information may be released to. &lt;br /&gt;
&lt;br /&gt;
There should be detailed access approval to any secured area or information.  A company should set up a defense against social engineering by always having a detailed access approval process, instead of simply not challenging the requester of information. The company should have a designated help desk and support center that is knowledgeable in the policies of data release.  Information such as employee IDs, account information, and passwords should always be challenged with a detailed approval policy.&lt;br /&gt;
&lt;br /&gt;
By detailing who is allowed to release information and what information can be released, a company can minimize the amount of violations through social-engineering.  Usually social engineering succeeds because there is no preset guideline for giving out information for rare instances that social engineers exploit.&lt;br /&gt;
&lt;br /&gt;
===Employee Training===&lt;br /&gt;
Since the human being is the reason for social engineering exploits, the employee is the number-one defense against attacks.  By [http://techrepublic.com.com/5208-6230-0.html?forumID=102&amp;amp;threadID=232696 being trained on case studies], employees gain an understanding of how easy it is for social engineering to work.  Training to employees to reduce their trust value and not take request for information at face value will discourage attackers from requesting further information.  If in doubt, the employee should never give out confidential information, but take the request to the next person in command.&lt;br /&gt;
&lt;br /&gt;
===Security Software and Electronics===&lt;br /&gt;
Since the goal of social engineering exploits are to bypass technological and security barriers, there are few electronic and software means to stop social engineering.  One main way to combat and reduce the risk is to have in place strict identity verification technologies that combat counterfeit and impersonation attacks.  Social engineering attacks are so easy because it is so easy to appear legitimate.  If identify verification were scrutinized at both a human and electronic level, the legitimacy of identity would be much harder to prove.&lt;br /&gt;
&lt;br /&gt;
In addition, companies can install [http://ca.com/us/securityadvisor/documents/collateral.aspx?cid=157506 software] that will reduce the number of social engineering solicitations that employees receive through e-mail and Web sites.  By filtering out known threatening sources, this software can prevent the employee from even having to make the decision of whether the source is legitimate.&lt;br /&gt;
&lt;br /&gt;
==Legal and Ethical Concerns==&lt;br /&gt;
In the United States, there are laws against pretexting and falsifying identity.  The [http://en.wikipedia.org/wiki/Gramm-Leach-Bliley_Act Gramm-Leach-Billey Act (GLBA)] makes it illegal to do the following&lt;br /&gt;
&lt;br /&gt;
* To falsify information or make false statements to retrieve information from a financial institution or even a customer of that institution&lt;br /&gt;
&lt;br /&gt;
* To use forged or stolen documents to receive information from a financial institution or a customer of that institution&lt;br /&gt;
&lt;br /&gt;
* Ask another person to obtain information by using the above two means&lt;br /&gt;
&lt;br /&gt;
In addition, the [http://en.wikipedia.org/wiki/Federal_Trade_Commission_Act Federal Trade Commission Act] prohibits pretexting for customer information.&lt;br /&gt;
&lt;br /&gt;
==Study Guide==&lt;br /&gt;
This study guide relates to security precautions against Social Engineering.  For the main Security Precautions study guide, go [http://ethics.csc.ncsu.edu/risks/security/precautions/study.php here].&lt;br /&gt;
&lt;br /&gt;
'''1. Why Are Security Precautions Necessary to Safeguard Against Social Engineering?'''&lt;br /&gt;
&lt;br /&gt;
* In the United States, identity, both personal and financial, are held digitally.  Typical social engineering attacks aim at stealing the digital identities of people.  This can ruin their credit and ability to purchase things, as well as reputations when it comes to employment.  [http://www.ftc.gov/bcp/edu/microsites/idtheft/ Here] are some tips from the FTC on safeguarding your information.  You should never give out information unless you are certain of the source.  You should also limit the amount of information you allow organizations to have.  They are also prone to hacking and social engineering threats that could steal your identity.&lt;br /&gt;
&lt;br /&gt;
* If security precautions are not taken against social engineering, a skilled hacker could forge his way into nearly any system.  It is said that the famous social engineer [http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick] would be able to set off nuclear missiles from his phone using social-engineering tactics.  It is important that organizations and individuals be aware of the threat of social engineering.  Do not take everything at face value.&lt;br /&gt;
&lt;br /&gt;
* Social-engineering attacks are not just made through electronic means.  Social-engineering tricks play on the fallacy of a human and their associated emotions.  It is important for an individual to be aware of the threats and tactics of social engineering.  Social engineers typically target gullible members of a company to obtain small bits of information and work their way up, gaining more information.  If you are alert to these threads, you are better defender against both your identity, your employer, as well as your clients.&lt;br /&gt;
&lt;br /&gt;
* It is sometimes very hard to tell when you are being tricked by a fraudulent act.  Employees in control of sensitive information must go through rigorous training to sense when they are being tricked.&lt;br /&gt;
&lt;br /&gt;
'''2. Social Engineering Security Precautions Are Not Easy'''&lt;br /&gt;
&lt;br /&gt;
* Since social engineering does not necessarily require any special technical skill set, like hacking, it is open to many types of attackers who are adept at fooling an individual.  &lt;br /&gt;
&lt;br /&gt;
* It is hard to devise structured policies to defend against the leak of confidential information through the means of social engineering.  There is no single solution for solving the problem of social engineering.  It is up to the company to do the best job they can creating useful policies for the release of sensitive data.  Employees much also be aware of the various methods and tactics used by social engineers to obtain information.&lt;br /&gt;
&lt;br /&gt;
* Unlike hacking or stealing by force, social engineering is very elusive.  Almost always, when information is released, the victim has no idea they gave it to someone posing as a legitimate source.&lt;br /&gt;
&lt;br /&gt;
==Useful Resources==&lt;br /&gt;
&lt;br /&gt;
Definitions and Descriptions of Social Engineering:&lt;br /&gt;
&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/risks/security/precautions/ Security Precautions (Old Project Page)]&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Social_engineering_%28security%29 Social Engineering (Wikipedia)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.securityfocus.com/infocus/1527 Social Engineering Fundamentals]&lt;br /&gt;
&lt;br /&gt;
* [http://searchfinancialsecurity.techtarget.com/tip/0,289483,sid185_gci1294530,00.html Social Engineering Attacks]&lt;br /&gt;
&lt;br /&gt;
* [http://news.cnet.com/8301-1009_3-9995253-83.html Social Engineering: Hackers show how it is done]&lt;br /&gt;
&lt;br /&gt;
Defense and Tips against Social Engineering Attacks:&lt;br /&gt;
&lt;br /&gt;
* [http://www.sans.org/reading_room/whitepapers/engineering/511.php Proactive Defense to Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://www.morehouse.org/hin/blckcrwl/hack/soceng.txt Social Engineering FAQ]&lt;br /&gt;
&lt;br /&gt;
* [http://www.hackinthebox.org/modules.php?op=modload&amp;amp;name=News&amp;amp;file=article&amp;amp;sid=15170&amp;amp;mode=thread&amp;amp;order=0&amp;amp;thold=0 Social Engineering Defense 101]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cioupdate.com/trends/article.php/3638951 Best Defense Against Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://techrepublic.com.com/5208-6230-0.html?forumID=102&amp;amp;threadID=232696 Social Engineering Self-defense]&lt;br /&gt;
&lt;br /&gt;
* [http://www.infosecwriters.com/text_resources/pdf/Social_Engineering_CRhodes.pdf Safeguarding Against Social Engineering]&lt;/div&gt;</summary>
		<author><name>Cjsoques</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Topics&amp;diff=16874</id>
		<title>CSC 379 SUM2008:Topics</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Topics&amp;diff=16874"/>
		<updated>2008-08-06T11:52:44Z</updated>

		<summary type="html">&lt;p&gt;Cjsoques: /* Security Precautions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= New Topics =&lt;br /&gt;
&lt;br /&gt;
'''For these topics, you will be creating the study guide and bibliography sections, instead of providing an update an existing page.  Examine the [http://ethics.csc.ncsu.edu/ ethics.csc.ncsu.edu website] for examples.  Since your pages will be created and maintained in wiki-form, please design your pages with wiki markup (not HTML).  Formatting resources are provided on the [[CSC 379]] wiki homepage.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Smart Mobs==&lt;br /&gt;
'''social/smartmobs'''&lt;br /&gt;
&lt;br /&gt;
As cell phones, text messaging, GPS, and other technologies make mobilization of groups easier, people are continually finding new uses.  Both physical and virtual actions now frequently take place; protests, flooding email accounts and online polls, to impromptu gatherings.  Explore smart/flash mobs, and the ethical considerations they raise.  Include information on important instances of smart mobs and the future of smart mobs.&lt;br /&gt;
&lt;br /&gt;
==Social Dossiers==&lt;br /&gt;
'''social/dossiers'''&lt;br /&gt;
&lt;br /&gt;
In the old days, if someone wanted to assemble a dossier on you, they would hire a private investigator.  Now, depending on your Web presence, they may only need to Google you.  Bits and pieces of information about ourselves can be found everywhere online, and most are unaware of just how much information about them is available.  Anyone with sufficient time and/or software can assemble social dossiers from this information.  What you write on Facebook may affect your ability to get a job!  Examine the array of personal information available online, efforts to assemble and utilize this information, and ethical considerations raised by posting or using this information.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://ethics.csc.ncsu.edu/social/lifebits/new.html Helpful Links] --&amp;gt;&lt;br /&gt;
[http://pg-server.csc.ncsu.edu/mediawiki/index.php/Social_dossiers New Study Guide]&lt;br /&gt;
&lt;br /&gt;
==Phishing==&lt;br /&gt;
'''abuse/spam/phishing'''&lt;br /&gt;
&lt;br /&gt;
Phishing efforts are growing in variety and sophistication.  They pose many privacy and security risks.  Examine the practice of phishing, its forms, and the ethical considerations raised.&lt;br /&gt;
&lt;br /&gt;
[http://ethics.csc.ncsu.edu/abuse/spam/phishing/new.html Helpful Links]&lt;br /&gt;
&lt;br /&gt;
==Encryption==&lt;br /&gt;
'''privacy/encryption'''&lt;br /&gt;
&lt;br /&gt;
Provide a general overview of the ethical considerations of using encryption.  Within your coverage, explore specifically if governments should be allowed to impose restrictions on the types of encryption that can be used as well as where and how encryption may be used.&lt;br /&gt;
&lt;br /&gt;
[http://pg-server.csc.ncsu.edu/mediawiki/index.php/Encryption Wiki Article]&lt;br /&gt;
&lt;br /&gt;
[http://ethics.csc.ncsu.edu/privacy/encryption/new.html Helpful Links]&lt;br /&gt;
&lt;br /&gt;
==Voting Receipts==&lt;br /&gt;
'''risks/reliability/voting/receipts'''&lt;br /&gt;
&lt;br /&gt;
Touchscreen voting was widely touted as a solution to vote-counting fiascoes like the famous Florida election debacle of 2000.  But it wasn't long before computer experts started to raise the alarm: With electronic touchscreen voting, there is absolutely no record of how a voter voted, except for the tallies spit out by the machine at the end of the day.  If a software bug or hardware malfunction resulted in a miscount, no one would ever know.  Many computer scientists demanded that paper receipts be printed and shown to the voter for verification, then retained by the machine in case a recount was needed.  So the vendors of touchscreen voting systems reluctantly added printers.  But the printers have not been reliable, and now scientists are searching for another way of creating unforgeable receipts.  Explore the competing ethical requireents that must be met by these receipts: voter privacy, accurate tallies, and resistance to hacking.  &lt;br /&gt;
***Do not cover aspects of electronic voting other than receipts; the issue of hacking vote-counting software and Internet voting have their own pages, for example.  Cover only articles that are in some way related to the need for receipts, or the type of backup used.&lt;br /&gt;
&lt;br /&gt;
[http://ethics.csc.ncsu.edu/risks/reliability/voting/receipts/new.html Helpful Links]&lt;br /&gt;
&lt;br /&gt;
= Existing Topics =&lt;br /&gt;
&lt;br /&gt;
'''For these topics you will be performing an update on an existing topic.  Pages for the study guide and bibliography sections are included on the [http://ethics.csc.ncsu.edu ethics.csc.ncsu.edu website], which you will be transitioning to their new wiki-form.  Since your pages will be created and maintained in wiki-form, please design your pages with wiki markup (not HTML). Formatting resources are provided on the [[CSC 379]] wiki homepage.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Cyberwarfare==&lt;br /&gt;
'''risks/security/cyberwar'''&lt;br /&gt;
&lt;br /&gt;
Cyberwarfare has long been a topic of theoretical interest and growing practical importance, as nations' infrastructures grow increasingly computerized.  Now, with the recent attack on Estonia, the cyberwar era may have begun in earnest.  Provide a general overview of the ethical considerations related to cyberwarfare.  Examine new methods of cyberwarfare, and include recent examples.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/cyberwar Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/cyberwar/study.php Current Study Guide]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/cyberwar/new.html Helpful Links]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Wiki Page]]&lt;br /&gt;
&lt;br /&gt;
==Intellectual Property Law==&lt;br /&gt;
'''intellectual/law'''&lt;br /&gt;
&lt;br /&gt;
Intellectual-property law is a topic that is basic to this course.  Although not much is new, it is still worthwhile to update the sources.  Ensure that trade secrets are included in your coverage.  ''Alternative intellectual property models (GPL, Creative Commons, etc.) are '''not''' part of this topic.  Nor are implications of IP law related to electronic communication (e.g., whether it is legal to copy a Web page and send it to a mailing list).''  The only material that should be covered here is material on what the law states, and relevant court decisions. &lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/intellectual/law Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/intellectual/law/study.php Current Study Guide]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/intellectual/law/new.html Helpful Links]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Cyberlicenses / Shrinkwrap Licenses==&lt;br /&gt;
'''intellectual/licensing/cyberlicenses''' and '''intellectual/licensing/shrinkwrap'''&lt;br /&gt;
&lt;br /&gt;
In the past, we have had pages on the Ethics Web site related to shrinkwrap licenses (that are contained within the cardboard box that software comes in) and cyberlicenses (licenses you agree to over the Web before being allowed to download or install software).  The issues never were that different, and as digital downloads come to dominate the market, it makes less sense than ever to maintain two separate pages.  Provide a general overview of the ethical considerations related to shrinkwrap and cyberlicenses, such as whether a buyer can realistically give informed consent to a document that is long, hard to read, and may contain provision whose meaning is not clear at first glance.  Expand on licensing related to ownership of content created through web services, such as Facebook and MySpace.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/intellectual/licensing/cyberlicenses Current Main Page (1)]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/intellectual/licensing/cyberlicenses/study.php Current Study Guide (1)]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/intellectual/licensing/cyberlicenses/new.html Helpful Links (1)]&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/intellectual/licensing/cyberlicenses Current Main Page (2)]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/intellectual/licensing/shrinkwrap/study.php Current Study Guide (2)]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/intellectual/licensing/shrinkwrap/new.html Helpful Links (2)]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Computer Modeling==&lt;br /&gt;
'''risks/models'''&lt;br /&gt;
&lt;br /&gt;
The implications of computer models are often controversial, but the GIGO adage always applies: a model can be no better than its inputs.  An inaccurate model has a high potential for conveying a misleading and dishonest view of reality.  However, people who are less computer literate may not understand this, and may accord credence to anything that comes out of a computer.  Thus, modelers must take pains not to make expansive claims about their results.  Provide a general overview of the ethical considerations, both from a science/engineering, and social/economic perspective.  Cover both sides of the current controversy over models of global warming.  On a social/economic plane, include ethical considerations related to developments in computer modeling in virtual communities, such as Second Life.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/models Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/models/study.php Current Study Guide]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/models/new.html Helpful Links]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Depersonalization==&lt;br /&gt;
'''social/technoharm'''&lt;br /&gt;
&lt;br /&gt;
While Generation Y tends to be most comfortable when always connected, a lot of other people believe that computers are drawing us away from meaningful personal contact.  In the past decade, this view was much more widespread in Europe than in America.  Provide an overview of controversy over depersonalization, and the ethical considerations related to becoming more conversant with technology than with other people.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/social/technoharm Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/social/technoharm/study.php Current Study Guide]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/social/technoharm/new.html Helpful Links]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Privacy of Medical Information==&lt;br /&gt;
'''privacy/medical'''&lt;br /&gt;
&lt;br /&gt;
Privacy of medical records has long been a high-profile issue.  Inevitably, medical records are becoming more computerized. Emerging patient-centric services such as [https://www.google.com/health Google Health] are accelerating this trend.  Provide a general overview of the ethical considerations related to privacy of digital medical information.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/privacy/medical Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/privacy/medical/study.php Current Study Guide]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/privacy/medical/new.html Helpful Links]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Electronic Voting==&lt;br /&gt;
'''risks/reliability/voting/electronic'''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Electronic voting&amp;quot; means the use of machines that register votes and record them in electronic memory.  While once touted as the solution to fiascoes like the one in Florida in the 2000 presidential election, they quickly became controversial because of the large number of &amp;quot;undervotes&amp;quot; they recorded--where voters voted for no candidate in a particular race.  Concerns were raised that some voters were simply not familiar enough with technology to use e-voting machines correctly. A number of election anomalies tended to lend credence to this claim.  Then, there is also the problem that there is no way to effectively test the software.  Unlike financial transactions, there is no record kept of how a particular vote counted.  So if the vote is not counted, who will know?&lt;br /&gt;
&lt;br /&gt;
This page is due an update, but please be sure to steer clear of such related topics as (1) the [http://ethics.csc.ncsu.edu/risks/reliability/voting reliability of vote-counting software], (2) [http://ethics.csc.ncsu.edu/risks/reliability/voting/internet Internet voting], and (3) what kind of receipts, if any, should be produced by machines so that voters can verify that their vote was recorded.  These topics all have their own pages on the [http://ethics.csc.ncsu.edu Ethics Web site].  You do not have to find articles that avoid all mention of these topics, but do not pick any articles that are ''mainly'' about any of these three.  Rather, focus on articles that talk about electronic or touch-screen machines, as compared to other methods of voting.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/reliability/voting/electronic Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/reliability/voting/electronic/study.php Current Study Guide]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/reliability/voting/electronic/new.html Helpful Links]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Instant Messaging==&lt;br /&gt;
'''commerce/anticompetitive/instant'''&lt;br /&gt;
&lt;br /&gt;
Most of the references on this page are three or four years old. The issue is whether a small number of companies should unfairly dominate the market for instant messaging. Update the existing page with new references, and the study guide with new issues.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/instant/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/instant/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Security Precautions==&lt;br /&gt;
'''risks/security/precautions'''&lt;br /&gt;
&lt;br /&gt;
If you are in charge of network security, you have a duty to keep your network secure.  What security precautions do Web and network administrators need to take to guard against hacker attacks, such as distributed denial-of-service attacks? What precautions are needed against other forms of hacking? Against cyberwarfare and terrorist threats? Update topic page and study guide to cover current/future precautions related to recent occurrences.  ''Be sure to focus on articles that talk about precautions that administrators need to take,'' not article that focus on threats to networks, only mentioning precautions as an afterthought.&lt;br /&gt;
&lt;br /&gt;
'''Social Engineering''' should be included as a major section within this topic.  If you would like to make a new page focused on social engineering, you may if you choose this topic.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/precautions Old Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/precautions/study.php Old Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
* [http://pg-server.csc.ncsu.edu/mediawiki/index.php/Social_Engineering Social Engineering Wiki Article]&lt;/div&gt;</summary>
		<author><name>Cjsoques</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=16873</id>
		<title>Social Engineering</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=16873"/>
		<updated>2008-08-06T11:51:13Z</updated>

		<summary type="html">&lt;p&gt;Cjsoques: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Social engineering a method of fraud and hacking that utilizes the humanity and nature of people to retrieve information.  If one can fool a person into giving away information, then creating a program or hack to retrieve that information by force is not required.  Furthermore, it can be much simpler and efficient to get information from someone through social engineering than it would ever be to steal that information via a computer program or password cracker.  &lt;br /&gt;
&lt;br /&gt;
This form of forcing users to disclose information must be done through some human means.  The point of social engineering is to utilize the fallacies of human logic and biases to trick the target into revealing confidential information through various methods and tactics.&lt;br /&gt;
&lt;br /&gt;
Social engineering requires guardians of information to be very proactive.  For example, you can use an antivirus program that will passively scan your computer for viruses automatically. However, the human must be actively on the defense for social-engineering tricks and tactics that may be used against them.  Over the years, general guidelines for companies and employees have been developed to give the knowledge necessary to be vigilant and alert for social engineering fraud attempts.&lt;br /&gt;
&lt;br /&gt;
==Tactics and Methods==&lt;br /&gt;
There are various means of utilizing social engineering to obtain confidential and secret information such as passwords and private data.  All of these methods work through some medium in which the attacker has to actually converse with the victim in some way, whether directly or indirectly.  In all methods, feedback from the victim is required.  This feedback is usually the necessary information the attacker was looking for.&lt;br /&gt;
&lt;br /&gt;
Although social engineering tactics are heavily performed through electronic and computer media, there are many ways to do social engineering through the physical realm.  As long as there can be some form of communication between the attacker and the victim, any medium may be used.  Social engineering is so successful because it takes advantage of the fallacies of the human being.  Whether by means of flattery, impersonation, and greed; social engineering is considered to some an art form of psychology.&lt;br /&gt;
&lt;br /&gt;
Social Engineering can be extremely simple to perform, but have dire effects and consequences.  There are even [http://news.cnet.com/8301-1009_3-9995253-83.html guides and tips] on how hackers have used social engineering in extremely simple ways.  Social engineering is considered so dangerous that [http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick], a renowned hacker and early user of social enginering, was considered the most dangerous hacker.  The FBI thought that Mitnick could start a nuclear war by simply utilizing social engineering.  &lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
The main way of retrieving electronic information from victim voluntarily is through [http://en.wikipedia.org/wiki/Phishing phishing].  Phishing, like social engineering, can be performed over various electronic and physical mediums.  In a general term, phishing is pretending to be something legitimate, when you are not.  When you fool the victim into thinking you are the legitimate source that is being faked, they will reveal all the information that would normally be required to use that source.  This may include account numbers, usernames, passwords, or even Social Security numbers.&lt;br /&gt;
&lt;br /&gt;
A major medium of phishing is through e-mail.  The example of a bank and customer is extremely common.  The attacker will send the victim an e-mail notifying them of some required account information to be updated.  This e-mail will look exactly like the standard e-mail the victim may have received from the bank before.  The victim will be required to login and update their information as soon as possible.  However, the link will not be sent to the bank website, but to a separate server that was set up by the attacker to retrieve the information.  This website, like the e-mail, will look exactly like the actual bank website.  Once the person types their login information, the attacker then has all the information they needed from the victim.&lt;br /&gt;
&lt;br /&gt;
In unusual cases, phishing may also be performed over the phone by pretending to be a representative of some company that is requesting some kind of account information.  The attacker may even know some basic information about the victim to prove that (s)he is legitimate.  Usually, a victim will not question the caller's authority and will provide the necessary information.  The attacker can then use this information to take advantage of the victim by means of identity or property theft.&lt;br /&gt;
&lt;br /&gt;
===Pretexting===&lt;br /&gt;
[http://www.ftc.gov/bcp/conline/pubs/credit/pretext.shtm Pretexting] is a form of using information about the victim to obtain even more information or to use it against the victim.  Through pretexting the attacker uses the limited information gained to obtain more information.  Once enough information is gained.  The attacker may use credit pretending to be the victim, to make purchases acting as the victim, or to manipulate the records of the victim.&lt;br /&gt;
&lt;br /&gt;
The goal of pretexting is to prove to someone that you are legitimately the victim.  This may be done from proving that you know their name, address, phone number, and Social Security Number.  This could also be done by knowing the victim's username and password that was retrieved through phishing.&lt;br /&gt;
&lt;br /&gt;
===Trojan Horse===&lt;br /&gt;
A [http://www.tech-faq.com/trojan-horse-virus.shtml Trojan Horse] a technological form of social engineering.  Not only does it fool the victim that it is from a legitimate source, but it also fools the computer the victim is using.  A Trojan horse is a program that may seem to perform a legitimate action, but in fact is collecting sensitive information or stealing data in the background.  This is, of course, derived from the tactic used by the Spartans to invade Troy by presenting the Trojans with a gift horse containing Spartan soldiers (this is an ancient example of social engineering).&lt;br /&gt;
&lt;br /&gt;
To be specific, a ''gimme'' is a type of Trojan Horse that plays off of social engineering.  This tactic goes in conjunction with spamming or phishing.  The user will receive a pop-up ad or e-mail ad notifying the victim of some software that would benefit them.  Because of their curiosity and the seeming innocence of the program, the victim will install it on their machine.  The software may even perform as advertised, but in the background is obtaining account information and other confidential data.&lt;br /&gt;
&lt;br /&gt;
This is where a computer program pretends to be something it is not.  Instead of an actual human being performing the pretexting, it is done by an automated computer program.&lt;br /&gt;
&lt;br /&gt;
==Security, Precautions, and Defenses==&lt;br /&gt;
There are many precautions and defenses against social engineering.  However, users lack education on the methods to defend against this tactic.  Various methods include rigorous identity verification, minimizing the number of people with access to sensitive information, as well as reducing the trust level of those in control of information.  Many companies have developed security policies and guidelines that employees should follow to minimize the risk of social engineering exploits.&lt;br /&gt;
&lt;br /&gt;
===Proactive Social Defenses===&lt;br /&gt;
SANS Network Security has a [http://www.sans.org/reading_room/whitepapers/engineering/511.php brief guide] for employees to maintain a proactive awareness against social engineering.  Through proactive self-defense a company should develop a detailed policy on security and data release.  This policy should detail who is able to release information, what information, and to who that information may be released to. &lt;br /&gt;
&lt;br /&gt;
There should be detailed access approval to any secured area or information.  A company should set up a defense against social engineering by always having a detailed access approval process, instead of simply not challenging the requester of information. The company should have a designated help desk and support center that is knowledgeable in the policies of data release.  Information such as employee IDs, account information, and passwords should always be challenged with a detailed approval policy.&lt;br /&gt;
&lt;br /&gt;
By detailing who is allowed to release information and what information can be released, a company can minimize the amount of violations through social-engineering.  Usually social engineering succeeds because there is no preset guideline for giving out information for rare instances that social engineers exploit.&lt;br /&gt;
&lt;br /&gt;
===Employee Training===&lt;br /&gt;
Since the human being is the reason for social engineering exploits, the employee is the number-one defense against attacks.  By [http://techrepublic.com.com/5208-6230-0.html?forumID=102&amp;amp;threadID=232696 being trained on case studies], employees gain an understanding of how easy it is for social engineering to work.  Training to employees to reduce their trust value and not take request for information at face value will discourage attackers from requesting further information.  If in doubt, the employee should never give out confidential information, but take the request to the next person in command.&lt;br /&gt;
&lt;br /&gt;
===Security Software and Electronics===&lt;br /&gt;
Since the goal of social engineering exploits are to bypass technological and security barriers, there are few electronic and software means to stop social engineering.  One main way to combat and reduce the risk is to have in place strict identity verification technologies that combat counterfeit and impersonation attacks.  Social engineering attacks are so easy because it is so easy to appear legitimate.  If identify verification were scrutinized at both a human and electronic level, the legitimacy of identity would be much harder to prove.&lt;br /&gt;
&lt;br /&gt;
In addition, companies can install [http://ca.com/us/securityadvisor/documents/collateral.aspx?cid=157506 software] that will reduce the number of social engineering solicitations that employees receive through e-mail and Web sites.  By filtering out known threatening sources, this software can prevent the employee from even having to make the decision of whether the source is legitimate.&lt;br /&gt;
&lt;br /&gt;
==Legal and Ethical Concerns==&lt;br /&gt;
In the United States, there are laws against pretexting and falsifying identity.  The [http://en.wikipedia.org/wiki/Gramm-Leach-Bliley_Act Gramm-Leach-Billey Act (GLBA)] makes it illegal to do the following&lt;br /&gt;
&lt;br /&gt;
* To falsify information or make false statements to retrieve information from a financial institution or even a customer of that institution&lt;br /&gt;
&lt;br /&gt;
* To use forged or stolen documents to receive information from a financial institution or a customer of that institution&lt;br /&gt;
&lt;br /&gt;
* Ask another person to obtain information by using the above two means&lt;br /&gt;
&lt;br /&gt;
In addition, the [http://en.wikipedia.org/wiki/Federal_Trade_Commission_Act Federal Trade Commission Act] prohibits pretexting for customer information.&lt;br /&gt;
&lt;br /&gt;
==Study Guide==&lt;br /&gt;
This study guide relates to security precautions against Social Engineering.  For the main Security Precautions study guide, go [http://ethics.csc.ncsu.edu/risks/security/precautions/study.php here].&lt;br /&gt;
&lt;br /&gt;
'''1. Why Are Security Precautions Necessary to Safeguard Against Social Engineering?'''&lt;br /&gt;
&lt;br /&gt;
* In the United States, identity, both personal and financial, are held digitally.  Typical social engineering attacks aim at stealing the digital identities of people.  This can ruin their credit and ability to purchase things, as well as reputations when it comes to employment.  [http://www.ftc.gov/bcp/edu/microsites/idtheft/ Here] are some tips from the FTC on safeguarding your information.  You should never give out information unless you are certain of the source.  You should also limit the amount of information you allow organizations to have.  They are also prone to hacking and social engineering threats that could steal your identity.&lt;br /&gt;
&lt;br /&gt;
* If security precautions are not taken against social engineering, a skilled hacker could forge his way into nearly any system.  It is said that the famous social engineer [http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick] would be able to set off nuclear missiles from his phone using social-engineering tactics.  It is important that organizations and individuals be aware of the threat of social engineering.  Do not take everything at face value.&lt;br /&gt;
&lt;br /&gt;
* Social-engineering attacks are not just made through electronic means.  Social-engineering tricks play on the fallacy of a human and their associated emotions.  It is important for an individual to be aware of the threats and tactics of social engineering.  Social engineers typically target gullible members of a company to obtain small bits of information and work their way up, gaining more information.  If you are alert to these threads, you are better defender against both your identity, your employer, as well as your clients.&lt;br /&gt;
&lt;br /&gt;
* It is sometimes very hard to tell when you are being tricked by a fraudulent act.  Employees in control of sensitive information must go through rigorous training to sense when they are being tricked.&lt;br /&gt;
&lt;br /&gt;
'''2. Social Engineering Security Precautions Are Not Easy'''&lt;br /&gt;
&lt;br /&gt;
* Since social engineering does not necessarily require any special technical skill set, like hacking, it is open to many types of attackers who are adept at fooling an individual.  &lt;br /&gt;
&lt;br /&gt;
* It is hard to devise structured policies to defend against the leak of confidential information through the means of social engineering.  There is no single solution for solving the problem of social engineering.  It is up to the company to do the best job they can creating useful policies for the release of sensitive data.  Employees much also be aware of the various methods and tactics used by social engineers to obtain information.&lt;br /&gt;
&lt;br /&gt;
* Unlike hacking or stealing by force, social engineering is very elusive.  Almost always, when information is released, the victim has no idea they gave it to someone posing as a legitimate source.  &lt;br /&gt;
&lt;br /&gt;
3. Ethical Responsibilities&lt;br /&gt;
&lt;br /&gt;
4. Some Security Products That Could Help You&lt;br /&gt;
&lt;br /&gt;
==Useful Resources==&lt;br /&gt;
&lt;br /&gt;
Definitions and Descriptions of Social Engineering:&lt;br /&gt;
&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/risks/security/precautions/ Security Precautions (Old Project Page)]&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Social_engineering_%28security%29 Social Engineering (Wikipedia)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.securityfocus.com/infocus/1527 Social Engineering Fundamentals]&lt;br /&gt;
&lt;br /&gt;
* [http://searchfinancialsecurity.techtarget.com/tip/0,289483,sid185_gci1294530,00.html Social Engineering Attacks]&lt;br /&gt;
&lt;br /&gt;
* [http://news.cnet.com/8301-1009_3-9995253-83.html Social Engineering: Hackers show how it is done]&lt;br /&gt;
&lt;br /&gt;
Defense and Tips against Social Engineering Attacks:&lt;br /&gt;
&lt;br /&gt;
* [http://www.sans.org/reading_room/whitepapers/engineering/511.php Proactive Defense to Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://www.morehouse.org/hin/blckcrwl/hack/soceng.txt Social Engineering FAQ]&lt;br /&gt;
&lt;br /&gt;
* [http://www.hackinthebox.org/modules.php?op=modload&amp;amp;name=News&amp;amp;file=article&amp;amp;sid=15170&amp;amp;mode=thread&amp;amp;order=0&amp;amp;thold=0 Social Engineering Defense 101]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cioupdate.com/trends/article.php/3638951 Best Defense Against Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://techrepublic.com.com/5208-6230-0.html?forumID=102&amp;amp;threadID=232696 Social Engineering Self-defense]&lt;br /&gt;
&lt;br /&gt;
* [http://www.infosecwriters.com/text_resources/pdf/Social_Engineering_CRhodes.pdf Safeguarding Against Social Engineering]&lt;/div&gt;</summary>
		<author><name>Cjsoques</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=16872</id>
		<title>Social Engineering</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=16872"/>
		<updated>2008-08-06T11:49:27Z</updated>

		<summary type="html">&lt;p&gt;Cjsoques: /* Legal and Ethical Concerns */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Social engineering a method of fraud and hacking that utilizes the humanity and nature of people to retrieve information from them voluntarily.  By playing into the nature of the person, hacking through technological means is sometimes not necessary.  If one can fool a person into giving away information voluntarily, then creating a program or hack to retrieve that information involuntarily is not required.  Furthermore, it can be much simpler and efficient to get information from someone through social engineering than it would ever be to steal that information via a computer program or password cracker.  &lt;br /&gt;
&lt;br /&gt;
This form of forcing users to disclose information must be done through some human means.  The point of social engineering is to utilize the fallacies of human logic and biases to trick the target into revealing confidential information through various methods and tactics.&lt;br /&gt;
&lt;br /&gt;
Social engineering requires guardians of information to be very proactive.  For example, you can use an antivirus program that will passively scan your computer for viruses automatically. However, the human must be actively on the defense for social-engineering tricks and tactics that may be used against them.  Over the years, general guidelines for companies and employees have been developed to give the knowledge necessary to be vigilant and alert for social engineering fraud attempts.&lt;br /&gt;
&lt;br /&gt;
==Tactics and Methods==&lt;br /&gt;
There are various means of utilizing social engineering to obtain confidential and secret information such as passwords and private data.  All of these methods work through some medium in which the attacker has to actually converse with the victim in some way, whether directly or indirectly.  In all methods, feedback from the victim is required.  This feedback is usually the necessary information the attacker was looking for.&lt;br /&gt;
&lt;br /&gt;
Although social engineering tactics are heavily performed through electronic and computer media, there are many ways to do social engineering through the physical realm.  As long as there can be some form of communication between the attacker and the victim, any medium may be used.  Social engineering is so successful because it takes advantage of the fallacies of the human being.  Whether by means of flattery, impersonation, and greed; social engineering is considered to some an art form of psychology.&lt;br /&gt;
&lt;br /&gt;
Social Engineering can be extremely simple to perform, but have dire effects and consequences.  There are even [http://news.cnet.com/8301-1009_3-9995253-83.html guides and tips] on how hackers have used social engineering in extremely simple ways.  Social engineering is considered so dangerous that [http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick], a renowned hacker and early user of social enginering, was considered the most dangerous hacker.  The FBI thought that Mitnick could start a nuclear war by simply utilizing social engineering.  &lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
The main way of retrieving electronic information from victim voluntarily is through [http://en.wikipedia.org/wiki/Phishing phishing].  Phishing, like social engineering, can be performed over various electronic and physical mediums.  In a general term, phishing is pretending to be something legitimate, when you are not.  When you fool the victim into thinking you are the legitimate source that is being faked, they will reveal all the information that would normally be required to use that source.  This may include account numbers, usernames, passwords, or even Social Security numbers.&lt;br /&gt;
&lt;br /&gt;
A major medium of phishing is through e-mail.  The example of a bank and customer is extremely common.  The attacker will send the victim an e-mail notifying them of some required account information to be updated.  This e-mail will look exactly like the standard e-mail the victim may have received from the bank before.  The victim will be required to login and update their information as soon as possible.  However, the link will not be sent to the bank website, but to a separate server that was set up by the attacker to retrieve the information.  This website, like the e-mail, will look exactly like the actual bank website.  Once the person types their login information, the attacker then has all the information they needed from the victim.&lt;br /&gt;
&lt;br /&gt;
In unusual cases, phishing may also be performed over the phone by pretending to be a representative of some company that is requesting some kind of account information.  The attacker may even know some basic information about the victim to prove that (s)he is legitimate.  Usually, a victim will not question the caller's authority and will provide the necessary information.  The attacker can then use this information to take advantage of the victim by means of identity or property theft.&lt;br /&gt;
&lt;br /&gt;
===Pretexting===&lt;br /&gt;
[http://www.ftc.gov/bcp/conline/pubs/credit/pretext.shtm Pretexting] is a form of using information about the victim to obtain even more information or to use it against the victim.  Through pretexting the attacker uses the limited information gained to obtain more information.  Once enough information is gained.  The attacker may use credit pretending to be the victim, to make purchases acting as the victim, or to manipulate the records of the victim.&lt;br /&gt;
&lt;br /&gt;
The goal of pretexting is to prove to someone that you are legitimately the victim.  This may be done from proving that you know their name, address, phone number, and Social Security Number.  This could also be done by knowing the victim's username and password that was retrieved through phishing.&lt;br /&gt;
&lt;br /&gt;
===Trojan Horse===&lt;br /&gt;
A [http://www.tech-faq.com/trojan-horse-virus.shtml Trojan Horse] a technological form of social engineering.  Not only does it fool the victim that it is from a legitimate source, but it also fools the computer the victim is using.  A Trojan horse is a program that may seem to perform a legitimate action, but in fact is collecting sensitive information or stealing data in the background.  This is, of course, derived from the tactic used by the Spartans to invade Troy by presenting the Trojans with a gift horse containing Spartan soldiers (this is an ancient example of social engineering).&lt;br /&gt;
&lt;br /&gt;
To be specific, a ''gimme'' is a type of Trojan Horse that plays off of social engineering.  This tactic goes in conjunction with spamming or phishing.  The user will receive a pop-up ad or e-mail ad notifying the victim of some software that would benefit them.  Because of their curiosity and the seeming innocence of the program, the victim will install it on their machine.  The software may even perform as advertised, but in the background is obtaining account information and other confidential data.&lt;br /&gt;
&lt;br /&gt;
This is where a computer program pretends to be something it is not.  Instead of an actual human being performing the pretexting, it is done by an automated computer program.&lt;br /&gt;
&lt;br /&gt;
==Security, Precautions, and Defenses==&lt;br /&gt;
There are many precautions and defenses against social engineering.  However, users lack education on the methods to defend against this tactic.  Various methods include rigorous identity verification, minimizing the number of people with access to sensitive information, as well as reducing the trust level of those in control of information.  Many companies have developed security policies and guidelines that employees should follow to minimize the risk of social engineering exploits.&lt;br /&gt;
&lt;br /&gt;
===Proactive Social Defenses===&lt;br /&gt;
SANS Network Security has a [http://www.sans.org/reading_room/whitepapers/engineering/511.php brief guide] for employees to maintain a proactive awareness against social engineering.  Through proactive self-defense a company should develop a detailed policy on security and data release.  This policy should detail who is able to release information, what information, and to who that information may be released to. &lt;br /&gt;
&lt;br /&gt;
There should be detailed access approval to any secured area or information.  A company should set up a defense against social engineering by always having a detailed access approval process, instead of simply not challenging the requester of information. The company should have a designated help desk and support center that is knowledgeable in the policies of data release.  Information such as employee IDs, account information, and passwords should always be challenged with a detailed approval policy.&lt;br /&gt;
&lt;br /&gt;
By detailing who is allowed to release information and what information can be released, a company can minimize the amount of violations through social-engineering.  Usually social engineering succeeds because there is no preset guideline for giving out information for rare instances that social engineers exploit.&lt;br /&gt;
&lt;br /&gt;
===Employee Training===&lt;br /&gt;
Since the human being is the reason for social engineering exploits, the employee is the number-one defense against attacks.  By [http://techrepublic.com.com/5208-6230-0.html?forumID=102&amp;amp;threadID=232696 being trained on case studies], employees gain an understanding of how easy it is for social engineering to work.  Training to employees to reduce their trust value and not take request for information at face value will discourage attackers from requesting further information.  If in doubt, the employee should never give out confidential information, but take the request to the next person in command.&lt;br /&gt;
&lt;br /&gt;
===Security Software and Electronics===&lt;br /&gt;
Since the goal of social engineering exploits are to bypass technological and security barriers, there are few electronic and software means to stop social engineering.  One main way to combat and reduce the risk is to have in place strict identity verification technologies that combat counterfeit and impersonation attacks.  Social engineering attacks are so easy because it is so easy to appear legitimate.  If identify verification were scrutinized at both a human and electronic level, the legitimacy of identity would be much harder to prove.&lt;br /&gt;
&lt;br /&gt;
In addition, companies can install [http://ca.com/us/securityadvisor/documents/collateral.aspx?cid=157506 software] that will reduce the number of social engineering solicitations that employees receive through e-mail and Web sites.  By filtering out known threatening sources, this software can prevent the employee from even having to make the decision of whether the source is legitimate.&lt;br /&gt;
&lt;br /&gt;
==Legal and Ethical Concerns==&lt;br /&gt;
In the United States, there are laws against pretexting and falsifying identity.  The [http://en.wikipedia.org/wiki/Gramm-Leach-Bliley_Act Gramm-Leach-Billey Act (GLBA)] makes it illegal to do the following&lt;br /&gt;
&lt;br /&gt;
* To falsify information or make false statements to retrieve information from a financial institution or even a customer of that institution&lt;br /&gt;
&lt;br /&gt;
* To use forged or stolen documents to receive information from a financial institution or a customer of that institution&lt;br /&gt;
&lt;br /&gt;
* Ask another person to obtain information by using the above two means&lt;br /&gt;
&lt;br /&gt;
In addition, the [http://en.wikipedia.org/wiki/Federal_Trade_Commission_Act Federal Trade Commission Act] prohibits pretexting for customer information.&lt;br /&gt;
&lt;br /&gt;
==Study Guide==&lt;br /&gt;
This study guide relates to security precautions against Social Engineering.  For the main Security Precautions study guide, go [http://ethics.csc.ncsu.edu/risks/security/precautions/study.php here].&lt;br /&gt;
&lt;br /&gt;
'''1. Why Are Security Precautions Necessary to Safeguard Against Social Engineering?'''&lt;br /&gt;
&lt;br /&gt;
* In the United States, identity, both personal and financial, are held digitally.  Typical social engineering attacks aim at stealing the digital identities of people.  This can ruin their credit and ability to purchase things, as well as reputations when it comes to employment.  [http://www.ftc.gov/bcp/edu/microsites/idtheft/ Here] are some tips from the FTC on safeguarding your information.  You should never give out information unless you are certain of the source.  You should also limit the amount of information you allow organizations to have.  They are also prone to hacking and social engineering threats that could steal your identity.&lt;br /&gt;
&lt;br /&gt;
* If security precautions are not taken against social engineering, a skilled hacker could forge his way into nearly any system.  It is said that the famous social engineer [http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick] would be able to set off nuclear missiles from his phone using social-engineering tactics.  It is important that organizations and individuals be aware of the threat of social engineering.  Do not take everything at face value.&lt;br /&gt;
&lt;br /&gt;
* Social-engineering attacks are not just made through electronic means.  Social-engineering tricks play on the fallacy of a human and their associated emotions.  It is important for an individual to be aware of the threats and tactics of social engineering.  Social engineers typically target gullible members of a company to obtain small bits of information and work their way up, gaining more information.  If you are alert to these threads, you are better defender against both your identity, your employer, as well as your clients.&lt;br /&gt;
&lt;br /&gt;
* It is sometimes very hard to tell when you are being tricked by a fraudulent act.  Employees in control of sensitive information must go through rigorous training to sense when they are being tricked.&lt;br /&gt;
&lt;br /&gt;
'''2. Social Engineering Security Precautions Are Not Easy'''&lt;br /&gt;
&lt;br /&gt;
* Since social engineering does not necessarily require any special technical skill set, like hacking, it is open to many types of attackers who are adept at fooling an individual.  &lt;br /&gt;
&lt;br /&gt;
* It is hard to devise structured policies to defend against the leak of confidential information through the means of social engineering.  There is no single solution for solving the problem of social engineering.  It is up to the company to do the best job they can creating useful policies for the release of sensitive data.  Employees much also be aware of the various methods and tactics used by social engineers to obtain information.&lt;br /&gt;
&lt;br /&gt;
* Unlike hacking or stealing by force, social engineering is very elusive.  Almost always, when information is released, the victim has no idea they gave it to someone posing as a legitimate source.  &lt;br /&gt;
&lt;br /&gt;
3. Ethical Responsibilities&lt;br /&gt;
&lt;br /&gt;
4. Some Security Products That Could Help You&lt;br /&gt;
&lt;br /&gt;
==Useful Resources==&lt;br /&gt;
&lt;br /&gt;
Definitions and Descriptions of Social Engineering:&lt;br /&gt;
&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/risks/security/precautions/ Security Precautions (Old Project Page)]&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Social_engineering_%28security%29 Social Engineering (Wikipedia)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.securityfocus.com/infocus/1527 Social Engineering Fundamentals]&lt;br /&gt;
&lt;br /&gt;
* [http://searchfinancialsecurity.techtarget.com/tip/0,289483,sid185_gci1294530,00.html Social Engineering Attacks]&lt;br /&gt;
&lt;br /&gt;
* [http://news.cnet.com/8301-1009_3-9995253-83.html Social Engineering: Hackers show how it is done]&lt;br /&gt;
&lt;br /&gt;
Defense and Tips against Social Engineering Attacks:&lt;br /&gt;
&lt;br /&gt;
* [http://www.sans.org/reading_room/whitepapers/engineering/511.php Proactive Defense to Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://www.morehouse.org/hin/blckcrwl/hack/soceng.txt Social Engineering FAQ]&lt;br /&gt;
&lt;br /&gt;
* [http://www.hackinthebox.org/modules.php?op=modload&amp;amp;name=News&amp;amp;file=article&amp;amp;sid=15170&amp;amp;mode=thread&amp;amp;order=0&amp;amp;thold=0 Social Engineering Defense 101]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cioupdate.com/trends/article.php/3638951 Best Defense Against Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://techrepublic.com.com/5208-6230-0.html?forumID=102&amp;amp;threadID=232696 Social Engineering Self-defense]&lt;br /&gt;
&lt;br /&gt;
* [http://www.infosecwriters.com/text_resources/pdf/Social_Engineering_CRhodes.pdf Safeguarding Against Social Engineering]&lt;/div&gt;</summary>
		<author><name>Cjsoques</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Topics&amp;diff=16871</id>
		<title>CSC 379 SUM2008:Topics</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Topics&amp;diff=16871"/>
		<updated>2008-08-06T11:47:28Z</updated>

		<summary type="html">&lt;p&gt;Cjsoques: /* Security Precautions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= New Topics =&lt;br /&gt;
&lt;br /&gt;
'''For these topics, you will be creating the study guide and bibliography sections, instead of providing an update an existing page.  Examine the [http://ethics.csc.ncsu.edu/ ethics.csc.ncsu.edu website] for examples.  Since your pages will be created and maintained in wiki-form, please design your pages with wiki markup (not HTML).  Formatting resources are provided on the [[CSC 379]] wiki homepage.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Smart Mobs==&lt;br /&gt;
'''social/smartmobs'''&lt;br /&gt;
&lt;br /&gt;
As cell phones, text messaging, GPS, and other technologies make mobilization of groups easier, people are continually finding new uses.  Both physical and virtual actions now frequently take place; protests, flooding email accounts and online polls, to impromptu gatherings.  Explore smart/flash mobs, and the ethical considerations they raise.  Include information on important instances of smart mobs and the future of smart mobs.&lt;br /&gt;
&lt;br /&gt;
==Social Dossiers==&lt;br /&gt;
'''social/dossiers'''&lt;br /&gt;
&lt;br /&gt;
In the old days, if someone wanted to assemble a dossier on you, they would hire a private investigator.  Now, depending on your Web presence, they may only need to Google you.  Bits and pieces of information about ourselves can be found everywhere online, and most are unaware of just how much information about them is available.  Anyone with sufficient time and/or software can assemble social dossiers from this information.  What you write on Facebook may affect your ability to get a job!  Examine the array of personal information available online, efforts to assemble and utilize this information, and ethical considerations raised by posting or using this information.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://ethics.csc.ncsu.edu/social/lifebits/new.html Helpful Links] --&amp;gt;&lt;br /&gt;
[http://pg-server.csc.ncsu.edu/mediawiki/index.php/Social_dossiers New Study Guide]&lt;br /&gt;
&lt;br /&gt;
==Phishing==&lt;br /&gt;
'''abuse/spam/phishing'''&lt;br /&gt;
&lt;br /&gt;
Phishing efforts are growing in variety and sophistication.  They pose many privacy and security risks.  Examine the practice of phishing, its forms, and the ethical considerations raised.&lt;br /&gt;
&lt;br /&gt;
[http://ethics.csc.ncsu.edu/abuse/spam/phishing/new.html Helpful Links]&lt;br /&gt;
&lt;br /&gt;
==Encryption==&lt;br /&gt;
'''privacy/encryption'''&lt;br /&gt;
&lt;br /&gt;
Provide a general overview of the ethical considerations of using encryption.  Within your coverage, explore specifically if governments should be allowed to impose restrictions on the types of encryption that can be used as well as where and how encryption may be used.&lt;br /&gt;
&lt;br /&gt;
[http://pg-server.csc.ncsu.edu/mediawiki/index.php/Encryption Wiki Article]&lt;br /&gt;
&lt;br /&gt;
[http://ethics.csc.ncsu.edu/privacy/encryption/new.html Helpful Links]&lt;br /&gt;
&lt;br /&gt;
==Voting Receipts==&lt;br /&gt;
'''risks/reliability/voting/receipts'''&lt;br /&gt;
&lt;br /&gt;
Touchscreen voting was widely touted as a solution to vote-counting fiascoes like the famous Florida election debacle of 2000.  But it wasn't long before computer experts started to raise the alarm: With electronic touchscreen voting, there is absolutely no record of how a voter voted, except for the tallies spit out by the machine at the end of the day.  If a software bug or hardware malfunction resulted in a miscount, no one would ever know.  Many computer scientists demanded that paper receipts be printed and shown to the voter for verification, then retained by the machine in case a recount was needed.  So the vendors of touchscreen voting systems reluctantly added printers.  But the printers have not been reliable, and now scientists are searching for another way of creating unforgeable receipts.  Explore the competing ethical requireents that must be met by these receipts: voter privacy, accurate tallies, and resistance to hacking.  &lt;br /&gt;
***Do not cover aspects of electronic voting other than receipts; the issue of hacking vote-counting software and Internet voting have their own pages, for example.  Cover only articles that are in some way related to the need for receipts, or the type of backup used.&lt;br /&gt;
&lt;br /&gt;
[http://ethics.csc.ncsu.edu/risks/reliability/voting/receipts/new.html Helpful Links]&lt;br /&gt;
&lt;br /&gt;
= Existing Topics =&lt;br /&gt;
&lt;br /&gt;
'''For these topics you will be performing an update on an existing topic.  Pages for the study guide and bibliography sections are included on the [http://ethics.csc.ncsu.edu ethics.csc.ncsu.edu website], which you will be transitioning to their new wiki-form.  Since your pages will be created and maintained in wiki-form, please design your pages with wiki markup (not HTML). Formatting resources are provided on the [[CSC 379]] wiki homepage.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Cyberwarfare==&lt;br /&gt;
'''risks/security/cyberwar'''&lt;br /&gt;
&lt;br /&gt;
Cyberwarfare has long been a topic of theoretical interest and growing practical importance, as nations' infrastructures grow increasingly computerized.  Now, with the recent attack on Estonia, the cyberwar era may have begun in earnest.  Provide a general overview of the ethical considerations related to cyberwarfare.  Examine new methods of cyberwarfare, and include recent examples.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/cyberwar Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/cyberwar/study.php Current Study Guide]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/cyberwar/new.html Helpful Links]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Wiki Page]]&lt;br /&gt;
&lt;br /&gt;
==Intellectual Property Law==&lt;br /&gt;
'''intellectual/law'''&lt;br /&gt;
&lt;br /&gt;
Intellectual-property law is a topic that is basic to this course.  Although not much is new, it is still worthwhile to update the sources.  Ensure that trade secrets are included in your coverage.  ''Alternative intellectual property models (GPL, Creative Commons, etc.) are '''not''' part of this topic.  Nor are implications of IP law related to electronic communication (e.g., whether it is legal to copy a Web page and send it to a mailing list).''  The only material that should be covered here is material on what the law states, and relevant court decisions. &lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/intellectual/law Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/intellectual/law/study.php Current Study Guide]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/intellectual/law/new.html Helpful Links]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Cyberlicenses / Shrinkwrap Licenses==&lt;br /&gt;
'''intellectual/licensing/cyberlicenses''' and '''intellectual/licensing/shrinkwrap'''&lt;br /&gt;
&lt;br /&gt;
In the past, we have had pages on the Ethics Web site related to shrinkwrap licenses (that are contained within the cardboard box that software comes in) and cyberlicenses (licenses you agree to over the Web before being allowed to download or install software).  The issues never were that different, and as digital downloads come to dominate the market, it makes less sense than ever to maintain two separate pages.  Provide a general overview of the ethical considerations related to shrinkwrap and cyberlicenses, such as whether a buyer can realistically give informed consent to a document that is long, hard to read, and may contain provision whose meaning is not clear at first glance.  Expand on licensing related to ownership of content created through web services, such as Facebook and MySpace.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/intellectual/licensing/cyberlicenses Current Main Page (1)]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/intellectual/licensing/cyberlicenses/study.php Current Study Guide (1)]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/intellectual/licensing/cyberlicenses/new.html Helpful Links (1)]&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/intellectual/licensing/cyberlicenses Current Main Page (2)]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/intellectual/licensing/shrinkwrap/study.php Current Study Guide (2)]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/intellectual/licensing/shrinkwrap/new.html Helpful Links (2)]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Computer Modeling==&lt;br /&gt;
'''risks/models'''&lt;br /&gt;
&lt;br /&gt;
The implications of computer models are often controversial, but the GIGO adage always applies: a model can be no better than its inputs.  An inaccurate model has a high potential for conveying a misleading and dishonest view of reality.  However, people who are less computer literate may not understand this, and may accord credence to anything that comes out of a computer.  Thus, modelers must take pains not to make expansive claims about their results.  Provide a general overview of the ethical considerations, both from a science/engineering, and social/economic perspective.  Cover both sides of the current controversy over models of global warming.  On a social/economic plane, include ethical considerations related to developments in computer modeling in virtual communities, such as Second Life.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/models Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/models/study.php Current Study Guide]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/models/new.html Helpful Links]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Depersonalization==&lt;br /&gt;
'''social/technoharm'''&lt;br /&gt;
&lt;br /&gt;
While Generation Y tends to be most comfortable when always connected, a lot of other people believe that computers are drawing us away from meaningful personal contact.  In the past decade, this view was much more widespread in Europe than in America.  Provide an overview of controversy over depersonalization, and the ethical considerations related to becoming more conversant with technology than with other people.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/social/technoharm Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/social/technoharm/study.php Current Study Guide]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/social/technoharm/new.html Helpful Links]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Privacy of Medical Information==&lt;br /&gt;
'''privacy/medical'''&lt;br /&gt;
&lt;br /&gt;
Privacy of medical records has long been a high-profile issue.  Inevitably, medical records are becoming more computerized. Emerging patient-centric services such as [https://www.google.com/health Google Health] are accelerating this trend.  Provide a general overview of the ethical considerations related to privacy of digital medical information.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/privacy/medical Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/privacy/medical/study.php Current Study Guide]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/privacy/medical/new.html Helpful Links]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Electronic Voting==&lt;br /&gt;
'''risks/reliability/voting/electronic'''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Electronic voting&amp;quot; means the use of machines that register votes and record them in electronic memory.  While once touted as the solution to fiascoes like the one in Florida in the 2000 presidential election, they quickly became controversial because of the large number of &amp;quot;undervotes&amp;quot; they recorded--where voters voted for no candidate in a particular race.  Concerns were raised that some voters were simply not familiar enough with technology to use e-voting machines correctly. A number of election anomalies tended to lend credence to this claim.  Then, there is also the problem that there is no way to effectively test the software.  Unlike financial transactions, there is no record kept of how a particular vote counted.  So if the vote is not counted, who will know?&lt;br /&gt;
&lt;br /&gt;
This page is due an update, but please be sure to steer clear of such related topics as (1) the [http://ethics.csc.ncsu.edu/risks/reliability/voting reliability of vote-counting software], (2) [http://ethics.csc.ncsu.edu/risks/reliability/voting/internet Internet voting], and (3) what kind of receipts, if any, should be produced by machines so that voters can verify that their vote was recorded.  These topics all have their own pages on the [http://ethics.csc.ncsu.edu Ethics Web site].  You do not have to find articles that avoid all mention of these topics, but do not pick any articles that are ''mainly'' about any of these three.  Rather, focus on articles that talk about electronic or touch-screen machines, as compared to other methods of voting.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/reliability/voting/electronic Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/reliability/voting/electronic/study.php Current Study Guide]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/reliability/voting/electronic/new.html Helpful Links]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Instant Messaging==&lt;br /&gt;
'''commerce/anticompetitive/instant'''&lt;br /&gt;
&lt;br /&gt;
Most of the references on this page are three or four years old. The issue is whether a small number of companies should unfairly dominate the market for instant messaging. Update the existing page with new references, and the study guide with new issues.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/instant/ Current Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/commerce/anticompetitive/instant/study.php Current Study Guide]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Security Precautions==&lt;br /&gt;
'''risks/security/precautions'''&lt;br /&gt;
&lt;br /&gt;
If you are in charge of network security, you have a duty to keep your network secure.  What security precautions do Web and network administrators need to take to guard against hacker attacks, such as distributed denial-of-service attacks? What precautions are needed against other forms of hacking? Against cyberwarfare and terrorist threats? Update topic page and study guide to cover current/future precautions related to recent occurrences.  ''Be sure to focus on articles that talk about precautions that administrators need to take,'' not article that focus on threats to networks, only mentioning precautions as an afterthought.&lt;br /&gt;
&lt;br /&gt;
'''Social Engineering''' should be included as a major section within this topic.  If you would like to make a new page focused on social engineering, you may if you choose this topic.&lt;br /&gt;
&lt;br /&gt;
{| cellpadding=&amp;quot;4&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [http://pg-server.csc.ncsu.edu/mediawiki/index.php/Social_Engineering Current Main Page and Study Guide]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/precautions Old Main Page]&lt;br /&gt;
| [http://ethics.csc.ncsu.edu/risks/security/precautions/study.php Old Study Guide]&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Cjsoques</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=15581</id>
		<title>Social Engineering</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=15581"/>
		<updated>2008-07-25T15:18:50Z</updated>

		<summary type="html">&lt;p&gt;Cjsoques: /* Study Guide */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Social engineering a method of fraud and hacking that utilizes the humanity and nature of people to retrieve information from them voluntarily.  By playing into the nature of the person, hacking through technological means is sometimes not necessary.  If one can fool a person into giving away information voluntarily, then creating a program or hack to retrieve that information involuntarily is no required.  Furthermore, it can be much simpler and efficient to get information from someone through social engineering than it would ever be to steal that information via a computer program or password cracker.  &lt;br /&gt;
&lt;br /&gt;
This form of forcing users to disclose information must be done through some human means.  The point of social engineering is to utilize the fallacies of human logic and biases to trick the target into revealing confidential information through various methods and tactics.&lt;br /&gt;
&lt;br /&gt;
The precautions necessary against social engineering are required to be very proactive.  For example, you can put an anti virus program that will passively scan your computer for viruses automatically. However, the human must be actively on the defense for social engineering tricks and tactics that may be used against them.  Over the years, general guidelines for companies and employees have been developed to give the knowledge necessary to be vigilant and alert for social engineering fraud attempts.&lt;br /&gt;
&lt;br /&gt;
==Tactics and Methods==&lt;br /&gt;
There are various means of utilizing social engineering to obtain confidential and secret information such as passwords and private data.  All of these methods work through some medium in which the attacker has to actually converse with the victim in some way, whether directly or indirectly.  In all methods, feedback from the victim is required.  This feedback is usually the necessary information the attacker was looking for.&lt;br /&gt;
&lt;br /&gt;
Although social engineering tactics are heavily performed through electronic and computer mediums.  There are many methods in which social engineering can be done through the physical realm.  As long as there can be some form of communication between the attacker and the victim any medium may be used.  Social engineering is so successful because it takes advantage of the fallacies of the human being.  Whether by means of flattery, impersonation, and greed; social engineering is considered to some an art form of psychology.&lt;br /&gt;
&lt;br /&gt;
Social Engineering can be extremely simple to perform, but have dire effects and consequences.  There are even [http://news.cnet.com/8301-1009_3-9995253-83.html guides and tips] on how hackers have used social engineering in extremely simple ways.  Social engineering is considered so dangerous that [http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick], a renouned hacker and early user of social enginering, was considered the most dangerous hacker.  By using social engineering, the FBI though that Mitnick could start a nuclear war by simply utilizing social engineering.  &lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
The main way of retrieving electronic information from victim voluntarily is through [http://en.wikipedia.org/wiki/Phishing phishing].  Phishing, like social engineering, can be performed over various electronic and physical mediums.  In a general term, phishing is pretending to be something legitimate, when you are not.  When you fool the victim into thinking you are the legitimate source that is being faked, they will reveal all the information that would normally be required to use that source.  This may include account numbers, usernames, passwords, or even Social Security Numbers.&lt;br /&gt;
&lt;br /&gt;
A major medium of phishing is through e-mail.  The example of a bank and customer is extremely common.  The attacker will send the victim an e-mail notifying them of some required account information to be updated.  This e-mail will look exactly like the standard e-mail the victim may have received from the bank before.  The victim will be required to login and update their information as soon as possible.  However, the link will not be sent to the bank website, but to a separate server that was setup by the attacker to retrieve the information.  This website, like the e-mail, will look exactly like the actual bank website.  Once the person types their login information, the attacker then has all the information they needed from the victim.  &lt;br /&gt;
&lt;br /&gt;
Although uncommon, phishing may also be performed over the phone by pretending to be a representative of some company that is requesting some kind of account information.  The attacker may even know some basic information about the victim to prove that they are legitimate.  Usually, a victim will not question the call and will provide the necessary information.  The attacker can then use this information to take advantage of the victim by means of identity or property theft.&lt;br /&gt;
&lt;br /&gt;
===Pretexting===&lt;br /&gt;
[http://www.ftc.gov/bcp/conline/pubs/credit/pretext.shtm Pretexting] is a form of using information about the victim to obtain even more information or to use it against the victim.  Through pretexting the attacker uses the limited information gained to obtain more information.  Once enough information is gained.  The attacker may use credit pretending to be the victim, to make purchases acting as the victim, or to manipulate the records of the victim.&lt;br /&gt;
&lt;br /&gt;
The goal of pretexting is to prove to someone that you are legitimately the victim.  This may be done from proving that you know their name, address, phone number, and Social Security Number.  This could also be done by knowing the victim's username and password that was retrieved through phishing.&lt;br /&gt;
&lt;br /&gt;
===Trojan Horse===&lt;br /&gt;
A [http://www.tech-faq.com/trojan-horse-virus.shtml Trojan Horse] a technological form of social engineering.  Not only does it fool the victim that it is from a legitimate source, but it also fools the computer the victim is using.  A trojan horse is a program that may seem to perform a legitimate action, but in fact is collecting sensitive information or stealing data in the background.  This is, of coruse, derived from the ancient tactic used by the Spartans to invade Troy by pretending to be a gift to the Trojans (which is an ancient example of social engineering).&lt;br /&gt;
&lt;br /&gt;
To be specific, a ''gimme'' is a type of Trojan Horse that plays off of Social Engineering.  This tactic goes in conjunction with spamming or phishing.  The user will receive a pop-up ad or e-mail ad notifying the victim of some software that would benefit them.  Because of their curiosity and the seeming innocence of the program, the victim will install it on their machine.  The software may even perform as advertised, but in the background is obtaining account information and other confidential data.&lt;br /&gt;
&lt;br /&gt;
This is where a computer program pretends to be something it is not.  Instead of an actual human being performing the pretexting, it is an automated computer program.&lt;br /&gt;
&lt;br /&gt;
==Security, Precautions, and Defenses==&lt;br /&gt;
There are many precautions and defenses against social engineering.  However, there is a lack of education on the methods to defend against this tactic.  Various methods include vigorous identity verification, minimizing the amount of people that have sensitive information, as well as reducing the trust level of those in control of information.  Many companies have developed security policies and guidelines that employees should follow to minimize the risk of social engineering exploits.&lt;br /&gt;
&lt;br /&gt;
===Proactive Social Defenses===&lt;br /&gt;
SANS Network Security has a good example of a [http://www.sans.org/reading_room/whitepapers/engineering/511.php brief guide] for employees to maintain a proactive awareness against social engineering.  Through proactive self defense a company should develop a detailed policy on security and data release.  These policy should detailed who is able to release information, what information, and to who that information may be released to. &lt;br /&gt;
&lt;br /&gt;
There should be detailed access approval to any secured area or information.  A company should setup a defense against social engineering by always having a detailed access approval process instead of simply not challenging the requester of information. The company should have a designated help desk and support center that is knowledgeable in the policies of data release.  Information such as employee IDs, account information, and passwords should always be challenged with a detailed approval policy.&lt;br /&gt;
&lt;br /&gt;
By detailing who is allowed to release information and what information can be released, a company can minimize the amount of violations through social-engineering.  Usually social engineering succeeds because there is no preset guideline for giving out information for rare instances that social engineers exploit.&lt;br /&gt;
&lt;br /&gt;
===Employee Training===&lt;br /&gt;
Since the human being is the reason for social engineering exploits, the employee is the number one defense against attacks.  By [http://techrepublic.com.com/5208-6230-0.html?forumID=102&amp;amp;threadID=232696 training the employees through examples], they gain an understanding of how easy it is for social engineering to work.  By training to employees to reduce their trust value and not take request for information at face value, it will discourage the attacker to request any further information.  If in doubt, the employee should never give out confidential information and bring it to the next person in command.&lt;br /&gt;
&lt;br /&gt;
===Security Software and Electronics===&lt;br /&gt;
Since the goal of social engineering exploits are to bypass technological and security barriers, there are few ways to stop social engineering through electronic and software means.  One main way to combat and reduce the risk is to have, in place, strict identity verification technologies that combat counterfeit and impersonation attacks.  Social engineering attacks are so easy because it is so easy to appear legitimate.  If identify verification were scrutinized at both a human and electronic level, the legitimacy of identity would be much harder to prove.&lt;br /&gt;
&lt;br /&gt;
In addition, companies can install [http://ca.com/us/securityadvisor/documents/collateral.aspx?cid=157506 software] that will reduce the amount of social engineering solicitations that employees receive through e-mail and websites.  By filtering out known threatening sources, this software can prevent the employee from even having to worry about making the decision of whether the source is legitimate.&lt;br /&gt;
&lt;br /&gt;
==Legal and Ethical Concerns==&lt;br /&gt;
In the United States, there are laws against pretexting and falsifying identity.  The [http://en.wikipedia.org/wiki/Gramm-Leach-Bliley_Act Gramm-Leach-Billey Act (GLBA)] makes it illegal to do the following&lt;br /&gt;
&lt;br /&gt;
* To falsify information or make false statements to retrieve information from a financial institution or even a customer of that institution&lt;br /&gt;
&lt;br /&gt;
* To use forged or stolen documents to receive information from a financial institution or a customer of that institution&lt;br /&gt;
&lt;br /&gt;
* Ask another person to obtain information by using the above two means&lt;br /&gt;
&lt;br /&gt;
In addition, the [http://en.wikipedia.org/wiki/Federal_Trade_Commission_Act Federal Trade Commission Act] prohibits pretexting for customer information.&lt;br /&gt;
&lt;br /&gt;
&amp;gt;&amp;gt; NEED ETHICAL CONCERNS &amp;lt;&amp;lt;&lt;br /&gt;
&lt;br /&gt;
==Study Guide==&lt;br /&gt;
This study guide relates to security precautions against Social Engineering.  For the main Security Precautions study guide, go [http://ethics.csc.ncsu.edu/risks/security/precautions/study.php here].&lt;br /&gt;
&lt;br /&gt;
'''1. Why Are Security Precautions Necessary to Safeguard Against Social Engineering?'''&lt;br /&gt;
&lt;br /&gt;
* In the United States, identity, both personal and financial, are held digitally.  Typical social engineering attacks aim at stealing the digital identities of people.  This can ruin their credit and ability to purchase things, as well as reputations when it comes to employment.  [http://www.ftc.gov/bcp/edu/microsites/idtheft/ Here] are some tips from the FTC on safeguarding your information.  You should never give out information unless you are certain of the source.  You should also limit the amount of information you allow organizations to have.  They are also prone to hacking and social engineering threats that could steal your identity.&lt;br /&gt;
&lt;br /&gt;
* If security precautions are note made against social engineering, a skilled hacker could forge his way into nearly any system.  It is said that the famous social engineering, [http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick], would be able to set off nuclear missiles from his phone using social engineering tactics.  It is important that organizations and individuals be aware of the threat of social engineering.  Do not take everything at face value.&lt;br /&gt;
&lt;br /&gt;
* Social engineering attacks are not just made through electronics means.  Social engineering tricks play on the fallacy of a human and their associated emotions.  It is important for an individual to be aware of the threats and tactics of social engineering.  Social engineers typically target gullible members of a company to obtain small bits of information and work their way up, gaining more information.  If you are alert to these threads, you are better defender against both your identity, your employer, as well as your clients.&lt;br /&gt;
&lt;br /&gt;
* The act of social engineering is very vague.  It is sometime very hard to tell when you are being tricked by a fraudulent act.  It is necessary that employees in control of sensitive information should go through rigorous training to sense when they are being tricked.&lt;br /&gt;
&lt;br /&gt;
'''2. Social Engineering Security Precautions Are Not Easy'''&lt;br /&gt;
&lt;br /&gt;
* Since social engineering does not necessarily require any special technical skill set, like hacking, it is open to many types of attackers that are adept at fooling an individual.  &lt;br /&gt;
&lt;br /&gt;
* It is hard to devise structured policies to defend against the leak of confidential information through the means of social engineering.  There is no single solution for solving the problem of social engineering.  It is up to the company to do the best job they can creating useful policies for the release of sensitive data.  Employees much also be aware of the various methods and tactics used by social engineers to obtain information.&lt;br /&gt;
&lt;br /&gt;
* Unlike hacking or stealing by force, social engineering is very elusive.  Almost always, when information is released, the victim has no idea they gave it to someone posing as a legitimate source.  &lt;br /&gt;
&lt;br /&gt;
3. Ethical Responsibilities&lt;br /&gt;
&lt;br /&gt;
4. Some Security Products That Could Help You&lt;br /&gt;
&lt;br /&gt;
==Useful Resources==&lt;br /&gt;
&lt;br /&gt;
Definitions and Descriptions of Social Engineering:&lt;br /&gt;
&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/risks/security/precautions/ Security Precautions (Old Project Page)]&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Social_engineering_%28security%29 Social Engineering (Wikipedia)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.securityfocus.com/infocus/1527 Social Engineering Fundamentals]&lt;br /&gt;
&lt;br /&gt;
* [http://searchfinancialsecurity.techtarget.com/tip/0,289483,sid185_gci1294530,00.html Social Engineering Attacks]&lt;br /&gt;
&lt;br /&gt;
* [http://news.cnet.com/8301-1009_3-9995253-83.html Social Engineering: Hackers show how it is done]&lt;br /&gt;
&lt;br /&gt;
Defense and Tips against Social Engineering Attacks:&lt;br /&gt;
&lt;br /&gt;
* [http://www.sans.org/reading_room/whitepapers/engineering/511.php Proactive Defense to Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://www.morehouse.org/hin/blckcrwl/hack/soceng.txt Social Engineering FAQ]&lt;br /&gt;
&lt;br /&gt;
* [http://www.hackinthebox.org/modules.php?op=modload&amp;amp;name=News&amp;amp;file=article&amp;amp;sid=15170&amp;amp;mode=thread&amp;amp;order=0&amp;amp;thold=0 Social Engineering Defense 101]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cioupdate.com/trends/article.php/3638951 Best Defense Against Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://techrepublic.com.com/5208-6230-0.html?forumID=102&amp;amp;threadID=232696 Social Engineering Self-defense]&lt;br /&gt;
&lt;br /&gt;
* [http://www.infosecwriters.com/text_resources/pdf/Social_Engineering_CRhodes.pdf Safeguarding Against Social Engineering]&lt;/div&gt;</summary>
		<author><name>Cjsoques</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=15579</id>
		<title>Social Engineering</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=15579"/>
		<updated>2008-07-25T15:07:17Z</updated>

		<summary type="html">&lt;p&gt;Cjsoques: /* Study Guide */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Social engineering a method of fraud and hacking that utilizes the humanity and nature of people to retrieve information from them voluntarily.  By playing into the nature of the person, hacking through technological means is sometimes not necessary.  If one can fool a person into giving away information voluntarily, then creating a program or hack to retrieve that information involuntarily is no required.  Furthermore, it can be much simpler and efficient to get information from someone through social engineering than it would ever be to steal that information via a computer program or password cracker.  &lt;br /&gt;
&lt;br /&gt;
This form of forcing users to disclose information must be done through some human means.  The point of social engineering is to utilize the fallacies of human logic and biases to trick the target into revealing confidential information through various methods and tactics.&lt;br /&gt;
&lt;br /&gt;
The precautions necessary against social engineering are required to be very proactive.  For example, you can put an anti virus program that will passively scan your computer for viruses automatically. However, the human must be actively on the defense for social engineering tricks and tactics that may be used against them.  Over the years, general guidelines for companies and employees have been developed to give the knowledge necessary to be vigilant and alert for social engineering fraud attempts.&lt;br /&gt;
&lt;br /&gt;
==Tactics and Methods==&lt;br /&gt;
There are various means of utilizing social engineering to obtain confidential and secret information such as passwords and private data.  All of these methods work through some medium in which the attacker has to actually converse with the victim in some way, whether directly or indirectly.  In all methods, feedback from the victim is required.  This feedback is usually the necessary information the attacker was looking for.&lt;br /&gt;
&lt;br /&gt;
Although social engineering tactics are heavily performed through electronic and computer mediums.  There are many methods in which social engineering can be done through the physical realm.  As long as there can be some form of communication between the attacker and the victim any medium may be used.  Social engineering is so successful because it takes advantage of the fallacies of the human being.  Whether by means of flattery, impersonation, and greed; social engineering is considered to some an art form of psychology.&lt;br /&gt;
&lt;br /&gt;
Social Engineering can be extremely simple to perform, but have dire effects and consequences.  There are even [http://news.cnet.com/8301-1009_3-9995253-83.html guides and tips] on how hackers have used social engineering in extremely simple ways.  Social engineering is considered so dangerous that [http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick], a renouned hacker and early user of social enginering, was considered the most dangerous hacker.  By using social engineering, the FBI though that Mitnick could start a nuclear war by simply utilizing social engineering.  &lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
The main way of retrieving electronic information from victim voluntarily is through [http://en.wikipedia.org/wiki/Phishing phishing].  Phishing, like social engineering, can be performed over various electronic and physical mediums.  In a general term, phishing is pretending to be something legitimate, when you are not.  When you fool the victim into thinking you are the legitimate source that is being faked, they will reveal all the information that would normally be required to use that source.  This may include account numbers, usernames, passwords, or even Social Security Numbers.&lt;br /&gt;
&lt;br /&gt;
A major medium of phishing is through e-mail.  The example of a bank and customer is extremely common.  The attacker will send the victim an e-mail notifying them of some required account information to be updated.  This e-mail will look exactly like the standard e-mail the victim may have received from the bank before.  The victim will be required to login and update their information as soon as possible.  However, the link will not be sent to the bank website, but to a separate server that was setup by the attacker to retrieve the information.  This website, like the e-mail, will look exactly like the actual bank website.  Once the person types their login information, the attacker then has all the information they needed from the victim.  &lt;br /&gt;
&lt;br /&gt;
Although uncommon, phishing may also be performed over the phone by pretending to be a representative of some company that is requesting some kind of account information.  The attacker may even know some basic information about the victim to prove that they are legitimate.  Usually, a victim will not question the call and will provide the necessary information.  The attacker can then use this information to take advantage of the victim by means of identity or property theft.&lt;br /&gt;
&lt;br /&gt;
===Pretexting===&lt;br /&gt;
[http://www.ftc.gov/bcp/conline/pubs/credit/pretext.shtm Pretexting] is a form of using information about the victim to obtain even more information or to use it against the victim.  Through pretexting the attacker uses the limited information gained to obtain more information.  Once enough information is gained.  The attacker may use credit pretending to be the victim, to make purchases acting as the victim, or to manipulate the records of the victim.&lt;br /&gt;
&lt;br /&gt;
The goal of pretexting is to prove to someone that you are legitimately the victim.  This may be done from proving that you know their name, address, phone number, and Social Security Number.  This could also be done by knowing the victim's username and password that was retrieved through phishing.&lt;br /&gt;
&lt;br /&gt;
===Trojan Horse===&lt;br /&gt;
A [http://www.tech-faq.com/trojan-horse-virus.shtml Trojan Horse] a technological form of social engineering.  Not only does it fool the victim that it is from a legitimate source, but it also fools the computer the victim is using.  A trojan horse is a program that may seem to perform a legitimate action, but in fact is collecting sensitive information or stealing data in the background.  This is, of coruse, derived from the ancient tactic used by the Spartans to invade Troy by pretending to be a gift to the Trojans (which is an ancient example of social engineering).&lt;br /&gt;
&lt;br /&gt;
To be specific, a ''gimme'' is a type of Trojan Horse that plays off of Social Engineering.  This tactic goes in conjunction with spamming or phishing.  The user will receive a pop-up ad or e-mail ad notifying the victim of some software that would benefit them.  Because of their curiosity and the seeming innocence of the program, the victim will install it on their machine.  The software may even perform as advertised, but in the background is obtaining account information and other confidential data.&lt;br /&gt;
&lt;br /&gt;
This is where a computer program pretends to be something it is not.  Instead of an actual human being performing the pretexting, it is an automated computer program.&lt;br /&gt;
&lt;br /&gt;
==Security, Precautions, and Defenses==&lt;br /&gt;
There are many precautions and defenses against social engineering.  However, there is a lack of education on the methods to defend against this tactic.  Various methods include vigorous identity verification, minimizing the amount of people that have sensitive information, as well as reducing the trust level of those in control of information.  Many companies have developed security policies and guidelines that employees should follow to minimize the risk of social engineering exploits.&lt;br /&gt;
&lt;br /&gt;
===Proactive Social Defenses===&lt;br /&gt;
SANS Network Security has a good example of a [http://www.sans.org/reading_room/whitepapers/engineering/511.php brief guide] for employees to maintain a proactive awareness against social engineering.  Through proactive self defense a company should develop a detailed policy on security and data release.  These policy should detailed who is able to release information, what information, and to who that information may be released to. &lt;br /&gt;
&lt;br /&gt;
There should be detailed access approval to any secured area or information.  A company should setup a defense against social engineering by always having a detailed access approval process instead of simply not challenging the requester of information. The company should have a designated help desk and support center that is knowledgeable in the policies of data release.  Information such as employee IDs, account information, and passwords should always be challenged with a detailed approval policy.&lt;br /&gt;
&lt;br /&gt;
By detailing who is allowed to release information and what information can be released, a company can minimize the amount of violations through social-engineering.  Usually social engineering succeeds because there is no preset guideline for giving out information for rare instances that social engineers exploit.&lt;br /&gt;
&lt;br /&gt;
===Employee Training===&lt;br /&gt;
Since the human being is the reason for social engineering exploits, the employee is the number one defense against attacks.  By [http://techrepublic.com.com/5208-6230-0.html?forumID=102&amp;amp;threadID=232696 training the employees through examples], they gain an understanding of how easy it is for social engineering to work.  By training to employees to reduce their trust value and not take request for information at face value, it will discourage the attacker to request any further information.  If in doubt, the employee should never give out confidential information and bring it to the next person in command.&lt;br /&gt;
&lt;br /&gt;
===Security Software and Electronics===&lt;br /&gt;
Since the goal of social engineering exploits are to bypass technological and security barriers, there are few ways to stop social engineering through electronic and software means.  One main way to combat and reduce the risk is to have, in place, strict identity verification technologies that combat counterfeit and impersonation attacks.  Social engineering attacks are so easy because it is so easy to appear legitimate.  If identify verification were scrutinized at both a human and electronic level, the legitimacy of identity would be much harder to prove.&lt;br /&gt;
&lt;br /&gt;
In addition, companies can install [http://ca.com/us/securityadvisor/documents/collateral.aspx?cid=157506 software] that will reduce the amount of social engineering solicitations that employees receive through e-mail and websites.  By filtering out known threatening sources, this software can prevent the employee from even having to worry about making the decision of whether the source is legitimate.&lt;br /&gt;
&lt;br /&gt;
==Legal and Ethical Concerns==&lt;br /&gt;
In the United States, there are laws against pretexting and falsifying identity.  The [http://en.wikipedia.org/wiki/Gramm-Leach-Bliley_Act Gramm-Leach-Billey Act (GLBA)] makes it illegal to do the following&lt;br /&gt;
&lt;br /&gt;
* To falsify information or make false statements to retrieve information from a financial institution or even a customer of that institution&lt;br /&gt;
&lt;br /&gt;
* To use forged or stolen documents to receive information from a financial institution or a customer of that institution&lt;br /&gt;
&lt;br /&gt;
* Ask another person to obtain information by using the above two means&lt;br /&gt;
&lt;br /&gt;
In addition, the [http://en.wikipedia.org/wiki/Federal_Trade_Commission_Act Federal Trade Commission Act] prohibits pretexting for customer information.&lt;br /&gt;
&lt;br /&gt;
&amp;gt;&amp;gt; NEED ETHICAL CONCERNS &amp;lt;&amp;lt;&lt;br /&gt;
&lt;br /&gt;
==Study Guide==&lt;br /&gt;
This study guide relates to security precautions against Social Engineering.  For the main Security Precautions study guide, go [http://ethics.csc.ncsu.edu/risks/security/precautions/study.php here].&lt;br /&gt;
&lt;br /&gt;
'''1. Why Are Security Precautions Necessary to Safeguard Against Social Engineering?'''&lt;br /&gt;
&lt;br /&gt;
* In the United States, identity, both personal and financial, are held digitally.  Typical social engineering attacks aim at stealing the digital identities of people.  This can ruin their credit and ability to purchase things, as well as reputations when it comes to employment.  [http://www.ftc.gov/bcp/edu/microsites/idtheft/ Here] are some tips from the FTC on safeguarding your information.  You should never give out information unless you are certain of the source.  You should also limit the amount of information you allow organizations to have.  They are also prone to hacking and social engineering threats that could steal your identity.&lt;br /&gt;
&lt;br /&gt;
* If security precautions are note made against social engineering, a skilled hacker could forge his way into nearly any system.  It is said that the famous social engineering, [http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick], would be able to set off nuclear missiles from his phone using social engineering tactics.  It is important that organizations and individuals be aware of the threat of social engineering.  Do not take everything at face value.&lt;br /&gt;
&lt;br /&gt;
* Social engineering attacks are not just made through electronics means.  Social engineering tricks play on the fallacy of a human and their associated emotions.  It is important for an individual to be aware of the threats and tactics of social engineering.  Social engineers typically target gullible members of a company to obtain small bits of information and work their way up, gaining more information.  If you are alert to these threads, you are better defender against both your identity, your employer, as well as your clients.&lt;br /&gt;
&lt;br /&gt;
* The act of social engineering is very vague.  It is sometime very hard to tell when you are being tricked by a fraudulent act.  It is necessary that employees in control of sensitive information should go through rigorous training to sense when they are being tricked.&lt;br /&gt;
&lt;br /&gt;
'''2. Security Precautions Are Not Easy'''&lt;br /&gt;
&lt;br /&gt;
* Since social engineering does not necessarily require any special technical skill set, like hacking, it is open to many types of attackers that are adept at fooling an individual.  &lt;br /&gt;
&lt;br /&gt;
* It is hard to devise structured policies to defend against the leak of confidential information through the means of social engineering.&lt;br /&gt;
&lt;br /&gt;
3. Ethical Responsibilities&lt;br /&gt;
&lt;br /&gt;
5. Some Security Products That Could Help You&lt;br /&gt;
&lt;br /&gt;
==Useful Resources==&lt;br /&gt;
&lt;br /&gt;
Definitions and Descriptions of Social Engineering:&lt;br /&gt;
&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/risks/security/precautions/ Security Precautions (Old Project Page)]&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Social_engineering_%28security%29 Social Engineering (Wikipedia)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.securityfocus.com/infocus/1527 Social Engineering Fundamentals]&lt;br /&gt;
&lt;br /&gt;
* [http://searchfinancialsecurity.techtarget.com/tip/0,289483,sid185_gci1294530,00.html Social Engineering Attacks]&lt;br /&gt;
&lt;br /&gt;
* [http://news.cnet.com/8301-1009_3-9995253-83.html Social Engineering: Hackers show how it is done]&lt;br /&gt;
&lt;br /&gt;
Defense and Tips against Social Engineering Attacks:&lt;br /&gt;
&lt;br /&gt;
* [http://www.sans.org/reading_room/whitepapers/engineering/511.php Proactive Defense to Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://www.morehouse.org/hin/blckcrwl/hack/soceng.txt Social Engineering FAQ]&lt;br /&gt;
&lt;br /&gt;
* [http://www.hackinthebox.org/modules.php?op=modload&amp;amp;name=News&amp;amp;file=article&amp;amp;sid=15170&amp;amp;mode=thread&amp;amp;order=0&amp;amp;thold=0 Social Engineering Defense 101]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cioupdate.com/trends/article.php/3638951 Best Defense Against Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://techrepublic.com.com/5208-6230-0.html?forumID=102&amp;amp;threadID=232696 Social Engineering Self-defense]&lt;br /&gt;
&lt;br /&gt;
* [http://www.infosecwriters.com/text_resources/pdf/Social_Engineering_CRhodes.pdf Safeguarding Against Social Engineering]&lt;/div&gt;</summary>
		<author><name>Cjsoques</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=15577</id>
		<title>Social Engineering</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=15577"/>
		<updated>2008-07-25T14:50:14Z</updated>

		<summary type="html">&lt;p&gt;Cjsoques: /* Study Guide */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Social engineering a method of fraud and hacking that utilizes the humanity and nature of people to retrieve information from them voluntarily.  By playing into the nature of the person, hacking through technological means is sometimes not necessary.  If one can fool a person into giving away information voluntarily, then creating a program or hack to retrieve that information involuntarily is no required.  Furthermore, it can be much simpler and efficient to get information from someone through social engineering than it would ever be to steal that information via a computer program or password cracker.  &lt;br /&gt;
&lt;br /&gt;
This form of forcing users to disclose information must be done through some human means.  The point of social engineering is to utilize the fallacies of human logic and biases to trick the target into revealing confidential information through various methods and tactics.&lt;br /&gt;
&lt;br /&gt;
The precautions necessary against social engineering are required to be very proactive.  For example, you can put an anti virus program that will passively scan your computer for viruses automatically. However, the human must be actively on the defense for social engineering tricks and tactics that may be used against them.  Over the years, general guidelines for companies and employees have been developed to give the knowledge necessary to be vigilant and alert for social engineering fraud attempts.&lt;br /&gt;
&lt;br /&gt;
==Tactics and Methods==&lt;br /&gt;
There are various means of utilizing social engineering to obtain confidential and secret information such as passwords and private data.  All of these methods work through some medium in which the attacker has to actually converse with the victim in some way, whether directly or indirectly.  In all methods, feedback from the victim is required.  This feedback is usually the necessary information the attacker was looking for.&lt;br /&gt;
&lt;br /&gt;
Although social engineering tactics are heavily performed through electronic and computer mediums.  There are many methods in which social engineering can be done through the physical realm.  As long as there can be some form of communication between the attacker and the victim any medium may be used.  Social engineering is so successful because it takes advantage of the fallacies of the human being.  Whether by means of flattery, impersonation, and greed; social engineering is considered to some an art form of psychology.&lt;br /&gt;
&lt;br /&gt;
Social Engineering can be extremely simple to perform, but have dire effects and consequences.  There are even [http://news.cnet.com/8301-1009_3-9995253-83.html guides and tips] on how hackers have used social engineering in extremely simple ways.  Social engineering is considered so dangerous that [http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick], a renouned hacker and early user of social enginering, was considered the most dangerous hacker.  By using social engineering, the FBI though that Mitnick could start a nuclear war by simply utilizing social engineering.  &lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
The main way of retrieving electronic information from victim voluntarily is through [http://en.wikipedia.org/wiki/Phishing phishing].  Phishing, like social engineering, can be performed over various electronic and physical mediums.  In a general term, phishing is pretending to be something legitimate, when you are not.  When you fool the victim into thinking you are the legitimate source that is being faked, they will reveal all the information that would normally be required to use that source.  This may include account numbers, usernames, passwords, or even Social Security Numbers.&lt;br /&gt;
&lt;br /&gt;
A major medium of phishing is through e-mail.  The example of a bank and customer is extremely common.  The attacker will send the victim an e-mail notifying them of some required account information to be updated.  This e-mail will look exactly like the standard e-mail the victim may have received from the bank before.  The victim will be required to login and update their information as soon as possible.  However, the link will not be sent to the bank website, but to a separate server that was setup by the attacker to retrieve the information.  This website, like the e-mail, will look exactly like the actual bank website.  Once the person types their login information, the attacker then has all the information they needed from the victim.  &lt;br /&gt;
&lt;br /&gt;
Although uncommon, phishing may also be performed over the phone by pretending to be a representative of some company that is requesting some kind of account information.  The attacker may even know some basic information about the victim to prove that they are legitimate.  Usually, a victim will not question the call and will provide the necessary information.  The attacker can then use this information to take advantage of the victim by means of identity or property theft.&lt;br /&gt;
&lt;br /&gt;
===Pretexting===&lt;br /&gt;
[http://www.ftc.gov/bcp/conline/pubs/credit/pretext.shtm Pretexting] is a form of using information about the victim to obtain even more information or to use it against the victim.  Through pretexting the attacker uses the limited information gained to obtain more information.  Once enough information is gained.  The attacker may use credit pretending to be the victim, to make purchases acting as the victim, or to manipulate the records of the victim.&lt;br /&gt;
&lt;br /&gt;
The goal of pretexting is to prove to someone that you are legitimately the victim.  This may be done from proving that you know their name, address, phone number, and Social Security Number.  This could also be done by knowing the victim's username and password that was retrieved through phishing.&lt;br /&gt;
&lt;br /&gt;
===Trojan Horse===&lt;br /&gt;
A [http://www.tech-faq.com/trojan-horse-virus.shtml Trojan Horse] a technological form of social engineering.  Not only does it fool the victim that it is from a legitimate source, but it also fools the computer the victim is using.  A trojan horse is a program that may seem to perform a legitimate action, but in fact is collecting sensitive information or stealing data in the background.  This is, of coruse, derived from the ancient tactic used by the Spartans to invade Troy by pretending to be a gift to the Trojans (which is an ancient example of social engineering).&lt;br /&gt;
&lt;br /&gt;
To be specific, a ''gimme'' is a type of Trojan Horse that plays off of Social Engineering.  This tactic goes in conjunction with spamming or phishing.  The user will receive a pop-up ad or e-mail ad notifying the victim of some software that would benefit them.  Because of their curiosity and the seeming innocence of the program, the victim will install it on their machine.  The software may even perform as advertised, but in the background is obtaining account information and other confidential data.&lt;br /&gt;
&lt;br /&gt;
This is where a computer program pretends to be something it is not.  Instead of an actual human being performing the pretexting, it is an automated computer program.&lt;br /&gt;
&lt;br /&gt;
==Security, Precautions, and Defenses==&lt;br /&gt;
There are many precautions and defenses against social engineering.  However, there is a lack of education on the methods to defend against this tactic.  Various methods include vigorous identity verification, minimizing the amount of people that have sensitive information, as well as reducing the trust level of those in control of information.  Many companies have developed security policies and guidelines that employees should follow to minimize the risk of social engineering exploits.&lt;br /&gt;
&lt;br /&gt;
===Proactive Social Defenses===&lt;br /&gt;
SANS Network Security has a good example of a [http://www.sans.org/reading_room/whitepapers/engineering/511.php brief guide] for employees to maintain a proactive awareness against social engineering.  Through proactive self defense a company should develop a detailed policy on security and data release.  These policy should detailed who is able to release information, what information, and to who that information may be released to. &lt;br /&gt;
&lt;br /&gt;
There should be detailed access approval to any secured area or information.  A company should setup a defense against social engineering by always having a detailed access approval process instead of simply not challenging the requester of information. The company should have a designated help desk and support center that is knowledgeable in the policies of data release.  Information such as employee IDs, account information, and passwords should always be challenged with a detailed approval policy.&lt;br /&gt;
&lt;br /&gt;
By detailing who is allowed to release information and what information can be released, a company can minimize the amount of violations through social-engineering.  Usually social engineering succeeds because there is no preset guideline for giving out information for rare instances that social engineers exploit.&lt;br /&gt;
&lt;br /&gt;
===Employee Training===&lt;br /&gt;
Since the human being is the reason for social engineering exploits, the employee is the number one defense against attacks.  By [http://techrepublic.com.com/5208-6230-0.html?forumID=102&amp;amp;threadID=232696 training the employees through examples], they gain an understanding of how easy it is for social engineering to work.  By training to employees to reduce their trust value and not take request for information at face value, it will discourage the attacker to request any further information.  If in doubt, the employee should never give out confidential information and bring it to the next person in command.&lt;br /&gt;
&lt;br /&gt;
===Security Software and Electronics===&lt;br /&gt;
Since the goal of social engineering exploits are to bypass technological and security barriers, there are few ways to stop social engineering through electronic and software means.  One main way to combat and reduce the risk is to have, in place, strict identity verification technologies that combat counterfeit and impersonation attacks.  Social engineering attacks are so easy because it is so easy to appear legitimate.  If identify verification were scrutinized at both a human and electronic level, the legitimacy of identity would be much harder to prove.&lt;br /&gt;
&lt;br /&gt;
In addition, companies can install [http://ca.com/us/securityadvisor/documents/collateral.aspx?cid=157506 software] that will reduce the amount of social engineering solicitations that employees receive through e-mail and websites.  By filtering out known threatening sources, this software can prevent the employee from even having to worry about making the decision of whether the source is legitimate.&lt;br /&gt;
&lt;br /&gt;
==Legal and Ethical Concerns==&lt;br /&gt;
In the United States, there are laws against pretexting and falsifying identity.  The [http://en.wikipedia.org/wiki/Gramm-Leach-Bliley_Act Gramm-Leach-Billey Act (GLBA)] makes it illegal to do the following&lt;br /&gt;
&lt;br /&gt;
* To falsify information or make false statements to retrieve information from a financial institution or even a customer of that institution&lt;br /&gt;
&lt;br /&gt;
* To use forged or stolen documents to receive information from a financial institution or a customer of that institution&lt;br /&gt;
&lt;br /&gt;
* Ask another person to obtain information by using the above two means&lt;br /&gt;
&lt;br /&gt;
In addition, the [http://en.wikipedia.org/wiki/Federal_Trade_Commission_Act Federal Trade Commission Act] prohibits pretexting for customer information.&lt;br /&gt;
&lt;br /&gt;
&amp;gt;&amp;gt; NEED ETHICAL CONCERNS &amp;lt;&amp;lt;&lt;br /&gt;
&lt;br /&gt;
==Study Guide==&lt;br /&gt;
This study guide relates to security precautions against Social Engineering.  For the main Security Precautions study guide, go [http://ethics.csc.ncsu.edu/risks/security/precautions/study.php here].&lt;br /&gt;
&lt;br /&gt;
1. Why Are Security Precautions Necessary to Safeguard Against Social Engineering?&lt;br /&gt;
&lt;br /&gt;
* In the United States, identity, both personal and financial, are held digitally.  Typical social engineering attacks aim at stealing the digital identities of people.  This can ruin their credit and ability to purchase things, as well as reputations when it comes to employment.  [http://www.ftc.gov/bcp/edu/microsites/idtheft/ Here] are some tips from the FTC on safeguarding your information.  You should never give out information unless you are certain of the source.  You should also limit the amount of information you allow organizations to have.  They are also prone to hacking and social engineering threats that could steal your identity.&lt;br /&gt;
&lt;br /&gt;
* If security precautions are note made against social engineering, a skilled hacker could forge his way into nearly any system.  It is said that the famous social engineering, [http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick], would be able to set off nuclear missiles from his phone using social engineering tactics.  It is important that organizations and individuals be aware of the threat of social engineering.  Do not take everything at face value.&lt;br /&gt;
&lt;br /&gt;
* Social engineering attacks are not just made through electronics means.  Social engineering tricks play on the fallacy of a human and their associated emotions.  It is important for an individual to be aware of the threats and tactics of social engineering.  Social engineers typically target gullible members of a company to obtain small bits of information and work their way up, gaining more information.  If you are alert to these threads, you are better defender against both your identity, your employer, as well as your clients.&lt;br /&gt;
&lt;br /&gt;
* The act of social engineering is very vague.  It is sometime very hard to tell when you are being tricked by a fraudulent act.  It is necessary that employees in control of sensitive information should go through rigorous training to sense when they are being tricked.&lt;br /&gt;
&lt;br /&gt;
2. Security Precautions Are Not Easy&lt;br /&gt;
&lt;br /&gt;
* Since social engineering does not necessarily require any special technical skill set, like hacking, it is open to many types of attackers that are adept at fooling an individual.  &lt;br /&gt;
&lt;br /&gt;
* It is hard to devise structured policies to defend against the leak of confidential information through the means of social engineering.&lt;br /&gt;
&lt;br /&gt;
3. Ethical Responsibilities&lt;br /&gt;
&lt;br /&gt;
5. Some Security Products That Could Help You&lt;br /&gt;
&lt;br /&gt;
==Useful Resources==&lt;br /&gt;
&lt;br /&gt;
Definitions and Descriptions of Social Engineering:&lt;br /&gt;
&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/risks/security/precautions/ Security Precautions (Old Project Page)]&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Social_engineering_%28security%29 Social Engineering (Wikipedia)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.securityfocus.com/infocus/1527 Social Engineering Fundamentals]&lt;br /&gt;
&lt;br /&gt;
* [http://searchfinancialsecurity.techtarget.com/tip/0,289483,sid185_gci1294530,00.html Social Engineering Attacks]&lt;br /&gt;
&lt;br /&gt;
* [http://news.cnet.com/8301-1009_3-9995253-83.html Social Engineering: Hackers show how it is done]&lt;br /&gt;
&lt;br /&gt;
Defense and Tips against Social Engineering Attacks:&lt;br /&gt;
&lt;br /&gt;
* [http://www.sans.org/reading_room/whitepapers/engineering/511.php Proactive Defense to Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://www.morehouse.org/hin/blckcrwl/hack/soceng.txt Social Engineering FAQ]&lt;br /&gt;
&lt;br /&gt;
* [http://www.hackinthebox.org/modules.php?op=modload&amp;amp;name=News&amp;amp;file=article&amp;amp;sid=15170&amp;amp;mode=thread&amp;amp;order=0&amp;amp;thold=0 Social Engineering Defense 101]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cioupdate.com/trends/article.php/3638951 Best Defense Against Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://techrepublic.com.com/5208-6230-0.html?forumID=102&amp;amp;threadID=232696 Social Engineering Self-defense]&lt;br /&gt;
&lt;br /&gt;
* [http://www.infosecwriters.com/text_resources/pdf/Social_Engineering_CRhodes.pdf Safeguarding Against Social Engineering]&lt;/div&gt;</summary>
		<author><name>Cjsoques</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=15576</id>
		<title>Social Engineering</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=15576"/>
		<updated>2008-07-25T14:37:19Z</updated>

		<summary type="html">&lt;p&gt;Cjsoques: /* External Links */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Social engineering a method of fraud and hacking that utilizes the humanity and nature of people to retrieve information from them voluntarily.  By playing into the nature of the person, hacking through technological means is sometimes not necessary.  If one can fool a person into giving away information voluntarily, then creating a program or hack to retrieve that information involuntarily is no required.  Furthermore, it can be much simpler and efficient to get information from someone through social engineering than it would ever be to steal that information via a computer program or password cracker.  &lt;br /&gt;
&lt;br /&gt;
This form of forcing users to disclose information must be done through some human means.  The point of social engineering is to utilize the fallacies of human logic and biases to trick the target into revealing confidential information through various methods and tactics.&lt;br /&gt;
&lt;br /&gt;
The precautions necessary against social engineering are required to be very proactive.  For example, you can put an anti virus program that will passively scan your computer for viruses automatically. However, the human must be actively on the defense for social engineering tricks and tactics that may be used against them.  Over the years, general guidelines for companies and employees have been developed to give the knowledge necessary to be vigilant and alert for social engineering fraud attempts.&lt;br /&gt;
&lt;br /&gt;
==Tactics and Methods==&lt;br /&gt;
There are various means of utilizing social engineering to obtain confidential and secret information such as passwords and private data.  All of these methods work through some medium in which the attacker has to actually converse with the victim in some way, whether directly or indirectly.  In all methods, feedback from the victim is required.  This feedback is usually the necessary information the attacker was looking for.&lt;br /&gt;
&lt;br /&gt;
Although social engineering tactics are heavily performed through electronic and computer mediums.  There are many methods in which social engineering can be done through the physical realm.  As long as there can be some form of communication between the attacker and the victim any medium may be used.  Social engineering is so successful because it takes advantage of the fallacies of the human being.  Whether by means of flattery, impersonation, and greed; social engineering is considered to some an art form of psychology.&lt;br /&gt;
&lt;br /&gt;
Social Engineering can be extremely simple to perform, but have dire effects and consequences.  There are even [http://news.cnet.com/8301-1009_3-9995253-83.html guides and tips] on how hackers have used social engineering in extremely simple ways.  Social engineering is considered so dangerous that [http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick], a renouned hacker and early user of social enginering, was considered the most dangerous hacker.  By using social engineering, the FBI though that Mitnick could start a nuclear war by simply utilizing social engineering.  &lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
The main way of retrieving electronic information from victim voluntarily is through [http://en.wikipedia.org/wiki/Phishing phishing].  Phishing, like social engineering, can be performed over various electronic and physical mediums.  In a general term, phishing is pretending to be something legitimate, when you are not.  When you fool the victim into thinking you are the legitimate source that is being faked, they will reveal all the information that would normally be required to use that source.  This may include account numbers, usernames, passwords, or even Social Security Numbers.&lt;br /&gt;
&lt;br /&gt;
A major medium of phishing is through e-mail.  The example of a bank and customer is extremely common.  The attacker will send the victim an e-mail notifying them of some required account information to be updated.  This e-mail will look exactly like the standard e-mail the victim may have received from the bank before.  The victim will be required to login and update their information as soon as possible.  However, the link will not be sent to the bank website, but to a separate server that was setup by the attacker to retrieve the information.  This website, like the e-mail, will look exactly like the actual bank website.  Once the person types their login information, the attacker then has all the information they needed from the victim.  &lt;br /&gt;
&lt;br /&gt;
Although uncommon, phishing may also be performed over the phone by pretending to be a representative of some company that is requesting some kind of account information.  The attacker may even know some basic information about the victim to prove that they are legitimate.  Usually, a victim will not question the call and will provide the necessary information.  The attacker can then use this information to take advantage of the victim by means of identity or property theft.&lt;br /&gt;
&lt;br /&gt;
===Pretexting===&lt;br /&gt;
[http://www.ftc.gov/bcp/conline/pubs/credit/pretext.shtm Pretexting] is a form of using information about the victim to obtain even more information or to use it against the victim.  Through pretexting the attacker uses the limited information gained to obtain more information.  Once enough information is gained.  The attacker may use credit pretending to be the victim, to make purchases acting as the victim, or to manipulate the records of the victim.&lt;br /&gt;
&lt;br /&gt;
The goal of pretexting is to prove to someone that you are legitimately the victim.  This may be done from proving that you know their name, address, phone number, and Social Security Number.  This could also be done by knowing the victim's username and password that was retrieved through phishing.&lt;br /&gt;
&lt;br /&gt;
===Trojan Horse===&lt;br /&gt;
A [http://www.tech-faq.com/trojan-horse-virus.shtml Trojan Horse] a technological form of social engineering.  Not only does it fool the victim that it is from a legitimate source, but it also fools the computer the victim is using.  A trojan horse is a program that may seem to perform a legitimate action, but in fact is collecting sensitive information or stealing data in the background.  This is, of coruse, derived from the ancient tactic used by the Spartans to invade Troy by pretending to be a gift to the Trojans (which is an ancient example of social engineering).&lt;br /&gt;
&lt;br /&gt;
To be specific, a ''gimme'' is a type of Trojan Horse that plays off of Social Engineering.  This tactic goes in conjunction with spamming or phishing.  The user will receive a pop-up ad or e-mail ad notifying the victim of some software that would benefit them.  Because of their curiosity and the seeming innocence of the program, the victim will install it on their machine.  The software may even perform as advertised, but in the background is obtaining account information and other confidential data.&lt;br /&gt;
&lt;br /&gt;
This is where a computer program pretends to be something it is not.  Instead of an actual human being performing the pretexting, it is an automated computer program.&lt;br /&gt;
&lt;br /&gt;
==Security, Precautions, and Defenses==&lt;br /&gt;
There are many precautions and defenses against social engineering.  However, there is a lack of education on the methods to defend against this tactic.  Various methods include vigorous identity verification, minimizing the amount of people that have sensitive information, as well as reducing the trust level of those in control of information.  Many companies have developed security policies and guidelines that employees should follow to minimize the risk of social engineering exploits.&lt;br /&gt;
&lt;br /&gt;
===Proactive Social Defenses===&lt;br /&gt;
SANS Network Security has a good example of a [http://www.sans.org/reading_room/whitepapers/engineering/511.php brief guide] for employees to maintain a proactive awareness against social engineering.  Through proactive self defense a company should develop a detailed policy on security and data release.  These policy should detailed who is able to release information, what information, and to who that information may be released to. &lt;br /&gt;
&lt;br /&gt;
There should be detailed access approval to any secured area or information.  A company should setup a defense against social engineering by always having a detailed access approval process instead of simply not challenging the requester of information. The company should have a designated help desk and support center that is knowledgeable in the policies of data release.  Information such as employee IDs, account information, and passwords should always be challenged with a detailed approval policy.&lt;br /&gt;
&lt;br /&gt;
By detailing who is allowed to release information and what information can be released, a company can minimize the amount of violations through social-engineering.  Usually social engineering succeeds because there is no preset guideline for giving out information for rare instances that social engineers exploit.&lt;br /&gt;
&lt;br /&gt;
===Employee Training===&lt;br /&gt;
Since the human being is the reason for social engineering exploits, the employee is the number one defense against attacks.  By [http://techrepublic.com.com/5208-6230-0.html?forumID=102&amp;amp;threadID=232696 training the employees through examples], they gain an understanding of how easy it is for social engineering to work.  By training to employees to reduce their trust value and not take request for information at face value, it will discourage the attacker to request any further information.  If in doubt, the employee should never give out confidential information and bring it to the next person in command.&lt;br /&gt;
&lt;br /&gt;
===Security Software and Electronics===&lt;br /&gt;
Since the goal of social engineering exploits are to bypass technological and security barriers, there are few ways to stop social engineering through electronic and software means.  One main way to combat and reduce the risk is to have, in place, strict identity verification technologies that combat counterfeit and impersonation attacks.  Social engineering attacks are so easy because it is so easy to appear legitimate.  If identify verification were scrutinized at both a human and electronic level, the legitimacy of identity would be much harder to prove.&lt;br /&gt;
&lt;br /&gt;
In addition, companies can install [http://ca.com/us/securityadvisor/documents/collateral.aspx?cid=157506 software] that will reduce the amount of social engineering solicitations that employees receive through e-mail and websites.  By filtering out known threatening sources, this software can prevent the employee from even having to worry about making the decision of whether the source is legitimate.&lt;br /&gt;
&lt;br /&gt;
==Legal and Ethical Concerns==&lt;br /&gt;
In the United States, there are laws against pretexting and falsifying identity.  The [http://en.wikipedia.org/wiki/Gramm-Leach-Bliley_Act Gramm-Leach-Billey Act (GLBA)] makes it illegal to do the following&lt;br /&gt;
&lt;br /&gt;
* To falsify information or make false statements to retrieve information from a financial institution or even a customer of that institution&lt;br /&gt;
&lt;br /&gt;
* To use forged or stolen documents to receive information from a financial institution or a customer of that institution&lt;br /&gt;
&lt;br /&gt;
* Ask another person to obtain information by using the above two means&lt;br /&gt;
&lt;br /&gt;
In addition, the [http://en.wikipedia.org/wiki/Federal_Trade_Commission_Act Federal Trade Commission Act] prohibits pretexting for customer information.&lt;br /&gt;
&lt;br /&gt;
&amp;gt;&amp;gt; NEED ETHICAL CONCERNS &amp;lt;&amp;lt;&lt;br /&gt;
&lt;br /&gt;
==Study Guide==&lt;br /&gt;
This study guide relates to security precautions against Social Engineering.  For the main Security Precautions study guide, go [http://ethics.csc.ncsu.edu/risks/security/precautions/study.php here].&lt;br /&gt;
&lt;br /&gt;
1. Why Are Security Precautions Necessary?&lt;br /&gt;
&lt;br /&gt;
2. Security Precautions Are Not Easy&lt;br /&gt;
&lt;br /&gt;
3. Ethical Responsibilities&lt;br /&gt;
&lt;br /&gt;
5. Some Security Products That Could Help You&lt;br /&gt;
&lt;br /&gt;
==Useful Resources==&lt;br /&gt;
&lt;br /&gt;
Definitions and Descriptions of Social Engineering:&lt;br /&gt;
&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/risks/security/precautions/ Security Precautions (Old Project Page)]&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Social_engineering_%28security%29 Social Engineering (Wikipedia)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.securityfocus.com/infocus/1527 Social Engineering Fundamentals]&lt;br /&gt;
&lt;br /&gt;
* [http://searchfinancialsecurity.techtarget.com/tip/0,289483,sid185_gci1294530,00.html Social Engineering Attacks]&lt;br /&gt;
&lt;br /&gt;
* [http://news.cnet.com/8301-1009_3-9995253-83.html Social Engineering: Hackers show how it is done]&lt;br /&gt;
&lt;br /&gt;
Defense and Tips against Social Engineering Attacks:&lt;br /&gt;
&lt;br /&gt;
* [http://www.sans.org/reading_room/whitepapers/engineering/511.php Proactive Defense to Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://www.morehouse.org/hin/blckcrwl/hack/soceng.txt Social Engineering FAQ]&lt;br /&gt;
&lt;br /&gt;
* [http://www.hackinthebox.org/modules.php?op=modload&amp;amp;name=News&amp;amp;file=article&amp;amp;sid=15170&amp;amp;mode=thread&amp;amp;order=0&amp;amp;thold=0 Social Engineering Defense 101]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cioupdate.com/trends/article.php/3638951 Best Defense Against Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://techrepublic.com.com/5208-6230-0.html?forumID=102&amp;amp;threadID=232696 Social Engineering Self-defense]&lt;br /&gt;
&lt;br /&gt;
* [http://www.infosecwriters.com/text_resources/pdf/Social_Engineering_CRhodes.pdf Safeguarding Against Social Engineering]&lt;/div&gt;</summary>
		<author><name>Cjsoques</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_3,_Group_3&amp;diff=15532</id>
		<title>CSC 379 SUM2008:Week 3, Group 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_3,_Group_3&amp;diff=15532"/>
		<updated>2008-07-25T08:50:16Z</updated>

		<summary type="html">&lt;p&gt;Cjsoques: /* Password History Restriction */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Costs and Benefits Password Regulations ==&lt;br /&gt;
“Best practices” sometimes seem to take on a life of their own, independent of any recent assessment of their costs and benefits.  An example is password policies; maximum length, restrictions on characters that can be used, and password-change frequency.  Evaluate these popular password regulations.  Do they provide adequate benefits for costs incurred?  What ethical considerations do poorly evaluated “best practices” raise?  Do policy-makers have an ethical responsibility to evaluate “best practices” before adopted?  A responsibility to re-evaluate existing practices?&lt;br /&gt;
&lt;br /&gt;
Cite specific evidence in your cost/benefit analysis from quality sources (professional/academic journals preferred).&lt;br /&gt;
&lt;br /&gt;
* [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1013839 http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1013839]&lt;br /&gt;
* [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1588836 http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1588836]&lt;br /&gt;
* [http://portal.acm.org/citation.cfm?id=322796.322806 http://portal.acm.org/citation.cfm?id=322796.322806]&lt;br /&gt;
* [http://portal.acm.org/citation.cfm?id=581370 http://portal.acm.org/citation.cfm?id=581370]&lt;br /&gt;
* [http://portal.acm.org/citation.cfm?id=986664 http://portal.acm.org/citation.cfm?id=986664]&lt;br /&gt;
&lt;br /&gt;
==&amp;quot;Best Practices&amp;quot; Research==&lt;br /&gt;
&lt;br /&gt;
==Policies==&lt;br /&gt;
&lt;br /&gt;
===Password Length===&lt;br /&gt;
&lt;br /&gt;
===Character Restriction===&lt;br /&gt;
&lt;br /&gt;
===Password Change Frequency===&lt;br /&gt;
Policies for major corporations usually require that employees change their password after a certain period of time.  Typically, this time frame may be from 90 days to 6 months.  The requirement to change your password at certain time intervals limits the amount of time a hacker has to break your current password.  In addition, if a hacker has retrieved your password, they only have a limited amount of time to access it before your password is changed.  The later reason can be considered quite useless as it only takes a hacker minutes or, at the most, hours to retrieve the information they are looking for.&lt;br /&gt;
&lt;br /&gt;
A major downside to the policy of requiring changing a password after a certain amount of time is the fact that most users will simply change it to the old address anyway, thus nullifying any benefit that could be gained from changing you password frequently.  There are few studies on whether changing your password after a certain amount of time has actually increased security.  Also, employees do not want to waste time changing their password frequently and must be reminded.  This requires unnecessary resources devoted to a practice that the user probably won't follow anyhow.&lt;br /&gt;
&lt;br /&gt;
There was no easily available evidence that any benefit has been gained from adopting this policy.&lt;br /&gt;
&lt;br /&gt;
===Password History Restriction===&lt;br /&gt;
Some companies have begun to adopt what are called password history restrictions.  With this policy, when a user is required to change their password after a certain amount of time; they are constricted from using a certain number of previous passwords.  Typically, this may range from just one previous password, all the way to five.  The goal of this policy is to prevent the use of the same password over and over that hackers have been trying to brute force hack.  If a user is required to change their password over time intervals, there is no incentive for security improvements if the user just keeps putting down the same password.&lt;br /&gt;
&lt;br /&gt;
A major downfall of this policy is that the more previous passwords the user can not use, the more inclined the user is to simply write that password down.  Trying to remember what one to five passwords a user used for even just one account is overly tedious to the user and waste company resources for the user to keep track of making and remembering an updated password.  &lt;br /&gt;
&lt;br /&gt;
There are no easily available research to prove that there are any real security benefits from adopting this policy.  In addition, there is also no research to prove how much users will write down passwords and to what password history restriction limit would drive them to write down passwords.&lt;br /&gt;
&lt;br /&gt;
==Password Retrieval==&lt;br /&gt;
&lt;br /&gt;
==Alternate Security Measures==&lt;br /&gt;
&lt;br /&gt;
==Ethical Concerns==&lt;br /&gt;
&lt;br /&gt;
==Links==&lt;/div&gt;</summary>
		<author><name>Cjsoques</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_3,_Group_3&amp;diff=15531</id>
		<title>CSC 379 SUM2008:Week 3, Group 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_3,_Group_3&amp;diff=15531"/>
		<updated>2008-07-25T08:42:20Z</updated>

		<summary type="html">&lt;p&gt;Cjsoques: /* Password Change Frequency */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Costs and Benefits Password Regulations ==&lt;br /&gt;
“Best practices” sometimes seem to take on a life of their own, independent of any recent assessment of their costs and benefits.  An example is password policies; maximum length, restrictions on characters that can be used, and password-change frequency.  Evaluate these popular password regulations.  Do they provide adequate benefits for costs incurred?  What ethical considerations do poorly evaluated “best practices” raise?  Do policy-makers have an ethical responsibility to evaluate “best practices” before adopted?  A responsibility to re-evaluate existing practices?&lt;br /&gt;
&lt;br /&gt;
Cite specific evidence in your cost/benefit analysis from quality sources (professional/academic journals preferred).&lt;br /&gt;
&lt;br /&gt;
* [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1013839 http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1013839]&lt;br /&gt;
* [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1588836 http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1588836]&lt;br /&gt;
* [http://portal.acm.org/citation.cfm?id=322796.322806 http://portal.acm.org/citation.cfm?id=322796.322806]&lt;br /&gt;
* [http://portal.acm.org/citation.cfm?id=581370 http://portal.acm.org/citation.cfm?id=581370]&lt;br /&gt;
* [http://portal.acm.org/citation.cfm?id=986664 http://portal.acm.org/citation.cfm?id=986664]&lt;br /&gt;
&lt;br /&gt;
==&amp;quot;Best Practices&amp;quot; Research==&lt;br /&gt;
&lt;br /&gt;
==Policies==&lt;br /&gt;
&lt;br /&gt;
===Password Length===&lt;br /&gt;
&lt;br /&gt;
===Character Restriction===&lt;br /&gt;
&lt;br /&gt;
===Password Change Frequency===&lt;br /&gt;
Policies for major corporations usually require that employees change their password after a certain period of time.  Typically, this time frame may be from 90 days to 6 months.  The requirement to change your password at certain time intervals limits the amount of time a hacker has to break your current password.  In addition, if a hacker has retrieved your password, they only have a limited amount of time to access it before your password is changed.  The later reason can be considered quite useless as it only takes a hacker minutes or, at the most, hours to retrieve the information they are looking for.&lt;br /&gt;
&lt;br /&gt;
A major downside to the policy of requiring changing a password after a certain amount of time is the fact that most users will simply change it to the old address anyway, thus nullifying any benefit that could be gained from changing you password frequently.  There are few studies on whether changing your password after a certain amount of time has actually increased security.  Also, employees do not want to waste time changing their password frequently and must be reminded.  This requires unnecessary resources devoted to a practice that the user probably won't follow anyhow.&lt;br /&gt;
&lt;br /&gt;
There was no easily available evidence that any benefit has been gained from adopting this policy.&lt;br /&gt;
&lt;br /&gt;
===Password History Restriction===&lt;br /&gt;
&lt;br /&gt;
==Password Retrieval==&lt;br /&gt;
&lt;br /&gt;
==Alternate Security Measures==&lt;br /&gt;
&lt;br /&gt;
==Ethical Concerns==&lt;br /&gt;
&lt;br /&gt;
==Links==&lt;/div&gt;</summary>
		<author><name>Cjsoques</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_3,_Group_3&amp;diff=15101</id>
		<title>CSC 379 SUM2008:Week 3, Group 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_3,_Group_3&amp;diff=15101"/>
		<updated>2008-07-23T22:29:06Z</updated>

		<summary type="html">&lt;p&gt;Cjsoques: /* Password Change Frequency */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Costs and Benefits Password Regulations ==&lt;br /&gt;
“Best practices” sometimes seem to take on a life of their own, independent of any recent assessment of their costs and benefits.  An example is password policies; maximum length, restrictions on characters that can be used, and password-change frequency.  Evaluate these popular password regulations.  Do they provide adequate benefits for costs incurred?  What ethical considerations do poorly evaluated “best practices” raise?  Do policy-makers have an ethical responsibility to evaluate “best practices” before adopted?  A responsibility to re-evaluate existing practices?&lt;br /&gt;
&lt;br /&gt;
Cite specific evidence in your cost/benefit analysis from quality sources (professional/academic journals preferred).&lt;br /&gt;
&lt;br /&gt;
* [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1013839 http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1013839]&lt;br /&gt;
* [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1588836 http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1588836]&lt;br /&gt;
* [http://portal.acm.org/citation.cfm?id=322796.322806 http://portal.acm.org/citation.cfm?id=322796.322806]&lt;br /&gt;
* [http://portal.acm.org/citation.cfm?id=581370 http://portal.acm.org/citation.cfm?id=581370]&lt;br /&gt;
* [http://portal.acm.org/citation.cfm?id=986664 http://portal.acm.org/citation.cfm?id=986664]&lt;br /&gt;
&lt;br /&gt;
==&amp;quot;Best Practices&amp;quot; Research==&lt;br /&gt;
&lt;br /&gt;
==Policies==&lt;br /&gt;
&lt;br /&gt;
===Password Length===&lt;br /&gt;
&lt;br /&gt;
===Character Restriction===&lt;br /&gt;
&lt;br /&gt;
===Password Change Frequency===&lt;br /&gt;
Policies for major corporations usually require that employees change their password after a certain period of time.  Typically, this time frame may be from 90 days to 6 months.  The requirement to change your password at certain time intervals limits the amount of time a hacker has to break your current password.  In addition, if a hacker has retrieved your password, they only have a limited amount of time to access it before your password is changed.  The later reason can be considered quite useless as it only takes a hacker minutes or, at the most, hours to retrieve the information they are looking for.&lt;br /&gt;
&lt;br /&gt;
===Password History Restriction===&lt;br /&gt;
&lt;br /&gt;
==Password Retrieval==&lt;br /&gt;
&lt;br /&gt;
==Other Security Measures==&lt;br /&gt;
&lt;br /&gt;
==Ethical Concerns==&lt;br /&gt;
&lt;br /&gt;
==Links==&lt;/div&gt;</summary>
		<author><name>Cjsoques</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_3,_Group_3&amp;diff=15097</id>
		<title>CSC 379 SUM2008:Week 3, Group 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_3,_Group_3&amp;diff=15097"/>
		<updated>2008-07-23T22:21:13Z</updated>

		<summary type="html">&lt;p&gt;Cjsoques: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Costs and Benefits Password Regulations ==&lt;br /&gt;
“Best practices” sometimes seem to take on a life of their own, independent of any recent assessment of their costs and benefits.  An example is password policies; maximum length, restrictions on characters that can be used, and password-change frequency.  Evaluate these popular password regulations.  Do they provide adequate benefits for costs incurred?  What ethical considerations do poorly evaluated “best practices” raise?  Do policy-makers have an ethical responsibility to evaluate “best practices” before adopted?  A responsibility to re-evaluate existing practices?&lt;br /&gt;
&lt;br /&gt;
Cite specific evidence in your cost/benefit analysis from quality sources (professional/academic journals preferred).&lt;br /&gt;
&lt;br /&gt;
* [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1013839 http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1013839]&lt;br /&gt;
* [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1588836 http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1588836]&lt;br /&gt;
* [http://portal.acm.org/citation.cfm?id=322796.322806 http://portal.acm.org/citation.cfm?id=322796.322806]&lt;br /&gt;
* [http://portal.acm.org/citation.cfm?id=581370 http://portal.acm.org/citation.cfm?id=581370]&lt;br /&gt;
* [http://portal.acm.org/citation.cfm?id=986664 http://portal.acm.org/citation.cfm?id=986664]&lt;br /&gt;
&lt;br /&gt;
==&amp;quot;Best Practices&amp;quot; Research==&lt;br /&gt;
&lt;br /&gt;
==Policies==&lt;br /&gt;
&lt;br /&gt;
===Password Length===&lt;br /&gt;
&lt;br /&gt;
===Character Restriction===&lt;br /&gt;
&lt;br /&gt;
===Password Change Frequency===&lt;br /&gt;
Policies for major corporations usually require that employees change their password after a certain period of time.  Typically, this time frame may be from 90 days to 6 months.  &lt;br /&gt;
&lt;br /&gt;
===Password History Restriction===&lt;br /&gt;
&lt;br /&gt;
==Password Retrieval==&lt;br /&gt;
&lt;br /&gt;
==Ethical Concerns==&lt;br /&gt;
&lt;br /&gt;
==Links==&lt;/div&gt;</summary>
		<author><name>Cjsoques</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_3,_Group_3&amp;diff=15095</id>
		<title>CSC 379 SUM2008:Week 3, Group 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_3,_Group_3&amp;diff=15095"/>
		<updated>2008-07-23T22:17:20Z</updated>

		<summary type="html">&lt;p&gt;Cjsoques: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Costs and Benefits Password Regulations ==&lt;br /&gt;
“Best practices” sometimes seem to take on a life of their own, independent of any recent assessment of their costs and benefits.  An example is password policies; maximum length, restrictions on characters that can be used, and password-change frequency.  Evaluate these popular password regulations.  Do they provide adequate benefits for costs incurred?  What ethical considerations do poorly evaluated “best practices” raise?  Do policy-makers have an ethical responsibility to evaluate “best practices” before adopted?  A responsibility to re-evaluate existing practices?&lt;br /&gt;
&lt;br /&gt;
Cite specific evidence in your cost/benefit analysis from quality sources (professional/academic journals preferred).&lt;br /&gt;
&lt;br /&gt;
* [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1013839 http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1013839]&lt;br /&gt;
* [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1588836 http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1588836]&lt;br /&gt;
* [http://portal.acm.org/citation.cfm?id=322796.322806 http://portal.acm.org/citation.cfm?id=322796.322806]&lt;br /&gt;
* [http://portal.acm.org/citation.cfm?id=581370 http://portal.acm.org/citation.cfm?id=581370]&lt;br /&gt;
* [http://portal.acm.org/citation.cfm?id=986664 http://portal.acm.org/citation.cfm?id=986664]&lt;br /&gt;
&lt;br /&gt;
==&amp;quot;Best Practices&amp;quot; Research==&lt;br /&gt;
&lt;br /&gt;
==Policies==&lt;br /&gt;
&lt;br /&gt;
===Password Length===&lt;br /&gt;
&lt;br /&gt;
===Character Restriction===&lt;br /&gt;
&lt;br /&gt;
===Password Change Frequency===&lt;br /&gt;
&lt;br /&gt;
===Password History Restriction===&lt;br /&gt;
&lt;br /&gt;
==Password Retrieval==&lt;br /&gt;
&lt;br /&gt;
==Ethical Concerns==&lt;br /&gt;
&lt;br /&gt;
==Links==&lt;/div&gt;</summary>
		<author><name>Cjsoques</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_3,_Group_3&amp;diff=15093</id>
		<title>CSC 379 SUM2008:Week 3, Group 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_3,_Group_3&amp;diff=15093"/>
		<updated>2008-07-23T22:14:51Z</updated>

		<summary type="html">&lt;p&gt;Cjsoques: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Costs and Benefits Password Regulations ==&lt;br /&gt;
“Best practices” sometimes seem to take on a life of their own, independent of any recent assessment of their costs and benefits.  An example is password policies; maximum length, restrictions on characters that can be used, and password-change frequency.  Evaluate these popular password regulations.  Do they provide adequate benefits for costs incurred?  What ethical considerations do poorly evaluated “best practices” raise?  Do policy-makers have an ethical responsibility to evaluate “best practices” before adopted?  A responsibility to re-evaluate existing practices?&lt;br /&gt;
&lt;br /&gt;
Cite specific evidence in your cost/benefit analysis from quality sources (professional/academic journals preferred).&lt;br /&gt;
&lt;br /&gt;
* [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1013839 http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1013839]&lt;br /&gt;
* [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1588836 http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1588836]&lt;br /&gt;
* [http://portal.acm.org/citation.cfm?id=322796.322806 http://portal.acm.org/citation.cfm?id=322796.322806]&lt;br /&gt;
* [http://portal.acm.org/citation.cfm?id=581370 http://portal.acm.org/citation.cfm?id=581370]&lt;br /&gt;
* [http://portal.acm.org/citation.cfm?id=986664 http://portal.acm.org/citation.cfm?id=986664]&lt;br /&gt;
&lt;br /&gt;
==&amp;quot;Best Practices&amp;quot; Research==&lt;br /&gt;
&lt;br /&gt;
==Policies==&lt;br /&gt;
&lt;br /&gt;
===Password Length===&lt;br /&gt;
&lt;br /&gt;
===Character Restriction===&lt;br /&gt;
&lt;br /&gt;
===Password Change Frequency===&lt;br /&gt;
&lt;br /&gt;
===Password History Restriction===&lt;br /&gt;
&lt;br /&gt;
==Ethical Concerns==&lt;br /&gt;
&lt;br /&gt;
==Links==&lt;/div&gt;</summary>
		<author><name>Cjsoques</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_3,_Group_3&amp;diff=15092</id>
		<title>CSC 379 SUM2008:Week 3, Group 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_3,_Group_3&amp;diff=15092"/>
		<updated>2008-07-23T22:14:35Z</updated>

		<summary type="html">&lt;p&gt;Cjsoques: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Costs and Benefits Password Regulations ==&lt;br /&gt;
“Best practices” sometimes seem to take on a life of their own, independent of any recent assessment of their costs and benefits.  An example is password policies; maximum length, restrictions on characters that can be used, and password-change frequency.  Evaluate these popular password regulations.  Do they provide adequate benefits for costs incurred?  What ethical considerations do poorly evaluated “best practices” raise?  Do policy-makers have an ethical responsibility to evaluate “best practices” before adopted?  A responsibility to re-evaluate existing practices?&lt;br /&gt;
&lt;br /&gt;
Cite specific evidence in your cost/benefit analysis from quality sources (professional/academic journals preferred).&lt;br /&gt;
&lt;br /&gt;
* [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1013839 http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1013839]&lt;br /&gt;
* [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1588836 http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1588836]&lt;br /&gt;
* [http://portal.acm.org/citation.cfm?id=322796.322806 http://portal.acm.org/citation.cfm?id=322796.322806]&lt;br /&gt;
* [http://portal.acm.org/citation.cfm?id=581370 http://portal.acm.org/citation.cfm?id=581370]&lt;br /&gt;
* [http://portal.acm.org/citation.cfm?id=986664 http://portal.acm.org/citation.cfm?id=986664]&lt;br /&gt;
&lt;br /&gt;
==&amp;quot;Best Practices&amp;quot; Research==&lt;br /&gt;
&lt;br /&gt;
==Policies==&lt;br /&gt;
&lt;br /&gt;
===Password Length===&lt;br /&gt;
&lt;br /&gt;
===Character Restriction===&lt;br /&gt;
&lt;br /&gt;
===Password Change Frequency===&lt;br /&gt;
&lt;br /&gt;
===Password History Restriction===&lt;br /&gt;
&lt;br /&gt;
==Ethical Concerns==&lt;/div&gt;</summary>
		<author><name>Cjsoques</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_3,_Group_3&amp;diff=15091</id>
		<title>CSC 379 SUM2008:Week 3, Group 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_3,_Group_3&amp;diff=15091"/>
		<updated>2008-07-23T22:13:59Z</updated>

		<summary type="html">&lt;p&gt;Cjsoques: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==&amp;quot;Best Practices&amp;quot; Research==&lt;br /&gt;
&lt;br /&gt;
==Policies==&lt;br /&gt;
&lt;br /&gt;
===Password Length===&lt;br /&gt;
&lt;br /&gt;
===Character Restriction===&lt;br /&gt;
&lt;br /&gt;
===Password Change Frequency===&lt;br /&gt;
&lt;br /&gt;
===Password History Restriction===&lt;br /&gt;
&lt;br /&gt;
==Ethical Concerns==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Costs and Benefits Password Regulations ==&lt;br /&gt;
“Best practices” sometimes seem to take on a life of their own, independent of any recent assessment of their costs and benefits.  An example is password policies; maximum length, restrictions on characters that can be used, and password-change frequency.  Evaluate these popular password regulations.  Do they provide adequate benefits for costs incurred?  What ethical considerations do poorly evaluated “best practices” raise?  Do policy-makers have an ethical responsibility to evaluate “best practices” before adopted?  A responsibility to re-evaluate existing practices?&lt;br /&gt;
&lt;br /&gt;
Cite specific evidence in your cost/benefit analysis from quality sources (professional/academic journals preferred).&lt;br /&gt;
&lt;br /&gt;
* [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1013839 http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1013839]&lt;br /&gt;
* [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1588836 http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1588836]&lt;br /&gt;
* [http://portal.acm.org/citation.cfm?id=322796.322806 http://portal.acm.org/citation.cfm?id=322796.322806]&lt;br /&gt;
* [http://portal.acm.org/citation.cfm?id=581370 http://portal.acm.org/citation.cfm?id=581370]&lt;br /&gt;
* [http://portal.acm.org/citation.cfm?id=986664 http://portal.acm.org/citation.cfm?id=986664]&lt;/div&gt;</summary>
		<author><name>Cjsoques</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_3,_Group_3&amp;diff=15089</id>
		<title>CSC 379 SUM2008:Week 3, Group 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_3,_Group_3&amp;diff=15089"/>
		<updated>2008-07-23T22:09:51Z</updated>

		<summary type="html">&lt;p&gt;Cjsoques: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Policies==&lt;br /&gt;
&lt;br /&gt;
==Cost and Benefits==&lt;br /&gt;
&lt;br /&gt;
== Costs and Benefits Password Regulations ==&lt;br /&gt;
“Best practices” sometimes seem to take on a life of their own, independent of any recent assessment of their costs and benefits.  An example is password policies; maximum length, restrictions on characters that can be used, and password-change frequency.  Evaluate these popular password regulations.  Do they provide adequate benefits for costs incurred?  What ethical considerations do poorly evaluated “best practices” raise?  Do policy-makers have an ethical responsibility to evaluate “best practices” before adopted?  A responsibility to re-evaluate existing practices?&lt;br /&gt;
&lt;br /&gt;
Cite specific evidence in your cost/benefit analysis from quality sources (professional/academic journals preferred).&lt;br /&gt;
&lt;br /&gt;
* [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1013839 http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1013839]&lt;br /&gt;
* [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1588836 http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1588836]&lt;br /&gt;
* [http://portal.acm.org/citation.cfm?id=322796.322806 http://portal.acm.org/citation.cfm?id=322796.322806]&lt;br /&gt;
* [http://portal.acm.org/citation.cfm?id=581370 http://portal.acm.org/citation.cfm?id=581370]&lt;br /&gt;
* [http://portal.acm.org/citation.cfm?id=986664 http://portal.acm.org/citation.cfm?id=986664]&lt;/div&gt;</summary>
		<author><name>Cjsoques</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_3,_Group_3&amp;diff=15084</id>
		<title>CSC 379 SUM2008:Week 3, Group 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379_SUM2008:Week_3,_Group_3&amp;diff=15084"/>
		<updated>2008-07-23T22:05:55Z</updated>

		<summary type="html">&lt;p&gt;Cjsoques: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Policies==&lt;br /&gt;
&lt;br /&gt;
== Costs and Benefits Password Regulations ==&lt;br /&gt;
“Best practices” sometimes seem to take on a life of their own, independent of any recent assessment of their costs and benefits.  An example is password policies; maximum length, restrictions on characters that can be used, and password-change frequency.  Evaluate these popular password regulations.  Do they provide adequate benefits for costs incurred?  What ethical considerations do poorly evaluated “best practices” raise?  Do policy-makers have an ethical responsibility to evaluate “best practices” before adopted?  A responsibility to re-evaluate existing practices?&lt;br /&gt;
&lt;br /&gt;
Cite specific evidence in your cost/benefit analysis from quality sources (professional/academic journals preferred).&lt;br /&gt;
&lt;br /&gt;
* [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1013839 http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1013839]&lt;br /&gt;
* [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1588836 http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1588836]&lt;br /&gt;
* [http://portal.acm.org/citation.cfm?id=322796.322806 http://portal.acm.org/citation.cfm?id=322796.322806]&lt;br /&gt;
* [http://portal.acm.org/citation.cfm?id=581370 http://portal.acm.org/citation.cfm?id=581370]&lt;br /&gt;
* [http://portal.acm.org/citation.cfm?id=986664 http://portal.acm.org/citation.cfm?id=986664]&lt;/div&gt;</summary>
		<author><name>Cjsoques</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Talk:Social_Engineering&amp;diff=15046</id>
		<title>Talk:Social Engineering</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Talk:Social_Engineering&amp;diff=15046"/>
		<updated>2008-07-23T18:39:24Z</updated>

		<summary type="html">&lt;p&gt;Cjsoques: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;To Do:&lt;br /&gt;
&lt;br /&gt;
* Insert sources&lt;br /&gt;
* Add information to study guide&lt;br /&gt;
* Add ethical concerns&lt;/div&gt;</summary>
		<author><name>Cjsoques</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=15045</id>
		<title>Social Engineering</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=15045"/>
		<updated>2008-07-23T18:38:28Z</updated>

		<summary type="html">&lt;p&gt;Cjsoques: /* Legal and Ethical Concerns */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Social engineering a method of fraud and hacking that utilizes the humanity and nature of people to retrieve information from them voluntarily.  By playing into the nature of the person, hacking through technological means is sometimes not necessary.  If one can fool a person into giving away information voluntarily, then creating a program or hack to retrieve that information involuntarily is no required.  Furthermore, it can be much simpler and efficient to get information from someone through social engineering than it would ever be to steal that information via a computer program or password cracker.  &lt;br /&gt;
&lt;br /&gt;
This form of forcing users to disclose information must be done through some human means.  The point of social engineering is to utilize the fallacies of human logic and biases to trick the target into revealing confidential information through various methods and tactics.&lt;br /&gt;
&lt;br /&gt;
The precautions necessary against social engineering are required to be very proactive.  For example, you can put an anti virus program that will passively scan your computer for viruses automatically. However, the human must be actively on the defense for social engineering tricks and tactics that may be used against them.  Over the years, general guidelines for companies and employees have been developed to give the knowledge necessary to be vigilant and alert for social engineering fraud attempts.&lt;br /&gt;
&lt;br /&gt;
==Tactics and Methods==&lt;br /&gt;
There are various means of utilizing social engineering to obtain confidential and secret information such as passwords and private data.  All of these methods work through some medium in which the attacker has to actually converse with the victim in some way, whether directly or indirectly.  In all methods, feedback from the victim is required.  This feedback is usually the necessary information the attacker was looking for.&lt;br /&gt;
&lt;br /&gt;
Although social engineering tactics are heavily performed through electronic and computer mediums.  There are many methods in which social engineering can be done through the physical realm.  As long as there can be some form of communication between the attacker and the victim any medium may be used.  Social engineering is so successful because it takes advantage of the fallacies of the human being.  Whether by means of flattery, impersonation, and greed; social engineering is considered to some an art form of psychology.&lt;br /&gt;
&lt;br /&gt;
Social Engineering can be extremely simple to perform, but have dire effects and consequences.  There are even [http://news.cnet.com/8301-1009_3-9995253-83.html guides and tips] on how hackers have used social engineering in extremely simple ways.  Social engineering is considered so dangerous that [http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick], a renouned hacker and early user of social enginering, was considered the most dangerous hacker.  By using social engineering, the FBI though that Mitnick could start a nuclear war by simply utilizing social engineering.  &lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
The main way of retrieving electronic information from victim voluntarily is through [http://en.wikipedia.org/wiki/Phishing phishing].  Phishing, like social engineering, can be performed over various electronic and physical mediums.  In a general term, phishing is pretending to be something legitimate, when you are not.  When you fool the victim into thinking you are the legitimate source that is being faked, they will reveal all the information that would normally be required to use that source.  This may include account numbers, usernames, passwords, or even Social Security Numbers.&lt;br /&gt;
&lt;br /&gt;
A major medium of phishing is through e-mail.  The example of a bank and customer is extremely common.  The attacker will send the victim an e-mail notifying them of some required account information to be updated.  This e-mail will look exactly like the standard e-mail the victim may have received from the bank before.  The victim will be required to login and update their information as soon as possible.  However, the link will not be sent to the bank website, but to a separate server that was setup by the attacker to retrieve the information.  This website, like the e-mail, will look exactly like the actual bank website.  Once the person types their login information, the attacker then has all the information they needed from the victim.  &lt;br /&gt;
&lt;br /&gt;
Although uncommon, phishing may also be performed over the phone by pretending to be a representative of some company that is requesting some kind of account information.  The attacker may even know some basic information about the victim to prove that they are legitimate.  Usually, a victim will not question the call and will provide the necessary information.  The attacker can then use this information to take advantage of the victim by means of identity or property theft.&lt;br /&gt;
&lt;br /&gt;
===Pretexting===&lt;br /&gt;
[http://www.ftc.gov/bcp/conline/pubs/credit/pretext.shtm Pretexting] is a form of using information about the victim to obtain even more information or to use it against the victim.  Through pretexting the attacker uses the limited information gained to obtain more information.  Once enough information is gained.  The attacker may use credit pretending to be the victim, to make purchases acting as the victim, or to manipulate the records of the victim.&lt;br /&gt;
&lt;br /&gt;
The goal of pretexting is to prove to someone that you are legitimately the victim.  This may be done from proving that you know their name, address, phone number, and Social Security Number.  This could also be done by knowing the victim's username and password that was retrieved through phishing.&lt;br /&gt;
&lt;br /&gt;
===Trojan Horse===&lt;br /&gt;
A [http://www.tech-faq.com/trojan-horse-virus.shtml Trojan Horse] a technological form of social engineering.  Not only does it fool the victim that it is from a legitimate source, but it also fools the computer the victim is using.  A trojan horse is a program that may seem to perform a legitimate action, but in fact is collecting sensitive information or stealing data in the background.  This is, of coruse, derived from the ancient tactic used by the Spartans to invade Troy by pretending to be a gift to the Trojans (which is an ancient example of social engineering).&lt;br /&gt;
&lt;br /&gt;
To be specific, a ''gimme'' is a type of Trojan Horse that plays off of Social Engineering.  This tactic goes in conjunction with spamming or phishing.  The user will receive a pop-up ad or e-mail ad notifying the victim of some software that would benefit them.  Because of their curiosity and the seeming innocence of the program, the victim will install it on their machine.  The software may even perform as advertised, but in the background is obtaining account information and other confidential data.&lt;br /&gt;
&lt;br /&gt;
This is where a computer program pretends to be something it is not.  Instead of an actual human being performing the pretexting, it is an automated computer program.&lt;br /&gt;
&lt;br /&gt;
==Security, Precautions, and Defenses==&lt;br /&gt;
There are many precautions and defenses against social engineering.  However, there is a lack of education on the methods to defend against this tactic.  Various methods include vigorous identity verification, minimizing the amount of people that have sensitive information, as well as reducing the trust level of those in control of information.  Many companies have developed security policies and guidelines that employees should follow to minimize the risk of social engineering exploits.&lt;br /&gt;
&lt;br /&gt;
===Proactive Social Defenses===&lt;br /&gt;
SANS Network Security has a good example of a [http://www.sans.org/reading_room/whitepapers/engineering/511.php brief guide] for employees to maintain a proactive awareness against social engineering.  Through proactive self defense a company should develop a detailed policy on security and data release.  These policy should detailed who is able to release information, what information, and to who that information may be released to. &lt;br /&gt;
&lt;br /&gt;
There should be detailed access approval to any secured area or information.  A company should setup a defense against social engineering by always having a detailed access approval process instead of simply not challenging the requester of information. The company should have a designated help desk and support center that is knowledgeable in the policies of data release.  Information such as employee IDs, account information, and passwords should always be challenged with a detailed approval policy.&lt;br /&gt;
&lt;br /&gt;
By detailing who is allowed to release information and what information can be released, a company can minimize the amount of violations through social-engineering.  Usually social engineering succeeds because there is no preset guideline for giving out information for rare instances that social engineers exploit.&lt;br /&gt;
&lt;br /&gt;
===Employee Training===&lt;br /&gt;
Since the human being is the reason for social engineering exploits, the employee is the number one defense against attacks.  By [http://techrepublic.com.com/5208-6230-0.html?forumID=102&amp;amp;threadID=232696 training the employees through examples], they gain an understanding of how easy it is for social engineering to work.  By training to employees to reduce their trust value and not take request for information at face value, it will discourage the attacker to request any further information.  If in doubt, the employee should never give out confidential information and bring it to the next person in command.&lt;br /&gt;
&lt;br /&gt;
===Security Software and Electronics===&lt;br /&gt;
Since the goal of social engineering exploits are to bypass technological and security barriers, there are few ways to stop social engineering through electronic and software means.  One main way to combat and reduce the risk is to have, in place, strict identity verification technologies that combat counterfeit and impersonation attacks.  Social engineering attacks are so easy because it is so easy to appear legitimate.  If identify verification were scrutinized at both a human and electronic level, the legitimacy of identity would be much harder to prove.&lt;br /&gt;
&lt;br /&gt;
In addition, companies can install [http://ca.com/us/securityadvisor/documents/collateral.aspx?cid=157506 software] that will reduce the amount of social engineering solicitations that employees receive through e-mail and websites.  By filtering out known threatening sources, this software can prevent the employee from even having to worry about making the decision of whether the source is legitimate.&lt;br /&gt;
&lt;br /&gt;
==Legal and Ethical Concerns==&lt;br /&gt;
In the United States, there are laws against pretexting and falsifying identity.  The [http://en.wikipedia.org/wiki/Gramm-Leach-Bliley_Act Gramm-Leach-Billey Act (GLBA)] makes it illegal to do the following&lt;br /&gt;
&lt;br /&gt;
* To falsify information or make false statements to retrieve information from a financial institution or even a customer of that institution&lt;br /&gt;
&lt;br /&gt;
* To use forged or stolen documents to receive information from a financial institution or a customer of that institution&lt;br /&gt;
&lt;br /&gt;
* Ask another person to obtain information by using the above two means&lt;br /&gt;
&lt;br /&gt;
In addition, the [http://en.wikipedia.org/wiki/Federal_Trade_Commission_Act Federal Trade Commission Act] prohibits pretexting for customer information.&lt;br /&gt;
&lt;br /&gt;
&amp;gt;&amp;gt; NEED ETHICAL CONCERNS &amp;lt;&amp;lt;&lt;br /&gt;
&lt;br /&gt;
==Study Guide==&lt;br /&gt;
This study guide relates to security precautions against Social Engineering.  For the main Security Precautions study guide, go [http://ethics.csc.ncsu.edu/risks/security/precautions/study.php here].&lt;br /&gt;
&lt;br /&gt;
1. Why Are Security Precautions Necessary?&lt;br /&gt;
&lt;br /&gt;
2. Security Precautions Are Not Easy&lt;br /&gt;
&lt;br /&gt;
3. Ethical Responsibilities&lt;br /&gt;
&lt;br /&gt;
5. Some Security Products That Could Help You&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/risks/security/precautions/ Security Precautions (Old Project Page)]&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Social_engineering_%28security%29 Social Engineering (Wikipedia)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.securityfocus.com/infocus/1527 Social Engineering Fundamentals]&lt;br /&gt;
&lt;br /&gt;
* [http://searchfinancialsecurity.techtarget.com/tip/0,289483,sid185_gci1294530,00.html Social Engineering Attacks]&lt;br /&gt;
&lt;br /&gt;
* [http://www.sans.org/reading_room/whitepapers/engineering/511.php Proactive Defense to Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://www.morehouse.org/hin/blckcrwl/hack/soceng.txt Social Engineering FAQ]&lt;br /&gt;
&lt;br /&gt;
* [http://www.hackinthebox.org/modules.php?op=modload&amp;amp;name=News&amp;amp;file=article&amp;amp;sid=15170&amp;amp;mode=thread&amp;amp;order=0&amp;amp;thold=0 Social Engineering Defense 101]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cioupdate.com/trends/article.php/3638951 Best Defense Against Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://techrepublic.com.com/5208-6230-0.html?forumID=102&amp;amp;threadID=232696 Social Engineering Self-defense]&lt;br /&gt;
&lt;br /&gt;
* [http://news.cnet.com/8301-1009_3-9995253-83.html Social Engineering: Hackers show how it is done]&lt;br /&gt;
&lt;br /&gt;
* [http://www.infosecwriters.com/text_resources/pdf/Social_Engineering_CRhodes.pdf Safeguarding Against Social Engineering]&lt;/div&gt;</summary>
		<author><name>Cjsoques</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=15044</id>
		<title>Social Engineering</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=15044"/>
		<updated>2008-07-23T18:38:15Z</updated>

		<summary type="html">&lt;p&gt;Cjsoques: /* Legal Concerns */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Social engineering a method of fraud and hacking that utilizes the humanity and nature of people to retrieve information from them voluntarily.  By playing into the nature of the person, hacking through technological means is sometimes not necessary.  If one can fool a person into giving away information voluntarily, then creating a program or hack to retrieve that information involuntarily is no required.  Furthermore, it can be much simpler and efficient to get information from someone through social engineering than it would ever be to steal that information via a computer program or password cracker.  &lt;br /&gt;
&lt;br /&gt;
This form of forcing users to disclose information must be done through some human means.  The point of social engineering is to utilize the fallacies of human logic and biases to trick the target into revealing confidential information through various methods and tactics.&lt;br /&gt;
&lt;br /&gt;
The precautions necessary against social engineering are required to be very proactive.  For example, you can put an anti virus program that will passively scan your computer for viruses automatically. However, the human must be actively on the defense for social engineering tricks and tactics that may be used against them.  Over the years, general guidelines for companies and employees have been developed to give the knowledge necessary to be vigilant and alert for social engineering fraud attempts.&lt;br /&gt;
&lt;br /&gt;
==Tactics and Methods==&lt;br /&gt;
There are various means of utilizing social engineering to obtain confidential and secret information such as passwords and private data.  All of these methods work through some medium in which the attacker has to actually converse with the victim in some way, whether directly or indirectly.  In all methods, feedback from the victim is required.  This feedback is usually the necessary information the attacker was looking for.&lt;br /&gt;
&lt;br /&gt;
Although social engineering tactics are heavily performed through electronic and computer mediums.  There are many methods in which social engineering can be done through the physical realm.  As long as there can be some form of communication between the attacker and the victim any medium may be used.  Social engineering is so successful because it takes advantage of the fallacies of the human being.  Whether by means of flattery, impersonation, and greed; social engineering is considered to some an art form of psychology.&lt;br /&gt;
&lt;br /&gt;
Social Engineering can be extremely simple to perform, but have dire effects and consequences.  There are even [http://news.cnet.com/8301-1009_3-9995253-83.html guides and tips] on how hackers have used social engineering in extremely simple ways.  Social engineering is considered so dangerous that [http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick], a renouned hacker and early user of social enginering, was considered the most dangerous hacker.  By using social engineering, the FBI though that Mitnick could start a nuclear war by simply utilizing social engineering.  &lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
The main way of retrieving electronic information from victim voluntarily is through [http://en.wikipedia.org/wiki/Phishing phishing].  Phishing, like social engineering, can be performed over various electronic and physical mediums.  In a general term, phishing is pretending to be something legitimate, when you are not.  When you fool the victim into thinking you are the legitimate source that is being faked, they will reveal all the information that would normally be required to use that source.  This may include account numbers, usernames, passwords, or even Social Security Numbers.&lt;br /&gt;
&lt;br /&gt;
A major medium of phishing is through e-mail.  The example of a bank and customer is extremely common.  The attacker will send the victim an e-mail notifying them of some required account information to be updated.  This e-mail will look exactly like the standard e-mail the victim may have received from the bank before.  The victim will be required to login and update their information as soon as possible.  However, the link will not be sent to the bank website, but to a separate server that was setup by the attacker to retrieve the information.  This website, like the e-mail, will look exactly like the actual bank website.  Once the person types their login information, the attacker then has all the information they needed from the victim.  &lt;br /&gt;
&lt;br /&gt;
Although uncommon, phishing may also be performed over the phone by pretending to be a representative of some company that is requesting some kind of account information.  The attacker may even know some basic information about the victim to prove that they are legitimate.  Usually, a victim will not question the call and will provide the necessary information.  The attacker can then use this information to take advantage of the victim by means of identity or property theft.&lt;br /&gt;
&lt;br /&gt;
===Pretexting===&lt;br /&gt;
[http://www.ftc.gov/bcp/conline/pubs/credit/pretext.shtm Pretexting] is a form of using information about the victim to obtain even more information or to use it against the victim.  Through pretexting the attacker uses the limited information gained to obtain more information.  Once enough information is gained.  The attacker may use credit pretending to be the victim, to make purchases acting as the victim, or to manipulate the records of the victim.&lt;br /&gt;
&lt;br /&gt;
The goal of pretexting is to prove to someone that you are legitimately the victim.  This may be done from proving that you know their name, address, phone number, and Social Security Number.  This could also be done by knowing the victim's username and password that was retrieved through phishing.&lt;br /&gt;
&lt;br /&gt;
===Trojan Horse===&lt;br /&gt;
A [http://www.tech-faq.com/trojan-horse-virus.shtml Trojan Horse] a technological form of social engineering.  Not only does it fool the victim that it is from a legitimate source, but it also fools the computer the victim is using.  A trojan horse is a program that may seem to perform a legitimate action, but in fact is collecting sensitive information or stealing data in the background.  This is, of coruse, derived from the ancient tactic used by the Spartans to invade Troy by pretending to be a gift to the Trojans (which is an ancient example of social engineering).&lt;br /&gt;
&lt;br /&gt;
To be specific, a ''gimme'' is a type of Trojan Horse that plays off of Social Engineering.  This tactic goes in conjunction with spamming or phishing.  The user will receive a pop-up ad or e-mail ad notifying the victim of some software that would benefit them.  Because of their curiosity and the seeming innocence of the program, the victim will install it on their machine.  The software may even perform as advertised, but in the background is obtaining account information and other confidential data.&lt;br /&gt;
&lt;br /&gt;
This is where a computer program pretends to be something it is not.  Instead of an actual human being performing the pretexting, it is an automated computer program.&lt;br /&gt;
&lt;br /&gt;
==Security, Precautions, and Defenses==&lt;br /&gt;
There are many precautions and defenses against social engineering.  However, there is a lack of education on the methods to defend against this tactic.  Various methods include vigorous identity verification, minimizing the amount of people that have sensitive information, as well as reducing the trust level of those in control of information.  Many companies have developed security policies and guidelines that employees should follow to minimize the risk of social engineering exploits.&lt;br /&gt;
&lt;br /&gt;
===Proactive Social Defenses===&lt;br /&gt;
SANS Network Security has a good example of a [http://www.sans.org/reading_room/whitepapers/engineering/511.php brief guide] for employees to maintain a proactive awareness against social engineering.  Through proactive self defense a company should develop a detailed policy on security and data release.  These policy should detailed who is able to release information, what information, and to who that information may be released to. &lt;br /&gt;
&lt;br /&gt;
There should be detailed access approval to any secured area or information.  A company should setup a defense against social engineering by always having a detailed access approval process instead of simply not challenging the requester of information. The company should have a designated help desk and support center that is knowledgeable in the policies of data release.  Information such as employee IDs, account information, and passwords should always be challenged with a detailed approval policy.&lt;br /&gt;
&lt;br /&gt;
By detailing who is allowed to release information and what information can be released, a company can minimize the amount of violations through social-engineering.  Usually social engineering succeeds because there is no preset guideline for giving out information for rare instances that social engineers exploit.&lt;br /&gt;
&lt;br /&gt;
===Employee Training===&lt;br /&gt;
Since the human being is the reason for social engineering exploits, the employee is the number one defense against attacks.  By [http://techrepublic.com.com/5208-6230-0.html?forumID=102&amp;amp;threadID=232696 training the employees through examples], they gain an understanding of how easy it is for social engineering to work.  By training to employees to reduce their trust value and not take request for information at face value, it will discourage the attacker to request any further information.  If in doubt, the employee should never give out confidential information and bring it to the next person in command.&lt;br /&gt;
&lt;br /&gt;
===Security Software and Electronics===&lt;br /&gt;
Since the goal of social engineering exploits are to bypass technological and security barriers, there are few ways to stop social engineering through electronic and software means.  One main way to combat and reduce the risk is to have, in place, strict identity verification technologies that combat counterfeit and impersonation attacks.  Social engineering attacks are so easy because it is so easy to appear legitimate.  If identify verification were scrutinized at both a human and electronic level, the legitimacy of identity would be much harder to prove.&lt;br /&gt;
&lt;br /&gt;
In addition, companies can install [http://ca.com/us/securityadvisor/documents/collateral.aspx?cid=157506 software] that will reduce the amount of social engineering solicitations that employees receive through e-mail and websites.  By filtering out known threatening sources, this software can prevent the employee from even having to worry about making the decision of whether the source is legitimate.&lt;br /&gt;
&lt;br /&gt;
==Legal and Ethical Concerns==&lt;br /&gt;
In the United States, there are laws against pretexting and falsifying identity.  The [http://en.wikipedia.org/wiki/Gramm-Leach-Bliley_Act Gramm-Leach-Billey Act (GLBA)] makes it illegal to do the following&lt;br /&gt;
&lt;br /&gt;
* To falsify information or make false statements to retrieve information from a financial institution or even a customer of that institution&lt;br /&gt;
&lt;br /&gt;
* To use forged or stolen documents to receive information from a financial institution or a customer of that institution&lt;br /&gt;
&lt;br /&gt;
* Ask another person to obtain information by using the above two means&lt;br /&gt;
&lt;br /&gt;
In addition, the [http://en.wikipedia.org/wiki/Federal_Trade_Commission_Act Federal Trade Commission Act] prohibits pretexting for customer information.&lt;br /&gt;
&lt;br /&gt;
** NEED ETHICAL CONCERNS **&lt;br /&gt;
&lt;br /&gt;
==Study Guide==&lt;br /&gt;
This study guide relates to security precautions against Social Engineering.  For the main Security Precautions study guide, go [http://ethics.csc.ncsu.edu/risks/security/precautions/study.php here].&lt;br /&gt;
&lt;br /&gt;
1. Why Are Security Precautions Necessary?&lt;br /&gt;
&lt;br /&gt;
2. Security Precautions Are Not Easy&lt;br /&gt;
&lt;br /&gt;
3. Ethical Responsibilities&lt;br /&gt;
&lt;br /&gt;
5. Some Security Products That Could Help You&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/risks/security/precautions/ Security Precautions (Old Project Page)]&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Social_engineering_%28security%29 Social Engineering (Wikipedia)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.securityfocus.com/infocus/1527 Social Engineering Fundamentals]&lt;br /&gt;
&lt;br /&gt;
* [http://searchfinancialsecurity.techtarget.com/tip/0,289483,sid185_gci1294530,00.html Social Engineering Attacks]&lt;br /&gt;
&lt;br /&gt;
* [http://www.sans.org/reading_room/whitepapers/engineering/511.php Proactive Defense to Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://www.morehouse.org/hin/blckcrwl/hack/soceng.txt Social Engineering FAQ]&lt;br /&gt;
&lt;br /&gt;
* [http://www.hackinthebox.org/modules.php?op=modload&amp;amp;name=News&amp;amp;file=article&amp;amp;sid=15170&amp;amp;mode=thread&amp;amp;order=0&amp;amp;thold=0 Social Engineering Defense 101]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cioupdate.com/trends/article.php/3638951 Best Defense Against Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://techrepublic.com.com/5208-6230-0.html?forumID=102&amp;amp;threadID=232696 Social Engineering Self-defense]&lt;br /&gt;
&lt;br /&gt;
* [http://news.cnet.com/8301-1009_3-9995253-83.html Social Engineering: Hackers show how it is done]&lt;br /&gt;
&lt;br /&gt;
* [http://www.infosecwriters.com/text_resources/pdf/Social_Engineering_CRhodes.pdf Safeguarding Against Social Engineering]&lt;/div&gt;</summary>
		<author><name>Cjsoques</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=15043</id>
		<title>Social Engineering</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=15043"/>
		<updated>2008-07-23T18:37:59Z</updated>

		<summary type="html">&lt;p&gt;Cjsoques: /* Study Guide */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Social engineering a method of fraud and hacking that utilizes the humanity and nature of people to retrieve information from them voluntarily.  By playing into the nature of the person, hacking through technological means is sometimes not necessary.  If one can fool a person into giving away information voluntarily, then creating a program or hack to retrieve that information involuntarily is no required.  Furthermore, it can be much simpler and efficient to get information from someone through social engineering than it would ever be to steal that information via a computer program or password cracker.  &lt;br /&gt;
&lt;br /&gt;
This form of forcing users to disclose information must be done through some human means.  The point of social engineering is to utilize the fallacies of human logic and biases to trick the target into revealing confidential information through various methods and tactics.&lt;br /&gt;
&lt;br /&gt;
The precautions necessary against social engineering are required to be very proactive.  For example, you can put an anti virus program that will passively scan your computer for viruses automatically. However, the human must be actively on the defense for social engineering tricks and tactics that may be used against them.  Over the years, general guidelines for companies and employees have been developed to give the knowledge necessary to be vigilant and alert for social engineering fraud attempts.&lt;br /&gt;
&lt;br /&gt;
==Tactics and Methods==&lt;br /&gt;
There are various means of utilizing social engineering to obtain confidential and secret information such as passwords and private data.  All of these methods work through some medium in which the attacker has to actually converse with the victim in some way, whether directly or indirectly.  In all methods, feedback from the victim is required.  This feedback is usually the necessary information the attacker was looking for.&lt;br /&gt;
&lt;br /&gt;
Although social engineering tactics are heavily performed through electronic and computer mediums.  There are many methods in which social engineering can be done through the physical realm.  As long as there can be some form of communication between the attacker and the victim any medium may be used.  Social engineering is so successful because it takes advantage of the fallacies of the human being.  Whether by means of flattery, impersonation, and greed; social engineering is considered to some an art form of psychology.&lt;br /&gt;
&lt;br /&gt;
Social Engineering can be extremely simple to perform, but have dire effects and consequences.  There are even [http://news.cnet.com/8301-1009_3-9995253-83.html guides and tips] on how hackers have used social engineering in extremely simple ways.  Social engineering is considered so dangerous that [http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick], a renouned hacker and early user of social enginering, was considered the most dangerous hacker.  By using social engineering, the FBI though that Mitnick could start a nuclear war by simply utilizing social engineering.  &lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
The main way of retrieving electronic information from victim voluntarily is through [http://en.wikipedia.org/wiki/Phishing phishing].  Phishing, like social engineering, can be performed over various electronic and physical mediums.  In a general term, phishing is pretending to be something legitimate, when you are not.  When you fool the victim into thinking you are the legitimate source that is being faked, they will reveal all the information that would normally be required to use that source.  This may include account numbers, usernames, passwords, or even Social Security Numbers.&lt;br /&gt;
&lt;br /&gt;
A major medium of phishing is through e-mail.  The example of a bank and customer is extremely common.  The attacker will send the victim an e-mail notifying them of some required account information to be updated.  This e-mail will look exactly like the standard e-mail the victim may have received from the bank before.  The victim will be required to login and update their information as soon as possible.  However, the link will not be sent to the bank website, but to a separate server that was setup by the attacker to retrieve the information.  This website, like the e-mail, will look exactly like the actual bank website.  Once the person types their login information, the attacker then has all the information they needed from the victim.  &lt;br /&gt;
&lt;br /&gt;
Although uncommon, phishing may also be performed over the phone by pretending to be a representative of some company that is requesting some kind of account information.  The attacker may even know some basic information about the victim to prove that they are legitimate.  Usually, a victim will not question the call and will provide the necessary information.  The attacker can then use this information to take advantage of the victim by means of identity or property theft.&lt;br /&gt;
&lt;br /&gt;
===Pretexting===&lt;br /&gt;
[http://www.ftc.gov/bcp/conline/pubs/credit/pretext.shtm Pretexting] is a form of using information about the victim to obtain even more information or to use it against the victim.  Through pretexting the attacker uses the limited information gained to obtain more information.  Once enough information is gained.  The attacker may use credit pretending to be the victim, to make purchases acting as the victim, or to manipulate the records of the victim.&lt;br /&gt;
&lt;br /&gt;
The goal of pretexting is to prove to someone that you are legitimately the victim.  This may be done from proving that you know their name, address, phone number, and Social Security Number.  This could also be done by knowing the victim's username and password that was retrieved through phishing.&lt;br /&gt;
&lt;br /&gt;
===Trojan Horse===&lt;br /&gt;
A [http://www.tech-faq.com/trojan-horse-virus.shtml Trojan Horse] a technological form of social engineering.  Not only does it fool the victim that it is from a legitimate source, but it also fools the computer the victim is using.  A trojan horse is a program that may seem to perform a legitimate action, but in fact is collecting sensitive information or stealing data in the background.  This is, of coruse, derived from the ancient tactic used by the Spartans to invade Troy by pretending to be a gift to the Trojans (which is an ancient example of social engineering).&lt;br /&gt;
&lt;br /&gt;
To be specific, a ''gimme'' is a type of Trojan Horse that plays off of Social Engineering.  This tactic goes in conjunction with spamming or phishing.  The user will receive a pop-up ad or e-mail ad notifying the victim of some software that would benefit them.  Because of their curiosity and the seeming innocence of the program, the victim will install it on their machine.  The software may even perform as advertised, but in the background is obtaining account information and other confidential data.&lt;br /&gt;
&lt;br /&gt;
This is where a computer program pretends to be something it is not.  Instead of an actual human being performing the pretexting, it is an automated computer program.&lt;br /&gt;
&lt;br /&gt;
==Security, Precautions, and Defenses==&lt;br /&gt;
There are many precautions and defenses against social engineering.  However, there is a lack of education on the methods to defend against this tactic.  Various methods include vigorous identity verification, minimizing the amount of people that have sensitive information, as well as reducing the trust level of those in control of information.  Many companies have developed security policies and guidelines that employees should follow to minimize the risk of social engineering exploits.&lt;br /&gt;
&lt;br /&gt;
===Proactive Social Defenses===&lt;br /&gt;
SANS Network Security has a good example of a [http://www.sans.org/reading_room/whitepapers/engineering/511.php brief guide] for employees to maintain a proactive awareness against social engineering.  Through proactive self defense a company should develop a detailed policy on security and data release.  These policy should detailed who is able to release information, what information, and to who that information may be released to. &lt;br /&gt;
&lt;br /&gt;
There should be detailed access approval to any secured area or information.  A company should setup a defense against social engineering by always having a detailed access approval process instead of simply not challenging the requester of information. The company should have a designated help desk and support center that is knowledgeable in the policies of data release.  Information such as employee IDs, account information, and passwords should always be challenged with a detailed approval policy.&lt;br /&gt;
&lt;br /&gt;
By detailing who is allowed to release information and what information can be released, a company can minimize the amount of violations through social-engineering.  Usually social engineering succeeds because there is no preset guideline for giving out information for rare instances that social engineers exploit.&lt;br /&gt;
&lt;br /&gt;
===Employee Training===&lt;br /&gt;
Since the human being is the reason for social engineering exploits, the employee is the number one defense against attacks.  By [http://techrepublic.com.com/5208-6230-0.html?forumID=102&amp;amp;threadID=232696 training the employees through examples], they gain an understanding of how easy it is for social engineering to work.  By training to employees to reduce their trust value and not take request for information at face value, it will discourage the attacker to request any further information.  If in doubt, the employee should never give out confidential information and bring it to the next person in command.&lt;br /&gt;
&lt;br /&gt;
===Security Software and Electronics===&lt;br /&gt;
Since the goal of social engineering exploits are to bypass technological and security barriers, there are few ways to stop social engineering through electronic and software means.  One main way to combat and reduce the risk is to have, in place, strict identity verification technologies that combat counterfeit and impersonation attacks.  Social engineering attacks are so easy because it is so easy to appear legitimate.  If identify verification were scrutinized at both a human and electronic level, the legitimacy of identity would be much harder to prove.&lt;br /&gt;
&lt;br /&gt;
In addition, companies can install [http://ca.com/us/securityadvisor/documents/collateral.aspx?cid=157506 software] that will reduce the amount of social engineering solicitations that employees receive through e-mail and websites.  By filtering out known threatening sources, this software can prevent the employee from even having to worry about making the decision of whether the source is legitimate.&lt;br /&gt;
&lt;br /&gt;
==Legal Concerns==&lt;br /&gt;
In the United States, there are laws against pretexting and falsifying identity.  The [http://en.wikipedia.org/wiki/Gramm-Leach-Bliley_Act Gramm-Leach-Billey Act (GLBA)] makes it illegal to do the following&lt;br /&gt;
&lt;br /&gt;
* To falsify information or make false statements to retrieve information from a financial institution or even a customer of that institution&lt;br /&gt;
&lt;br /&gt;
* To use forged or stolen documents to receive information from a financial institution or a customer of that institution&lt;br /&gt;
&lt;br /&gt;
* Ask another person to obtain information by using the above two means&lt;br /&gt;
&lt;br /&gt;
In addition, the [http://en.wikipedia.org/wiki/Federal_Trade_Commission_Act Federal Trade Commission Act] prohibits pretexting for customer information.&lt;br /&gt;
&lt;br /&gt;
==Study Guide==&lt;br /&gt;
This study guide relates to security precautions against Social Engineering.  For the main Security Precautions study guide, go [http://ethics.csc.ncsu.edu/risks/security/precautions/study.php here].&lt;br /&gt;
&lt;br /&gt;
1. Why Are Security Precautions Necessary?&lt;br /&gt;
&lt;br /&gt;
2. Security Precautions Are Not Easy&lt;br /&gt;
&lt;br /&gt;
3. Ethical Responsibilities&lt;br /&gt;
&lt;br /&gt;
5. Some Security Products That Could Help You&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/risks/security/precautions/ Security Precautions (Old Project Page)]&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Social_engineering_%28security%29 Social Engineering (Wikipedia)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.securityfocus.com/infocus/1527 Social Engineering Fundamentals]&lt;br /&gt;
&lt;br /&gt;
* [http://searchfinancialsecurity.techtarget.com/tip/0,289483,sid185_gci1294530,00.html Social Engineering Attacks]&lt;br /&gt;
&lt;br /&gt;
* [http://www.sans.org/reading_room/whitepapers/engineering/511.php Proactive Defense to Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://www.morehouse.org/hin/blckcrwl/hack/soceng.txt Social Engineering FAQ]&lt;br /&gt;
&lt;br /&gt;
* [http://www.hackinthebox.org/modules.php?op=modload&amp;amp;name=News&amp;amp;file=article&amp;amp;sid=15170&amp;amp;mode=thread&amp;amp;order=0&amp;amp;thold=0 Social Engineering Defense 101]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cioupdate.com/trends/article.php/3638951 Best Defense Against Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://techrepublic.com.com/5208-6230-0.html?forumID=102&amp;amp;threadID=232696 Social Engineering Self-defense]&lt;br /&gt;
&lt;br /&gt;
* [http://news.cnet.com/8301-1009_3-9995253-83.html Social Engineering: Hackers show how it is done]&lt;br /&gt;
&lt;br /&gt;
* [http://www.infosecwriters.com/text_resources/pdf/Social_Engineering_CRhodes.pdf Safeguarding Against Social Engineering]&lt;/div&gt;</summary>
		<author><name>Cjsoques</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=15042</id>
		<title>Social Engineering</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=15042"/>
		<updated>2008-07-23T18:17:46Z</updated>

		<summary type="html">&lt;p&gt;Cjsoques: /* References */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Social engineering a method of fraud and hacking that utilizes the humanity and nature of people to retrieve information from them voluntarily.  By playing into the nature of the person, hacking through technological means is sometimes not necessary.  If one can fool a person into giving away information voluntarily, then creating a program or hack to retrieve that information involuntarily is no required.  Furthermore, it can be much simpler and efficient to get information from someone through social engineering than it would ever be to steal that information via a computer program or password cracker.  &lt;br /&gt;
&lt;br /&gt;
This form of forcing users to disclose information must be done through some human means.  The point of social engineering is to utilize the fallacies of human logic and biases to trick the target into revealing confidential information through various methods and tactics.&lt;br /&gt;
&lt;br /&gt;
The precautions necessary against social engineering are required to be very proactive.  For example, you can put an anti virus program that will passively scan your computer for viruses automatically. However, the human must be actively on the defense for social engineering tricks and tactics that may be used against them.  Over the years, general guidelines for companies and employees have been developed to give the knowledge necessary to be vigilant and alert for social engineering fraud attempts.&lt;br /&gt;
&lt;br /&gt;
==Tactics and Methods==&lt;br /&gt;
There are various means of utilizing social engineering to obtain confidential and secret information such as passwords and private data.  All of these methods work through some medium in which the attacker has to actually converse with the victim in some way, whether directly or indirectly.  In all methods, feedback from the victim is required.  This feedback is usually the necessary information the attacker was looking for.&lt;br /&gt;
&lt;br /&gt;
Although social engineering tactics are heavily performed through electronic and computer mediums.  There are many methods in which social engineering can be done through the physical realm.  As long as there can be some form of communication between the attacker and the victim any medium may be used.  Social engineering is so successful because it takes advantage of the fallacies of the human being.  Whether by means of flattery, impersonation, and greed; social engineering is considered to some an art form of psychology.&lt;br /&gt;
&lt;br /&gt;
Social Engineering can be extremely simple to perform, but have dire effects and consequences.  There are even [http://news.cnet.com/8301-1009_3-9995253-83.html guides and tips] on how hackers have used social engineering in extremely simple ways.  Social engineering is considered so dangerous that [http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick], a renouned hacker and early user of social enginering, was considered the most dangerous hacker.  By using social engineering, the FBI though that Mitnick could start a nuclear war by simply utilizing social engineering.  &lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
The main way of retrieving electronic information from victim voluntarily is through [http://en.wikipedia.org/wiki/Phishing phishing].  Phishing, like social engineering, can be performed over various electronic and physical mediums.  In a general term, phishing is pretending to be something legitimate, when you are not.  When you fool the victim into thinking you are the legitimate source that is being faked, they will reveal all the information that would normally be required to use that source.  This may include account numbers, usernames, passwords, or even Social Security Numbers.&lt;br /&gt;
&lt;br /&gt;
A major medium of phishing is through e-mail.  The example of a bank and customer is extremely common.  The attacker will send the victim an e-mail notifying them of some required account information to be updated.  This e-mail will look exactly like the standard e-mail the victim may have received from the bank before.  The victim will be required to login and update their information as soon as possible.  However, the link will not be sent to the bank website, but to a separate server that was setup by the attacker to retrieve the information.  This website, like the e-mail, will look exactly like the actual bank website.  Once the person types their login information, the attacker then has all the information they needed from the victim.  &lt;br /&gt;
&lt;br /&gt;
Although uncommon, phishing may also be performed over the phone by pretending to be a representative of some company that is requesting some kind of account information.  The attacker may even know some basic information about the victim to prove that they are legitimate.  Usually, a victim will not question the call and will provide the necessary information.  The attacker can then use this information to take advantage of the victim by means of identity or property theft.&lt;br /&gt;
&lt;br /&gt;
===Pretexting===&lt;br /&gt;
[http://www.ftc.gov/bcp/conline/pubs/credit/pretext.shtm Pretexting] is a form of using information about the victim to obtain even more information or to use it against the victim.  Through pretexting the attacker uses the limited information gained to obtain more information.  Once enough information is gained.  The attacker may use credit pretending to be the victim, to make purchases acting as the victim, or to manipulate the records of the victim.&lt;br /&gt;
&lt;br /&gt;
The goal of pretexting is to prove to someone that you are legitimately the victim.  This may be done from proving that you know their name, address, phone number, and Social Security Number.  This could also be done by knowing the victim's username and password that was retrieved through phishing.&lt;br /&gt;
&lt;br /&gt;
===Trojan Horse===&lt;br /&gt;
A [http://www.tech-faq.com/trojan-horse-virus.shtml Trojan Horse] a technological form of social engineering.  Not only does it fool the victim that it is from a legitimate source, but it also fools the computer the victim is using.  A trojan horse is a program that may seem to perform a legitimate action, but in fact is collecting sensitive information or stealing data in the background.  This is, of coruse, derived from the ancient tactic used by the Spartans to invade Troy by pretending to be a gift to the Trojans (which is an ancient example of social engineering).&lt;br /&gt;
&lt;br /&gt;
To be specific, a ''gimme'' is a type of Trojan Horse that plays off of Social Engineering.  This tactic goes in conjunction with spamming or phishing.  The user will receive a pop-up ad or e-mail ad notifying the victim of some software that would benefit them.  Because of their curiosity and the seeming innocence of the program, the victim will install it on their machine.  The software may even perform as advertised, but in the background is obtaining account information and other confidential data.&lt;br /&gt;
&lt;br /&gt;
This is where a computer program pretends to be something it is not.  Instead of an actual human being performing the pretexting, it is an automated computer program.&lt;br /&gt;
&lt;br /&gt;
==Security, Precautions, and Defenses==&lt;br /&gt;
There are many precautions and defenses against social engineering.  However, there is a lack of education on the methods to defend against this tactic.  Various methods include vigorous identity verification, minimizing the amount of people that have sensitive information, as well as reducing the trust level of those in control of information.  Many companies have developed security policies and guidelines that employees should follow to minimize the risk of social engineering exploits.&lt;br /&gt;
&lt;br /&gt;
===Proactive Social Defenses===&lt;br /&gt;
SANS Network Security has a good example of a [http://www.sans.org/reading_room/whitepapers/engineering/511.php brief guide] for employees to maintain a proactive awareness against social engineering.  Through proactive self defense a company should develop a detailed policy on security and data release.  These policy should detailed who is able to release information, what information, and to who that information may be released to. &lt;br /&gt;
&lt;br /&gt;
There should be detailed access approval to any secured area or information.  A company should setup a defense against social engineering by always having a detailed access approval process instead of simply not challenging the requester of information. The company should have a designated help desk and support center that is knowledgeable in the policies of data release.  Information such as employee IDs, account information, and passwords should always be challenged with a detailed approval policy.&lt;br /&gt;
&lt;br /&gt;
By detailing who is allowed to release information and what information can be released, a company can minimize the amount of violations through social-engineering.  Usually social engineering succeeds because there is no preset guideline for giving out information for rare instances that social engineers exploit.&lt;br /&gt;
&lt;br /&gt;
===Employee Training===&lt;br /&gt;
Since the human being is the reason for social engineering exploits, the employee is the number one defense against attacks.  By [http://techrepublic.com.com/5208-6230-0.html?forumID=102&amp;amp;threadID=232696 training the employees through examples], they gain an understanding of how easy it is for social engineering to work.  By training to employees to reduce their trust value and not take request for information at face value, it will discourage the attacker to request any further information.  If in doubt, the employee should never give out confidential information and bring it to the next person in command.&lt;br /&gt;
&lt;br /&gt;
===Security Software and Electronics===&lt;br /&gt;
Since the goal of social engineering exploits are to bypass technological and security barriers, there are few ways to stop social engineering through electronic and software means.  One main way to combat and reduce the risk is to have, in place, strict identity verification technologies that combat counterfeit and impersonation attacks.  Social engineering attacks are so easy because it is so easy to appear legitimate.  If identify verification were scrutinized at both a human and electronic level, the legitimacy of identity would be much harder to prove.&lt;br /&gt;
&lt;br /&gt;
In addition, companies can install [http://ca.com/us/securityadvisor/documents/collateral.aspx?cid=157506 software] that will reduce the amount of social engineering solicitations that employees receive through e-mail and websites.  By filtering out known threatening sources, this software can prevent the employee from even having to worry about making the decision of whether the source is legitimate.&lt;br /&gt;
&lt;br /&gt;
==Legal Concerns==&lt;br /&gt;
In the United States, there are laws against pretexting and falsifying identity.  The [http://en.wikipedia.org/wiki/Gramm-Leach-Bliley_Act Gramm-Leach-Billey Act (GLBA)] makes it illegal to do the following&lt;br /&gt;
&lt;br /&gt;
* To falsify information or make false statements to retrieve information from a financial institution or even a customer of that institution&lt;br /&gt;
&lt;br /&gt;
* To use forged or stolen documents to receive information from a financial institution or a customer of that institution&lt;br /&gt;
&lt;br /&gt;
* Ask another person to obtain information by using the above two means&lt;br /&gt;
&lt;br /&gt;
In addition, the [http://en.wikipedia.org/wiki/Federal_Trade_Commission_Act Federal Trade Commission Act] prohibits pretexting for customer information.&lt;br /&gt;
&lt;br /&gt;
==Study Guide==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/risks/security/precautions/ Security Precautions (Old Project Page)]&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Social_engineering_%28security%29 Social Engineering (Wikipedia)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.securityfocus.com/infocus/1527 Social Engineering Fundamentals]&lt;br /&gt;
&lt;br /&gt;
* [http://searchfinancialsecurity.techtarget.com/tip/0,289483,sid185_gci1294530,00.html Social Engineering Attacks]&lt;br /&gt;
&lt;br /&gt;
* [http://www.sans.org/reading_room/whitepapers/engineering/511.php Proactive Defense to Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://www.morehouse.org/hin/blckcrwl/hack/soceng.txt Social Engineering FAQ]&lt;br /&gt;
&lt;br /&gt;
* [http://www.hackinthebox.org/modules.php?op=modload&amp;amp;name=News&amp;amp;file=article&amp;amp;sid=15170&amp;amp;mode=thread&amp;amp;order=0&amp;amp;thold=0 Social Engineering Defense 101]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cioupdate.com/trends/article.php/3638951 Best Defense Against Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://techrepublic.com.com/5208-6230-0.html?forumID=102&amp;amp;threadID=232696 Social Engineering Self-defense]&lt;br /&gt;
&lt;br /&gt;
* [http://news.cnet.com/8301-1009_3-9995253-83.html Social Engineering: Hackers show how it is done]&lt;br /&gt;
&lt;br /&gt;
* [http://www.infosecwriters.com/text_resources/pdf/Social_Engineering_CRhodes.pdf Safeguarding Against Social Engineering]&lt;/div&gt;</summary>
		<author><name>Cjsoques</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=15041</id>
		<title>Social Engineering</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=15041"/>
		<updated>2008-07-23T18:17:38Z</updated>

		<summary type="html">&lt;p&gt;Cjsoques: /* Ethical and Legal Concerns */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Social engineering a method of fraud and hacking that utilizes the humanity and nature of people to retrieve information from them voluntarily.  By playing into the nature of the person, hacking through technological means is sometimes not necessary.  If one can fool a person into giving away information voluntarily, then creating a program or hack to retrieve that information involuntarily is no required.  Furthermore, it can be much simpler and efficient to get information from someone through social engineering than it would ever be to steal that information via a computer program or password cracker.  &lt;br /&gt;
&lt;br /&gt;
This form of forcing users to disclose information must be done through some human means.  The point of social engineering is to utilize the fallacies of human logic and biases to trick the target into revealing confidential information through various methods and tactics.&lt;br /&gt;
&lt;br /&gt;
The precautions necessary against social engineering are required to be very proactive.  For example, you can put an anti virus program that will passively scan your computer for viruses automatically. However, the human must be actively on the defense for social engineering tricks and tactics that may be used against them.  Over the years, general guidelines for companies and employees have been developed to give the knowledge necessary to be vigilant and alert for social engineering fraud attempts.&lt;br /&gt;
&lt;br /&gt;
==Tactics and Methods==&lt;br /&gt;
There are various means of utilizing social engineering to obtain confidential and secret information such as passwords and private data.  All of these methods work through some medium in which the attacker has to actually converse with the victim in some way, whether directly or indirectly.  In all methods, feedback from the victim is required.  This feedback is usually the necessary information the attacker was looking for.&lt;br /&gt;
&lt;br /&gt;
Although social engineering tactics are heavily performed through electronic and computer mediums.  There are many methods in which social engineering can be done through the physical realm.  As long as there can be some form of communication between the attacker and the victim any medium may be used.  Social engineering is so successful because it takes advantage of the fallacies of the human being.  Whether by means of flattery, impersonation, and greed; social engineering is considered to some an art form of psychology.&lt;br /&gt;
&lt;br /&gt;
Social Engineering can be extremely simple to perform, but have dire effects and consequences.  There are even [http://news.cnet.com/8301-1009_3-9995253-83.html guides and tips] on how hackers have used social engineering in extremely simple ways.  Social engineering is considered so dangerous that [http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick], a renouned hacker and early user of social enginering, was considered the most dangerous hacker.  By using social engineering, the FBI though that Mitnick could start a nuclear war by simply utilizing social engineering.  &lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
The main way of retrieving electronic information from victim voluntarily is through [http://en.wikipedia.org/wiki/Phishing phishing].  Phishing, like social engineering, can be performed over various electronic and physical mediums.  In a general term, phishing is pretending to be something legitimate, when you are not.  When you fool the victim into thinking you are the legitimate source that is being faked, they will reveal all the information that would normally be required to use that source.  This may include account numbers, usernames, passwords, or even Social Security Numbers.&lt;br /&gt;
&lt;br /&gt;
A major medium of phishing is through e-mail.  The example of a bank and customer is extremely common.  The attacker will send the victim an e-mail notifying them of some required account information to be updated.  This e-mail will look exactly like the standard e-mail the victim may have received from the bank before.  The victim will be required to login and update their information as soon as possible.  However, the link will not be sent to the bank website, but to a separate server that was setup by the attacker to retrieve the information.  This website, like the e-mail, will look exactly like the actual bank website.  Once the person types their login information, the attacker then has all the information they needed from the victim.  &lt;br /&gt;
&lt;br /&gt;
Although uncommon, phishing may also be performed over the phone by pretending to be a representative of some company that is requesting some kind of account information.  The attacker may even know some basic information about the victim to prove that they are legitimate.  Usually, a victim will not question the call and will provide the necessary information.  The attacker can then use this information to take advantage of the victim by means of identity or property theft.&lt;br /&gt;
&lt;br /&gt;
===Pretexting===&lt;br /&gt;
[http://www.ftc.gov/bcp/conline/pubs/credit/pretext.shtm Pretexting] is a form of using information about the victim to obtain even more information or to use it against the victim.  Through pretexting the attacker uses the limited information gained to obtain more information.  Once enough information is gained.  The attacker may use credit pretending to be the victim, to make purchases acting as the victim, or to manipulate the records of the victim.&lt;br /&gt;
&lt;br /&gt;
The goal of pretexting is to prove to someone that you are legitimately the victim.  This may be done from proving that you know their name, address, phone number, and Social Security Number.  This could also be done by knowing the victim's username and password that was retrieved through phishing.&lt;br /&gt;
&lt;br /&gt;
===Trojan Horse===&lt;br /&gt;
A [http://www.tech-faq.com/trojan-horse-virus.shtml Trojan Horse] a technological form of social engineering.  Not only does it fool the victim that it is from a legitimate source, but it also fools the computer the victim is using.  A trojan horse is a program that may seem to perform a legitimate action, but in fact is collecting sensitive information or stealing data in the background.  This is, of coruse, derived from the ancient tactic used by the Spartans to invade Troy by pretending to be a gift to the Trojans (which is an ancient example of social engineering).&lt;br /&gt;
&lt;br /&gt;
To be specific, a ''gimme'' is a type of Trojan Horse that plays off of Social Engineering.  This tactic goes in conjunction with spamming or phishing.  The user will receive a pop-up ad or e-mail ad notifying the victim of some software that would benefit them.  Because of their curiosity and the seeming innocence of the program, the victim will install it on their machine.  The software may even perform as advertised, but in the background is obtaining account information and other confidential data.&lt;br /&gt;
&lt;br /&gt;
This is where a computer program pretends to be something it is not.  Instead of an actual human being performing the pretexting, it is an automated computer program.&lt;br /&gt;
&lt;br /&gt;
==Security, Precautions, and Defenses==&lt;br /&gt;
There are many precautions and defenses against social engineering.  However, there is a lack of education on the methods to defend against this tactic.  Various methods include vigorous identity verification, minimizing the amount of people that have sensitive information, as well as reducing the trust level of those in control of information.  Many companies have developed security policies and guidelines that employees should follow to minimize the risk of social engineering exploits.&lt;br /&gt;
&lt;br /&gt;
===Proactive Social Defenses===&lt;br /&gt;
SANS Network Security has a good example of a [http://www.sans.org/reading_room/whitepapers/engineering/511.php brief guide] for employees to maintain a proactive awareness against social engineering.  Through proactive self defense a company should develop a detailed policy on security and data release.  These policy should detailed who is able to release information, what information, and to who that information may be released to. &lt;br /&gt;
&lt;br /&gt;
There should be detailed access approval to any secured area or information.  A company should setup a defense against social engineering by always having a detailed access approval process instead of simply not challenging the requester of information. The company should have a designated help desk and support center that is knowledgeable in the policies of data release.  Information such as employee IDs, account information, and passwords should always be challenged with a detailed approval policy.&lt;br /&gt;
&lt;br /&gt;
By detailing who is allowed to release information and what information can be released, a company can minimize the amount of violations through social-engineering.  Usually social engineering succeeds because there is no preset guideline for giving out information for rare instances that social engineers exploit.&lt;br /&gt;
&lt;br /&gt;
===Employee Training===&lt;br /&gt;
Since the human being is the reason for social engineering exploits, the employee is the number one defense against attacks.  By [http://techrepublic.com.com/5208-6230-0.html?forumID=102&amp;amp;threadID=232696 training the employees through examples], they gain an understanding of how easy it is for social engineering to work.  By training to employees to reduce their trust value and not take request for information at face value, it will discourage the attacker to request any further information.  If in doubt, the employee should never give out confidential information and bring it to the next person in command.&lt;br /&gt;
&lt;br /&gt;
===Security Software and Electronics===&lt;br /&gt;
Since the goal of social engineering exploits are to bypass technological and security barriers, there are few ways to stop social engineering through electronic and software means.  One main way to combat and reduce the risk is to have, in place, strict identity verification technologies that combat counterfeit and impersonation attacks.  Social engineering attacks are so easy because it is so easy to appear legitimate.  If identify verification were scrutinized at both a human and electronic level, the legitimacy of identity would be much harder to prove.&lt;br /&gt;
&lt;br /&gt;
In addition, companies can install [http://ca.com/us/securityadvisor/documents/collateral.aspx?cid=157506 software] that will reduce the amount of social engineering solicitations that employees receive through e-mail and websites.  By filtering out known threatening sources, this software can prevent the employee from even having to worry about making the decision of whether the source is legitimate.&lt;br /&gt;
&lt;br /&gt;
==Legal Concerns==&lt;br /&gt;
In the United States, there are laws against pretexting and falsifying identity.  The [http://en.wikipedia.org/wiki/Gramm-Leach-Bliley_Act Gramm-Leach-Billey Act (GLBA)] makes it illegal to do the following&lt;br /&gt;
&lt;br /&gt;
* To falsify information or make false statements to retrieve information from a financial institution or even a customer of that institution&lt;br /&gt;
&lt;br /&gt;
* To use forged or stolen documents to receive information from a financial institution or a customer of that institution&lt;br /&gt;
&lt;br /&gt;
* Ask another person to obtain information by using the above two means&lt;br /&gt;
&lt;br /&gt;
In addition, the [http://en.wikipedia.org/wiki/Federal_Trade_Commission_Act Federal Trade Commission Act] prohibits pretexting for customer information.&lt;br /&gt;
&lt;br /&gt;
==Study Guide==&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist}}&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/risks/security/precautions/ Security Precautions (Old Project Page)]&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Social_engineering_%28security%29 Social Engineering (Wikipedia)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.securityfocus.com/infocus/1527 Social Engineering Fundamentals]&lt;br /&gt;
&lt;br /&gt;
* [http://searchfinancialsecurity.techtarget.com/tip/0,289483,sid185_gci1294530,00.html Social Engineering Attacks]&lt;br /&gt;
&lt;br /&gt;
* [http://www.sans.org/reading_room/whitepapers/engineering/511.php Proactive Defense to Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://www.morehouse.org/hin/blckcrwl/hack/soceng.txt Social Engineering FAQ]&lt;br /&gt;
&lt;br /&gt;
* [http://www.hackinthebox.org/modules.php?op=modload&amp;amp;name=News&amp;amp;file=article&amp;amp;sid=15170&amp;amp;mode=thread&amp;amp;order=0&amp;amp;thold=0 Social Engineering Defense 101]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cioupdate.com/trends/article.php/3638951 Best Defense Against Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://techrepublic.com.com/5208-6230-0.html?forumID=102&amp;amp;threadID=232696 Social Engineering Self-defense]&lt;br /&gt;
&lt;br /&gt;
* [http://news.cnet.com/8301-1009_3-9995253-83.html Social Engineering: Hackers show how it is done]&lt;br /&gt;
&lt;br /&gt;
* [http://www.infosecwriters.com/text_resources/pdf/Social_Engineering_CRhodes.pdf Safeguarding Against Social Engineering]&lt;/div&gt;</summary>
		<author><name>Cjsoques</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=15040</id>
		<title>Social Engineering</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=15040"/>
		<updated>2008-07-23T18:17:21Z</updated>

		<summary type="html">&lt;p&gt;Cjsoques: /* Ethical and Legal Concerns */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Social engineering a method of fraud and hacking that utilizes the humanity and nature of people to retrieve information from them voluntarily.  By playing into the nature of the person, hacking through technological means is sometimes not necessary.  If one can fool a person into giving away information voluntarily, then creating a program or hack to retrieve that information involuntarily is no required.  Furthermore, it can be much simpler and efficient to get information from someone through social engineering than it would ever be to steal that information via a computer program or password cracker.  &lt;br /&gt;
&lt;br /&gt;
This form of forcing users to disclose information must be done through some human means.  The point of social engineering is to utilize the fallacies of human logic and biases to trick the target into revealing confidential information through various methods and tactics.&lt;br /&gt;
&lt;br /&gt;
The precautions necessary against social engineering are required to be very proactive.  For example, you can put an anti virus program that will passively scan your computer for viruses automatically. However, the human must be actively on the defense for social engineering tricks and tactics that may be used against them.  Over the years, general guidelines for companies and employees have been developed to give the knowledge necessary to be vigilant and alert for social engineering fraud attempts.&lt;br /&gt;
&lt;br /&gt;
==Tactics and Methods==&lt;br /&gt;
There are various means of utilizing social engineering to obtain confidential and secret information such as passwords and private data.  All of these methods work through some medium in which the attacker has to actually converse with the victim in some way, whether directly or indirectly.  In all methods, feedback from the victim is required.  This feedback is usually the necessary information the attacker was looking for.&lt;br /&gt;
&lt;br /&gt;
Although social engineering tactics are heavily performed through electronic and computer mediums.  There are many methods in which social engineering can be done through the physical realm.  As long as there can be some form of communication between the attacker and the victim any medium may be used.  Social engineering is so successful because it takes advantage of the fallacies of the human being.  Whether by means of flattery, impersonation, and greed; social engineering is considered to some an art form of psychology.&lt;br /&gt;
&lt;br /&gt;
Social Engineering can be extremely simple to perform, but have dire effects and consequences.  There are even [http://news.cnet.com/8301-1009_3-9995253-83.html guides and tips] on how hackers have used social engineering in extremely simple ways.  Social engineering is considered so dangerous that [http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick], a renouned hacker and early user of social enginering, was considered the most dangerous hacker.  By using social engineering, the FBI though that Mitnick could start a nuclear war by simply utilizing social engineering.  &lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
The main way of retrieving electronic information from victim voluntarily is through [http://en.wikipedia.org/wiki/Phishing phishing].  Phishing, like social engineering, can be performed over various electronic and physical mediums.  In a general term, phishing is pretending to be something legitimate, when you are not.  When you fool the victim into thinking you are the legitimate source that is being faked, they will reveal all the information that would normally be required to use that source.  This may include account numbers, usernames, passwords, or even Social Security Numbers.&lt;br /&gt;
&lt;br /&gt;
A major medium of phishing is through e-mail.  The example of a bank and customer is extremely common.  The attacker will send the victim an e-mail notifying them of some required account information to be updated.  This e-mail will look exactly like the standard e-mail the victim may have received from the bank before.  The victim will be required to login and update their information as soon as possible.  However, the link will not be sent to the bank website, but to a separate server that was setup by the attacker to retrieve the information.  This website, like the e-mail, will look exactly like the actual bank website.  Once the person types their login information, the attacker then has all the information they needed from the victim.  &lt;br /&gt;
&lt;br /&gt;
Although uncommon, phishing may also be performed over the phone by pretending to be a representative of some company that is requesting some kind of account information.  The attacker may even know some basic information about the victim to prove that they are legitimate.  Usually, a victim will not question the call and will provide the necessary information.  The attacker can then use this information to take advantage of the victim by means of identity or property theft.&lt;br /&gt;
&lt;br /&gt;
===Pretexting===&lt;br /&gt;
[http://www.ftc.gov/bcp/conline/pubs/credit/pretext.shtm Pretexting] is a form of using information about the victim to obtain even more information or to use it against the victim.  Through pretexting the attacker uses the limited information gained to obtain more information.  Once enough information is gained.  The attacker may use credit pretending to be the victim, to make purchases acting as the victim, or to manipulate the records of the victim.&lt;br /&gt;
&lt;br /&gt;
The goal of pretexting is to prove to someone that you are legitimately the victim.  This may be done from proving that you know their name, address, phone number, and Social Security Number.  This could also be done by knowing the victim's username and password that was retrieved through phishing.&lt;br /&gt;
&lt;br /&gt;
===Trojan Horse===&lt;br /&gt;
A [http://www.tech-faq.com/trojan-horse-virus.shtml Trojan Horse] a technological form of social engineering.  Not only does it fool the victim that it is from a legitimate source, but it also fools the computer the victim is using.  A trojan horse is a program that may seem to perform a legitimate action, but in fact is collecting sensitive information or stealing data in the background.  This is, of coruse, derived from the ancient tactic used by the Spartans to invade Troy by pretending to be a gift to the Trojans (which is an ancient example of social engineering).&lt;br /&gt;
&lt;br /&gt;
To be specific, a ''gimme'' is a type of Trojan Horse that plays off of Social Engineering.  This tactic goes in conjunction with spamming or phishing.  The user will receive a pop-up ad or e-mail ad notifying the victim of some software that would benefit them.  Because of their curiosity and the seeming innocence of the program, the victim will install it on their machine.  The software may even perform as advertised, but in the background is obtaining account information and other confidential data.&lt;br /&gt;
&lt;br /&gt;
This is where a computer program pretends to be something it is not.  Instead of an actual human being performing the pretexting, it is an automated computer program.&lt;br /&gt;
&lt;br /&gt;
==Security, Precautions, and Defenses==&lt;br /&gt;
There are many precautions and defenses against social engineering.  However, there is a lack of education on the methods to defend against this tactic.  Various methods include vigorous identity verification, minimizing the amount of people that have sensitive information, as well as reducing the trust level of those in control of information.  Many companies have developed security policies and guidelines that employees should follow to minimize the risk of social engineering exploits.&lt;br /&gt;
&lt;br /&gt;
===Proactive Social Defenses===&lt;br /&gt;
SANS Network Security has a good example of a [http://www.sans.org/reading_room/whitepapers/engineering/511.php brief guide] for employees to maintain a proactive awareness against social engineering.  Through proactive self defense a company should develop a detailed policy on security and data release.  These policy should detailed who is able to release information, what information, and to who that information may be released to. &lt;br /&gt;
&lt;br /&gt;
There should be detailed access approval to any secured area or information.  A company should setup a defense against social engineering by always having a detailed access approval process instead of simply not challenging the requester of information. The company should have a designated help desk and support center that is knowledgeable in the policies of data release.  Information such as employee IDs, account information, and passwords should always be challenged with a detailed approval policy.&lt;br /&gt;
&lt;br /&gt;
By detailing who is allowed to release information and what information can be released, a company can minimize the amount of violations through social-engineering.  Usually social engineering succeeds because there is no preset guideline for giving out information for rare instances that social engineers exploit.&lt;br /&gt;
&lt;br /&gt;
===Employee Training===&lt;br /&gt;
Since the human being is the reason for social engineering exploits, the employee is the number one defense against attacks.  By [http://techrepublic.com.com/5208-6230-0.html?forumID=102&amp;amp;threadID=232696 training the employees through examples], they gain an understanding of how easy it is for social engineering to work.  By training to employees to reduce their trust value and not take request for information at face value, it will discourage the attacker to request any further information.  If in doubt, the employee should never give out confidential information and bring it to the next person in command.&lt;br /&gt;
&lt;br /&gt;
===Security Software and Electronics===&lt;br /&gt;
Since the goal of social engineering exploits are to bypass technological and security barriers, there are few ways to stop social engineering through electronic and software means.  One main way to combat and reduce the risk is to have, in place, strict identity verification technologies that combat counterfeit and impersonation attacks.  Social engineering attacks are so easy because it is so easy to appear legitimate.  If identify verification were scrutinized at both a human and electronic level, the legitimacy of identity would be much harder to prove.&lt;br /&gt;
&lt;br /&gt;
In addition, companies can install [http://ca.com/us/securityadvisor/documents/collateral.aspx?cid=157506 software] that will reduce the amount of social engineering solicitations that employees receive through e-mail and websites.  By filtering out known threatening sources, this software can prevent the employee from even having to worry about making the decision of whether the source is legitimate.&lt;br /&gt;
&lt;br /&gt;
==Ethical and Legal Concerns==&lt;br /&gt;
In the United States, there are laws against pretexting and falsifying identity.  The [http://en.wikipedia.org/wiki/Gramm-Leach-Bliley_Act Gramm-Leach-Billey Act (GLBA)] makes it illegal to do the following&lt;br /&gt;
&lt;br /&gt;
* To falsify information or make false statements to retrieve information from a financial institution or even a customer of that institution&lt;br /&gt;
&lt;br /&gt;
* To use forged or stolen documents to receive information from a financial institution or a customer of that institution&lt;br /&gt;
&lt;br /&gt;
* Ask another person to obtain information by using the above two means&lt;br /&gt;
&lt;br /&gt;
In addition, the [http://en.wikipedia.org/wiki/Federal_Trade_Commission_Act Federal Trade Commission Act] prohibits pretexting for customer information.&lt;br /&gt;
&lt;br /&gt;
==Study Guide==&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist}}&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/risks/security/precautions/ Security Precautions (Old Project Page)]&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Social_engineering_%28security%29 Social Engineering (Wikipedia)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.securityfocus.com/infocus/1527 Social Engineering Fundamentals]&lt;br /&gt;
&lt;br /&gt;
* [http://searchfinancialsecurity.techtarget.com/tip/0,289483,sid185_gci1294530,00.html Social Engineering Attacks]&lt;br /&gt;
&lt;br /&gt;
* [http://www.sans.org/reading_room/whitepapers/engineering/511.php Proactive Defense to Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://www.morehouse.org/hin/blckcrwl/hack/soceng.txt Social Engineering FAQ]&lt;br /&gt;
&lt;br /&gt;
* [http://www.hackinthebox.org/modules.php?op=modload&amp;amp;name=News&amp;amp;file=article&amp;amp;sid=15170&amp;amp;mode=thread&amp;amp;order=0&amp;amp;thold=0 Social Engineering Defense 101]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cioupdate.com/trends/article.php/3638951 Best Defense Against Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://techrepublic.com.com/5208-6230-0.html?forumID=102&amp;amp;threadID=232696 Social Engineering Self-defense]&lt;br /&gt;
&lt;br /&gt;
* [http://news.cnet.com/8301-1009_3-9995253-83.html Social Engineering: Hackers show how it is done]&lt;br /&gt;
&lt;br /&gt;
* [http://www.infosecwriters.com/text_resources/pdf/Social_Engineering_CRhodes.pdf Safeguarding Against Social Engineering]&lt;/div&gt;</summary>
		<author><name>Cjsoques</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=15039</id>
		<title>Social Engineering</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=15039"/>
		<updated>2008-07-23T17:53:29Z</updated>

		<summary type="html">&lt;p&gt;Cjsoques: /* =Security Software and Electronics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Social engineering a method of fraud and hacking that utilizes the humanity and nature of people to retrieve information from them voluntarily.  By playing into the nature of the person, hacking through technological means is sometimes not necessary.  If one can fool a person into giving away information voluntarily, then creating a program or hack to retrieve that information involuntarily is no required.  Furthermore, it can be much simpler and efficient to get information from someone through social engineering than it would ever be to steal that information via a computer program or password cracker.  &lt;br /&gt;
&lt;br /&gt;
This form of forcing users to disclose information must be done through some human means.  The point of social engineering is to utilize the fallacies of human logic and biases to trick the target into revealing confidential information through various methods and tactics.&lt;br /&gt;
&lt;br /&gt;
The precautions necessary against social engineering are required to be very proactive.  For example, you can put an anti virus program that will passively scan your computer for viruses automatically. However, the human must be actively on the defense for social engineering tricks and tactics that may be used against them.  Over the years, general guidelines for companies and employees have been developed to give the knowledge necessary to be vigilant and alert for social engineering fraud attempts.&lt;br /&gt;
&lt;br /&gt;
==Tactics and Methods==&lt;br /&gt;
There are various means of utilizing social engineering to obtain confidential and secret information such as passwords and private data.  All of these methods work through some medium in which the attacker has to actually converse with the victim in some way, whether directly or indirectly.  In all methods, feedback from the victim is required.  This feedback is usually the necessary information the attacker was looking for.&lt;br /&gt;
&lt;br /&gt;
Although social engineering tactics are heavily performed through electronic and computer mediums.  There are many methods in which social engineering can be done through the physical realm.  As long as there can be some form of communication between the attacker and the victim any medium may be used.  Social engineering is so successful because it takes advantage of the fallacies of the human being.  Whether by means of flattery, impersonation, and greed; social engineering is considered to some an art form of psychology.&lt;br /&gt;
&lt;br /&gt;
Social Engineering can be extremely simple to perform, but have dire effects and consequences.  There are even [http://news.cnet.com/8301-1009_3-9995253-83.html guides and tips] on how hackers have used social engineering in extremely simple ways.  Social engineering is considered so dangerous that [http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick], a renouned hacker and early user of social enginering, was considered the most dangerous hacker.  By using social engineering, the FBI though that Mitnick could start a nuclear war by simply utilizing social engineering.  &lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
The main way of retrieving electronic information from victim voluntarily is through [http://en.wikipedia.org/wiki/Phishing phishing].  Phishing, like social engineering, can be performed over various electronic and physical mediums.  In a general term, phishing is pretending to be something legitimate, when you are not.  When you fool the victim into thinking you are the legitimate source that is being faked, they will reveal all the information that would normally be required to use that source.  This may include account numbers, usernames, passwords, or even Social Security Numbers.&lt;br /&gt;
&lt;br /&gt;
A major medium of phishing is through e-mail.  The example of a bank and customer is extremely common.  The attacker will send the victim an e-mail notifying them of some required account information to be updated.  This e-mail will look exactly like the standard e-mail the victim may have received from the bank before.  The victim will be required to login and update their information as soon as possible.  However, the link will not be sent to the bank website, but to a separate server that was setup by the attacker to retrieve the information.  This website, like the e-mail, will look exactly like the actual bank website.  Once the person types their login information, the attacker then has all the information they needed from the victim.  &lt;br /&gt;
&lt;br /&gt;
Although uncommon, phishing may also be performed over the phone by pretending to be a representative of some company that is requesting some kind of account information.  The attacker may even know some basic information about the victim to prove that they are legitimate.  Usually, a victim will not question the call and will provide the necessary information.  The attacker can then use this information to take advantage of the victim by means of identity or property theft.&lt;br /&gt;
&lt;br /&gt;
===Pretexting===&lt;br /&gt;
[http://www.ftc.gov/bcp/conline/pubs/credit/pretext.shtm Pretexting] is a form of using information about the victim to obtain even more information or to use it against the victim.  Through pretexting the attacker uses the limited information gained to obtain more information.  Once enough information is gained.  The attacker may use credit pretending to be the victim, to make purchases acting as the victim, or to manipulate the records of the victim.&lt;br /&gt;
&lt;br /&gt;
The goal of pretexting is to prove to someone that you are legitimately the victim.  This may be done from proving that you know their name, address, phone number, and Social Security Number.  This could also be done by knowing the victim's username and password that was retrieved through phishing.&lt;br /&gt;
&lt;br /&gt;
===Trojan Horse===&lt;br /&gt;
A [http://www.tech-faq.com/trojan-horse-virus.shtml Trojan Horse] a technological form of social engineering.  Not only does it fool the victim that it is from a legitimate source, but it also fools the computer the victim is using.  A trojan horse is a program that may seem to perform a legitimate action, but in fact is collecting sensitive information or stealing data in the background.  This is, of coruse, derived from the ancient tactic used by the Spartans to invade Troy by pretending to be a gift to the Trojans (which is an ancient example of social engineering).&lt;br /&gt;
&lt;br /&gt;
To be specific, a ''gimme'' is a type of Trojan Horse that plays off of Social Engineering.  This tactic goes in conjunction with spamming or phishing.  The user will receive a pop-up ad or e-mail ad notifying the victim of some software that would benefit them.  Because of their curiosity and the seeming innocence of the program, the victim will install it on their machine.  The software may even perform as advertised, but in the background is obtaining account information and other confidential data.&lt;br /&gt;
&lt;br /&gt;
This is where a computer program pretends to be something it is not.  Instead of an actual human being performing the pretexting, it is an automated computer program.&lt;br /&gt;
&lt;br /&gt;
==Security, Precautions, and Defenses==&lt;br /&gt;
There are many precautions and defenses against social engineering.  However, there is a lack of education on the methods to defend against this tactic.  Various methods include vigorous identity verification, minimizing the amount of people that have sensitive information, as well as reducing the trust level of those in control of information.  Many companies have developed security policies and guidelines that employees should follow to minimize the risk of social engineering exploits.&lt;br /&gt;
&lt;br /&gt;
===Proactive Social Defenses===&lt;br /&gt;
SANS Network Security has a good example of a [http://www.sans.org/reading_room/whitepapers/engineering/511.php brief guide] for employees to maintain a proactive awareness against social engineering.  Through proactive self defense a company should develop a detailed policy on security and data release.  These policy should detailed who is able to release information, what information, and to who that information may be released to. &lt;br /&gt;
&lt;br /&gt;
There should be detailed access approval to any secured area or information.  A company should setup a defense against social engineering by always having a detailed access approval process instead of simply not challenging the requester of information. The company should have a designated help desk and support center that is knowledgeable in the policies of data release.  Information such as employee IDs, account information, and passwords should always be challenged with a detailed approval policy.&lt;br /&gt;
&lt;br /&gt;
By detailing who is allowed to release information and what information can be released, a company can minimize the amount of violations through social-engineering.  Usually social engineering succeeds because there is no preset guideline for giving out information for rare instances that social engineers exploit.&lt;br /&gt;
&lt;br /&gt;
===Employee Training===&lt;br /&gt;
Since the human being is the reason for social engineering exploits, the employee is the number one defense against attacks.  By [http://techrepublic.com.com/5208-6230-0.html?forumID=102&amp;amp;threadID=232696 training the employees through examples], they gain an understanding of how easy it is for social engineering to work.  By training to employees to reduce their trust value and not take request for information at face value, it will discourage the attacker to request any further information.  If in doubt, the employee should never give out confidential information and bring it to the next person in command.&lt;br /&gt;
&lt;br /&gt;
===Security Software and Electronics===&lt;br /&gt;
Since the goal of social engineering exploits are to bypass technological and security barriers, there are few ways to stop social engineering through electronic and software means.  One main way to combat and reduce the risk is to have, in place, strict identity verification technologies that combat counterfeit and impersonation attacks.  Social engineering attacks are so easy because it is so easy to appear legitimate.  If identify verification were scrutinized at both a human and electronic level, the legitimacy of identity would be much harder to prove.&lt;br /&gt;
&lt;br /&gt;
In addition, companies can install [http://ca.com/us/securityadvisor/documents/collateral.aspx?cid=157506 software] that will reduce the amount of social engineering solicitations that employees receive through e-mail and websites.  By filtering out known threatening sources, this software can prevent the employee from even having to worry about making the decision of whether the source is legitimate.&lt;br /&gt;
&lt;br /&gt;
==Ethical and Legal Concerns==&lt;br /&gt;
&lt;br /&gt;
==Study Guide==&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist}}&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/risks/security/precautions/ Security Precautions (Old Project Page)]&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Social_engineering_%28security%29 Social Engineering (Wikipedia)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.securityfocus.com/infocus/1527 Social Engineering Fundamentals]&lt;br /&gt;
&lt;br /&gt;
* [http://searchfinancialsecurity.techtarget.com/tip/0,289483,sid185_gci1294530,00.html Social Engineering Attacks]&lt;br /&gt;
&lt;br /&gt;
* [http://www.sans.org/reading_room/whitepapers/engineering/511.php Proactive Defense to Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://www.morehouse.org/hin/blckcrwl/hack/soceng.txt Social Engineering FAQ]&lt;br /&gt;
&lt;br /&gt;
* [http://www.hackinthebox.org/modules.php?op=modload&amp;amp;name=News&amp;amp;file=article&amp;amp;sid=15170&amp;amp;mode=thread&amp;amp;order=0&amp;amp;thold=0 Social Engineering Defense 101]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cioupdate.com/trends/article.php/3638951 Best Defense Against Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://techrepublic.com.com/5208-6230-0.html?forumID=102&amp;amp;threadID=232696 Social Engineering Self-defense]&lt;br /&gt;
&lt;br /&gt;
* [http://news.cnet.com/8301-1009_3-9995253-83.html Social Engineering: Hackers show how it is done]&lt;br /&gt;
&lt;br /&gt;
* [http://www.infosecwriters.com/text_resources/pdf/Social_Engineering_CRhodes.pdf Safeguarding Against Social Engineering]&lt;/div&gt;</summary>
		<author><name>Cjsoques</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=15038</id>
		<title>Social Engineering</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=15038"/>
		<updated>2008-07-23T17:53:12Z</updated>

		<summary type="html">&lt;p&gt;Cjsoques: /* Security, Precautions, and Defenses */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Social engineering a method of fraud and hacking that utilizes the humanity and nature of people to retrieve information from them voluntarily.  By playing into the nature of the person, hacking through technological means is sometimes not necessary.  If one can fool a person into giving away information voluntarily, then creating a program or hack to retrieve that information involuntarily is no required.  Furthermore, it can be much simpler and efficient to get information from someone through social engineering than it would ever be to steal that information via a computer program or password cracker.  &lt;br /&gt;
&lt;br /&gt;
This form of forcing users to disclose information must be done through some human means.  The point of social engineering is to utilize the fallacies of human logic and biases to trick the target into revealing confidential information through various methods and tactics.&lt;br /&gt;
&lt;br /&gt;
The precautions necessary against social engineering are required to be very proactive.  For example, you can put an anti virus program that will passively scan your computer for viruses automatically. However, the human must be actively on the defense for social engineering tricks and tactics that may be used against them.  Over the years, general guidelines for companies and employees have been developed to give the knowledge necessary to be vigilant and alert for social engineering fraud attempts.&lt;br /&gt;
&lt;br /&gt;
==Tactics and Methods==&lt;br /&gt;
There are various means of utilizing social engineering to obtain confidential and secret information such as passwords and private data.  All of these methods work through some medium in which the attacker has to actually converse with the victim in some way, whether directly or indirectly.  In all methods, feedback from the victim is required.  This feedback is usually the necessary information the attacker was looking for.&lt;br /&gt;
&lt;br /&gt;
Although social engineering tactics are heavily performed through electronic and computer mediums.  There are many methods in which social engineering can be done through the physical realm.  As long as there can be some form of communication between the attacker and the victim any medium may be used.  Social engineering is so successful because it takes advantage of the fallacies of the human being.  Whether by means of flattery, impersonation, and greed; social engineering is considered to some an art form of psychology.&lt;br /&gt;
&lt;br /&gt;
Social Engineering can be extremely simple to perform, but have dire effects and consequences.  There are even [http://news.cnet.com/8301-1009_3-9995253-83.html guides and tips] on how hackers have used social engineering in extremely simple ways.  Social engineering is considered so dangerous that [http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick], a renouned hacker and early user of social enginering, was considered the most dangerous hacker.  By using social engineering, the FBI though that Mitnick could start a nuclear war by simply utilizing social engineering.  &lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
The main way of retrieving electronic information from victim voluntarily is through [http://en.wikipedia.org/wiki/Phishing phishing].  Phishing, like social engineering, can be performed over various electronic and physical mediums.  In a general term, phishing is pretending to be something legitimate, when you are not.  When you fool the victim into thinking you are the legitimate source that is being faked, they will reveal all the information that would normally be required to use that source.  This may include account numbers, usernames, passwords, or even Social Security Numbers.&lt;br /&gt;
&lt;br /&gt;
A major medium of phishing is through e-mail.  The example of a bank and customer is extremely common.  The attacker will send the victim an e-mail notifying them of some required account information to be updated.  This e-mail will look exactly like the standard e-mail the victim may have received from the bank before.  The victim will be required to login and update their information as soon as possible.  However, the link will not be sent to the bank website, but to a separate server that was setup by the attacker to retrieve the information.  This website, like the e-mail, will look exactly like the actual bank website.  Once the person types their login information, the attacker then has all the information they needed from the victim.  &lt;br /&gt;
&lt;br /&gt;
Although uncommon, phishing may also be performed over the phone by pretending to be a representative of some company that is requesting some kind of account information.  The attacker may even know some basic information about the victim to prove that they are legitimate.  Usually, a victim will not question the call and will provide the necessary information.  The attacker can then use this information to take advantage of the victim by means of identity or property theft.&lt;br /&gt;
&lt;br /&gt;
===Pretexting===&lt;br /&gt;
[http://www.ftc.gov/bcp/conline/pubs/credit/pretext.shtm Pretexting] is a form of using information about the victim to obtain even more information or to use it against the victim.  Through pretexting the attacker uses the limited information gained to obtain more information.  Once enough information is gained.  The attacker may use credit pretending to be the victim, to make purchases acting as the victim, or to manipulate the records of the victim.&lt;br /&gt;
&lt;br /&gt;
The goal of pretexting is to prove to someone that you are legitimately the victim.  This may be done from proving that you know their name, address, phone number, and Social Security Number.  This could also be done by knowing the victim's username and password that was retrieved through phishing.&lt;br /&gt;
&lt;br /&gt;
===Trojan Horse===&lt;br /&gt;
A [http://www.tech-faq.com/trojan-horse-virus.shtml Trojan Horse] a technological form of social engineering.  Not only does it fool the victim that it is from a legitimate source, but it also fools the computer the victim is using.  A trojan horse is a program that may seem to perform a legitimate action, but in fact is collecting sensitive information or stealing data in the background.  This is, of coruse, derived from the ancient tactic used by the Spartans to invade Troy by pretending to be a gift to the Trojans (which is an ancient example of social engineering).&lt;br /&gt;
&lt;br /&gt;
To be specific, a ''gimme'' is a type of Trojan Horse that plays off of Social Engineering.  This tactic goes in conjunction with spamming or phishing.  The user will receive a pop-up ad or e-mail ad notifying the victim of some software that would benefit them.  Because of their curiosity and the seeming innocence of the program, the victim will install it on their machine.  The software may even perform as advertised, but in the background is obtaining account information and other confidential data.&lt;br /&gt;
&lt;br /&gt;
This is where a computer program pretends to be something it is not.  Instead of an actual human being performing the pretexting, it is an automated computer program.&lt;br /&gt;
&lt;br /&gt;
==Security, Precautions, and Defenses==&lt;br /&gt;
There are many precautions and defenses against social engineering.  However, there is a lack of education on the methods to defend against this tactic.  Various methods include vigorous identity verification, minimizing the amount of people that have sensitive information, as well as reducing the trust level of those in control of information.  Many companies have developed security policies and guidelines that employees should follow to minimize the risk of social engineering exploits.&lt;br /&gt;
&lt;br /&gt;
===Proactive Social Defenses===&lt;br /&gt;
SANS Network Security has a good example of a [http://www.sans.org/reading_room/whitepapers/engineering/511.php brief guide] for employees to maintain a proactive awareness against social engineering.  Through proactive self defense a company should develop a detailed policy on security and data release.  These policy should detailed who is able to release information, what information, and to who that information may be released to. &lt;br /&gt;
&lt;br /&gt;
There should be detailed access approval to any secured area or information.  A company should setup a defense against social engineering by always having a detailed access approval process instead of simply not challenging the requester of information. The company should have a designated help desk and support center that is knowledgeable in the policies of data release.  Information such as employee IDs, account information, and passwords should always be challenged with a detailed approval policy.&lt;br /&gt;
&lt;br /&gt;
By detailing who is allowed to release information and what information can be released, a company can minimize the amount of violations through social-engineering.  Usually social engineering succeeds because there is no preset guideline for giving out information for rare instances that social engineers exploit.&lt;br /&gt;
&lt;br /&gt;
===Employee Training===&lt;br /&gt;
Since the human being is the reason for social engineering exploits, the employee is the number one defense against attacks.  By [http://techrepublic.com.com/5208-6230-0.html?forumID=102&amp;amp;threadID=232696 training the employees through examples], they gain an understanding of how easy it is for social engineering to work.  By training to employees to reduce their trust value and not take request for information at face value, it will discourage the attacker to request any further information.  If in doubt, the employee should never give out confidential information and bring it to the next person in command.&lt;br /&gt;
&lt;br /&gt;
===Security Software and Electronics==&lt;br /&gt;
Since the goal of social engineering exploits are to bypass technological and security barriers, there are few ways to stop social engineering through electronic and software means.  One main way to combat and reduce the risk is to have, in place, strict identity verification technologies that combat counterfeit and impersonation attacks.  Social engineering attacks are so easy because it is so easy to appear legitimate.  If identify verification were scrutinized at both a human and electronic level, the legitimacy of identity would be much harder to prove.&lt;br /&gt;
&lt;br /&gt;
In addition, companies can install [http://ca.com/us/securityadvisor/documents/collateral.aspx?cid=157506 software] that will reduce the amount of social engineering solicitations that employees receive through e-mail and websites.  By filtering out known threatening sources, this software can prevent the employee from even having to worry about making the decision of whether the source is legitimate.&lt;br /&gt;
&lt;br /&gt;
==Ethical and Legal Concerns==&lt;br /&gt;
&lt;br /&gt;
==Study Guide==&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist}}&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/risks/security/precautions/ Security Precautions (Old Project Page)]&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Social_engineering_%28security%29 Social Engineering (Wikipedia)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.securityfocus.com/infocus/1527 Social Engineering Fundamentals]&lt;br /&gt;
&lt;br /&gt;
* [http://searchfinancialsecurity.techtarget.com/tip/0,289483,sid185_gci1294530,00.html Social Engineering Attacks]&lt;br /&gt;
&lt;br /&gt;
* [http://www.sans.org/reading_room/whitepapers/engineering/511.php Proactive Defense to Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://www.morehouse.org/hin/blckcrwl/hack/soceng.txt Social Engineering FAQ]&lt;br /&gt;
&lt;br /&gt;
* [http://www.hackinthebox.org/modules.php?op=modload&amp;amp;name=News&amp;amp;file=article&amp;amp;sid=15170&amp;amp;mode=thread&amp;amp;order=0&amp;amp;thold=0 Social Engineering Defense 101]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cioupdate.com/trends/article.php/3638951 Best Defense Against Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://techrepublic.com.com/5208-6230-0.html?forumID=102&amp;amp;threadID=232696 Social Engineering Self-defense]&lt;br /&gt;
&lt;br /&gt;
* [http://news.cnet.com/8301-1009_3-9995253-83.html Social Engineering: Hackers show how it is done]&lt;br /&gt;
&lt;br /&gt;
* [http://www.infosecwriters.com/text_resources/pdf/Social_Engineering_CRhodes.pdf Safeguarding Against Social Engineering]&lt;/div&gt;</summary>
		<author><name>Cjsoques</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=15037</id>
		<title>Social Engineering</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=15037"/>
		<updated>2008-07-23T17:44:34Z</updated>

		<summary type="html">&lt;p&gt;Cjsoques: /* External Links */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Social engineering a method of fraud and hacking that utilizes the humanity and nature of people to retrieve information from them voluntarily.  By playing into the nature of the person, hacking through technological means is sometimes not necessary.  If one can fool a person into giving away information voluntarily, then creating a program or hack to retrieve that information involuntarily is no required.  Furthermore, it can be much simpler and efficient to get information from someone through social engineering than it would ever be to steal that information via a computer program or password cracker.  &lt;br /&gt;
&lt;br /&gt;
This form of forcing users to disclose information must be done through some human means.  The point of social engineering is to utilize the fallacies of human logic and biases to trick the target into revealing confidential information through various methods and tactics.&lt;br /&gt;
&lt;br /&gt;
The precautions necessary against social engineering are required to be very proactive.  For example, you can put an anti virus program that will passively scan your computer for viruses automatically. However, the human must be actively on the defense for social engineering tricks and tactics that may be used against them.  Over the years, general guidelines for companies and employees have been developed to give the knowledge necessary to be vigilant and alert for social engineering fraud attempts.&lt;br /&gt;
&lt;br /&gt;
==Tactics and Methods==&lt;br /&gt;
There are various means of utilizing social engineering to obtain confidential and secret information such as passwords and private data.  All of these methods work through some medium in which the attacker has to actually converse with the victim in some way, whether directly or indirectly.  In all methods, feedback from the victim is required.  This feedback is usually the necessary information the attacker was looking for.&lt;br /&gt;
&lt;br /&gt;
Although social engineering tactics are heavily performed through electronic and computer mediums.  There are many methods in which social engineering can be done through the physical realm.  As long as there can be some form of communication between the attacker and the victim any medium may be used.  Social engineering is so successful because it takes advantage of the fallacies of the human being.  Whether by means of flattery, impersonation, and greed; social engineering is considered to some an art form of psychology.&lt;br /&gt;
&lt;br /&gt;
Social Engineering can be extremely simple to perform, but have dire effects and consequences.  There are even [http://news.cnet.com/8301-1009_3-9995253-83.html guides and tips] on how hackers have used social engineering in extremely simple ways.  Social engineering is considered so dangerous that [http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick], a renouned hacker and early user of social enginering, was considered the most dangerous hacker.  By using social engineering, the FBI though that Mitnick could start a nuclear war by simply utilizing social engineering.  &lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
The main way of retrieving electronic information from victim voluntarily is through [http://en.wikipedia.org/wiki/Phishing phishing].  Phishing, like social engineering, can be performed over various electronic and physical mediums.  In a general term, phishing is pretending to be something legitimate, when you are not.  When you fool the victim into thinking you are the legitimate source that is being faked, they will reveal all the information that would normally be required to use that source.  This may include account numbers, usernames, passwords, or even Social Security Numbers.&lt;br /&gt;
&lt;br /&gt;
A major medium of phishing is through e-mail.  The example of a bank and customer is extremely common.  The attacker will send the victim an e-mail notifying them of some required account information to be updated.  This e-mail will look exactly like the standard e-mail the victim may have received from the bank before.  The victim will be required to login and update their information as soon as possible.  However, the link will not be sent to the bank website, but to a separate server that was setup by the attacker to retrieve the information.  This website, like the e-mail, will look exactly like the actual bank website.  Once the person types their login information, the attacker then has all the information they needed from the victim.  &lt;br /&gt;
&lt;br /&gt;
Although uncommon, phishing may also be performed over the phone by pretending to be a representative of some company that is requesting some kind of account information.  The attacker may even know some basic information about the victim to prove that they are legitimate.  Usually, a victim will not question the call and will provide the necessary information.  The attacker can then use this information to take advantage of the victim by means of identity or property theft.&lt;br /&gt;
&lt;br /&gt;
===Pretexting===&lt;br /&gt;
[http://www.ftc.gov/bcp/conline/pubs/credit/pretext.shtm Pretexting] is a form of using information about the victim to obtain even more information or to use it against the victim.  Through pretexting the attacker uses the limited information gained to obtain more information.  Once enough information is gained.  The attacker may use credit pretending to be the victim, to make purchases acting as the victim, or to manipulate the records of the victim.&lt;br /&gt;
&lt;br /&gt;
The goal of pretexting is to prove to someone that you are legitimately the victim.  This may be done from proving that you know their name, address, phone number, and Social Security Number.  This could also be done by knowing the victim's username and password that was retrieved through phishing.&lt;br /&gt;
&lt;br /&gt;
===Trojan Horse===&lt;br /&gt;
A [http://www.tech-faq.com/trojan-horse-virus.shtml Trojan Horse] a technological form of social engineering.  Not only does it fool the victim that it is from a legitimate source, but it also fools the computer the victim is using.  A trojan horse is a program that may seem to perform a legitimate action, but in fact is collecting sensitive information or stealing data in the background.  This is, of coruse, derived from the ancient tactic used by the Spartans to invade Troy by pretending to be a gift to the Trojans (which is an ancient example of social engineering).&lt;br /&gt;
&lt;br /&gt;
To be specific, a ''gimme'' is a type of Trojan Horse that plays off of Social Engineering.  This tactic goes in conjunction with spamming or phishing.  The user will receive a pop-up ad or e-mail ad notifying the victim of some software that would benefit them.  Because of their curiosity and the seeming innocence of the program, the victim will install it on their machine.  The software may even perform as advertised, but in the background is obtaining account information and other confidential data.&lt;br /&gt;
&lt;br /&gt;
This is where a computer program pretends to be something it is not.  Instead of an actual human being performing the pretexting, it is an automated computer program.&lt;br /&gt;
&lt;br /&gt;
==Security, Precautions, and Defenses==&lt;br /&gt;
There are many precautions and defenses against social engineering.  However, there is a lack of education on the methods to defend against this tactic.  Various methods include vigorous identity verification, minimizing the amount of people that have sensitive information, as well as reducing the trust level of those in control of information.  Many companies have developed security policies and guidelines that employees should follow to minimize the risk of social engineering exploits.&lt;br /&gt;
&lt;br /&gt;
===Proactive Social Defenses===&lt;br /&gt;
SANS Network Security has a good example of a [http://www.sans.org/reading_room/whitepapers/engineering/511.php brief guide] for employees to maintain a proactive awareness against social engineering.  Through proactive self defense a company should develop a detailed policy on security and data release.  These policy should detailed who is able to release information, what information, and to who that information may be released to. &lt;br /&gt;
&lt;br /&gt;
There should be detailed access approval to any secured area or information.  A company should setup a defense against social engineering by always having a detailed access approval process instead of simply not challenging the requester of information. The company should have a designated help desk and support center that is knowledgeable in the policies of data release.  Information such as employee IDs, account information, and passwords should always be challenged with a detailed approval policy.&lt;br /&gt;
&lt;br /&gt;
By detailing who is allowed to release information and what information can be released, a company can minimize the amount of violations through social-engineering.  Usually social engineering succeeds because there is no preset guideline for giving out information for rare instances that social engineers exploit.&lt;br /&gt;
&lt;br /&gt;
===Employee Training===&lt;br /&gt;
Since the human being is the reason for social engineering exploits, the employee is the number one defense against attacks.  By [http://techrepublic.com.com/5208-6230-0.html?forumID=102&amp;amp;threadID=232696 training the employees through examples], they gain an understanding of how easy it is for social engineering to work.  By training to employees to reduce their trust value and not take request for information at face value, it will discourage the attacker to request any further information.  If in doubt, the employee should never give out confidential information and bring it to the next person in command.&lt;br /&gt;
&lt;br /&gt;
==Ethical and Legal Concerns==&lt;br /&gt;
&lt;br /&gt;
==Study Guide==&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist}}&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/risks/security/precautions/ Security Precautions (Old Project Page)]&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Social_engineering_%28security%29 Social Engineering (Wikipedia)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.securityfocus.com/infocus/1527 Social Engineering Fundamentals]&lt;br /&gt;
&lt;br /&gt;
* [http://searchfinancialsecurity.techtarget.com/tip/0,289483,sid185_gci1294530,00.html Social Engineering Attacks]&lt;br /&gt;
&lt;br /&gt;
* [http://www.sans.org/reading_room/whitepapers/engineering/511.php Proactive Defense to Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://www.morehouse.org/hin/blckcrwl/hack/soceng.txt Social Engineering FAQ]&lt;br /&gt;
&lt;br /&gt;
* [http://www.hackinthebox.org/modules.php?op=modload&amp;amp;name=News&amp;amp;file=article&amp;amp;sid=15170&amp;amp;mode=thread&amp;amp;order=0&amp;amp;thold=0 Social Engineering Defense 101]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cioupdate.com/trends/article.php/3638951 Best Defense Against Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://techrepublic.com.com/5208-6230-0.html?forumID=102&amp;amp;threadID=232696 Social Engineering Self-defense]&lt;br /&gt;
&lt;br /&gt;
* [http://news.cnet.com/8301-1009_3-9995253-83.html Social Engineering: Hackers show how it is done]&lt;br /&gt;
&lt;br /&gt;
* [http://www.infosecwriters.com/text_resources/pdf/Social_Engineering_CRhodes.pdf Safeguarding Against Social Engineering]&lt;/div&gt;</summary>
		<author><name>Cjsoques</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=15036</id>
		<title>Social Engineering</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=15036"/>
		<updated>2008-07-23T17:43:47Z</updated>

		<summary type="html">&lt;p&gt;Cjsoques: /* Employee Training */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Social engineering a method of fraud and hacking that utilizes the humanity and nature of people to retrieve information from them voluntarily.  By playing into the nature of the person, hacking through technological means is sometimes not necessary.  If one can fool a person into giving away information voluntarily, then creating a program or hack to retrieve that information involuntarily is no required.  Furthermore, it can be much simpler and efficient to get information from someone through social engineering than it would ever be to steal that information via a computer program or password cracker.  &lt;br /&gt;
&lt;br /&gt;
This form of forcing users to disclose information must be done through some human means.  The point of social engineering is to utilize the fallacies of human logic and biases to trick the target into revealing confidential information through various methods and tactics.&lt;br /&gt;
&lt;br /&gt;
The precautions necessary against social engineering are required to be very proactive.  For example, you can put an anti virus program that will passively scan your computer for viruses automatically. However, the human must be actively on the defense for social engineering tricks and tactics that may be used against them.  Over the years, general guidelines for companies and employees have been developed to give the knowledge necessary to be vigilant and alert for social engineering fraud attempts.&lt;br /&gt;
&lt;br /&gt;
==Tactics and Methods==&lt;br /&gt;
There are various means of utilizing social engineering to obtain confidential and secret information such as passwords and private data.  All of these methods work through some medium in which the attacker has to actually converse with the victim in some way, whether directly or indirectly.  In all methods, feedback from the victim is required.  This feedback is usually the necessary information the attacker was looking for.&lt;br /&gt;
&lt;br /&gt;
Although social engineering tactics are heavily performed through electronic and computer mediums.  There are many methods in which social engineering can be done through the physical realm.  As long as there can be some form of communication between the attacker and the victim any medium may be used.  Social engineering is so successful because it takes advantage of the fallacies of the human being.  Whether by means of flattery, impersonation, and greed; social engineering is considered to some an art form of psychology.&lt;br /&gt;
&lt;br /&gt;
Social Engineering can be extremely simple to perform, but have dire effects and consequences.  There are even [http://news.cnet.com/8301-1009_3-9995253-83.html guides and tips] on how hackers have used social engineering in extremely simple ways.  Social engineering is considered so dangerous that [http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick], a renouned hacker and early user of social enginering, was considered the most dangerous hacker.  By using social engineering, the FBI though that Mitnick could start a nuclear war by simply utilizing social engineering.  &lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
The main way of retrieving electronic information from victim voluntarily is through [http://en.wikipedia.org/wiki/Phishing phishing].  Phishing, like social engineering, can be performed over various electronic and physical mediums.  In a general term, phishing is pretending to be something legitimate, when you are not.  When you fool the victim into thinking you are the legitimate source that is being faked, they will reveal all the information that would normally be required to use that source.  This may include account numbers, usernames, passwords, or even Social Security Numbers.&lt;br /&gt;
&lt;br /&gt;
A major medium of phishing is through e-mail.  The example of a bank and customer is extremely common.  The attacker will send the victim an e-mail notifying them of some required account information to be updated.  This e-mail will look exactly like the standard e-mail the victim may have received from the bank before.  The victim will be required to login and update their information as soon as possible.  However, the link will not be sent to the bank website, but to a separate server that was setup by the attacker to retrieve the information.  This website, like the e-mail, will look exactly like the actual bank website.  Once the person types their login information, the attacker then has all the information they needed from the victim.  &lt;br /&gt;
&lt;br /&gt;
Although uncommon, phishing may also be performed over the phone by pretending to be a representative of some company that is requesting some kind of account information.  The attacker may even know some basic information about the victim to prove that they are legitimate.  Usually, a victim will not question the call and will provide the necessary information.  The attacker can then use this information to take advantage of the victim by means of identity or property theft.&lt;br /&gt;
&lt;br /&gt;
===Pretexting===&lt;br /&gt;
[http://www.ftc.gov/bcp/conline/pubs/credit/pretext.shtm Pretexting] is a form of using information about the victim to obtain even more information or to use it against the victim.  Through pretexting the attacker uses the limited information gained to obtain more information.  Once enough information is gained.  The attacker may use credit pretending to be the victim, to make purchases acting as the victim, or to manipulate the records of the victim.&lt;br /&gt;
&lt;br /&gt;
The goal of pretexting is to prove to someone that you are legitimately the victim.  This may be done from proving that you know their name, address, phone number, and Social Security Number.  This could also be done by knowing the victim's username and password that was retrieved through phishing.&lt;br /&gt;
&lt;br /&gt;
===Trojan Horse===&lt;br /&gt;
A [http://www.tech-faq.com/trojan-horse-virus.shtml Trojan Horse] a technological form of social engineering.  Not only does it fool the victim that it is from a legitimate source, but it also fools the computer the victim is using.  A trojan horse is a program that may seem to perform a legitimate action, but in fact is collecting sensitive information or stealing data in the background.  This is, of coruse, derived from the ancient tactic used by the Spartans to invade Troy by pretending to be a gift to the Trojans (which is an ancient example of social engineering).&lt;br /&gt;
&lt;br /&gt;
To be specific, a ''gimme'' is a type of Trojan Horse that plays off of Social Engineering.  This tactic goes in conjunction with spamming or phishing.  The user will receive a pop-up ad or e-mail ad notifying the victim of some software that would benefit them.  Because of their curiosity and the seeming innocence of the program, the victim will install it on their machine.  The software may even perform as advertised, but in the background is obtaining account information and other confidential data.&lt;br /&gt;
&lt;br /&gt;
This is where a computer program pretends to be something it is not.  Instead of an actual human being performing the pretexting, it is an automated computer program.&lt;br /&gt;
&lt;br /&gt;
==Security, Precautions, and Defenses==&lt;br /&gt;
There are many precautions and defenses against social engineering.  However, there is a lack of education on the methods to defend against this tactic.  Various methods include vigorous identity verification, minimizing the amount of people that have sensitive information, as well as reducing the trust level of those in control of information.  Many companies have developed security policies and guidelines that employees should follow to minimize the risk of social engineering exploits.&lt;br /&gt;
&lt;br /&gt;
===Proactive Social Defenses===&lt;br /&gt;
SANS Network Security has a good example of a [http://www.sans.org/reading_room/whitepapers/engineering/511.php brief guide] for employees to maintain a proactive awareness against social engineering.  Through proactive self defense a company should develop a detailed policy on security and data release.  These policy should detailed who is able to release information, what information, and to who that information may be released to. &lt;br /&gt;
&lt;br /&gt;
There should be detailed access approval to any secured area or information.  A company should setup a defense against social engineering by always having a detailed access approval process instead of simply not challenging the requester of information. The company should have a designated help desk and support center that is knowledgeable in the policies of data release.  Information such as employee IDs, account information, and passwords should always be challenged with a detailed approval policy.&lt;br /&gt;
&lt;br /&gt;
By detailing who is allowed to release information and what information can be released, a company can minimize the amount of violations through social-engineering.  Usually social engineering succeeds because there is no preset guideline for giving out information for rare instances that social engineers exploit.&lt;br /&gt;
&lt;br /&gt;
===Employee Training===&lt;br /&gt;
Since the human being is the reason for social engineering exploits, the employee is the number one defense against attacks.  By [http://techrepublic.com.com/5208-6230-0.html?forumID=102&amp;amp;threadID=232696 training the employees through examples], they gain an understanding of how easy it is for social engineering to work.  By training to employees to reduce their trust value and not take request for information at face value, it will discourage the attacker to request any further information.  If in doubt, the employee should never give out confidential information and bring it to the next person in command.&lt;br /&gt;
&lt;br /&gt;
==Ethical and Legal Concerns==&lt;br /&gt;
&lt;br /&gt;
==Study Guide==&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist}}&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/risks/security/precautions/ Security Precautions (Old Project Page)]&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Social_engineering_%28security%29 Social Engineering (Wikipedia)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.securityfocus.com/infocus/1527 Social Engineering Fundamentals]&lt;br /&gt;
&lt;br /&gt;
* [http://searchfinancialsecurity.techtarget.com/tip/0,289483,sid185_gci1294530,00.html Social Engineering Attacks]&lt;br /&gt;
&lt;br /&gt;
* [http://www.sans.org/reading_room/whitepapers/engineering/511.php Proactive Defense to Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://www.morehouse.org/hin/blckcrwl/hack/soceng.txt Social Engineering FAQ]&lt;br /&gt;
&lt;br /&gt;
* [http://www.hackinthebox.org/modules.php?op=modload&amp;amp;name=News&amp;amp;file=article&amp;amp;sid=15170&amp;amp;mode=thread&amp;amp;order=0&amp;amp;thold=0 Social Engineering Defense 101]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cioupdate.com/trends/article.php/3638951 Best Defense Against Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://techrepublic.com.com/5208-6230-0.html?forumID=102&amp;amp;threadID=232696 Social Engineering Self-defense]&lt;br /&gt;
&lt;br /&gt;
* [http://news.cnet.com/8301-1009_3-9995253-83.html Social Engineering: Hackers show how it is done]&lt;/div&gt;</summary>
		<author><name>Cjsoques</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=15035</id>
		<title>Social Engineering</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=15035"/>
		<updated>2008-07-23T17:41:28Z</updated>

		<summary type="html">&lt;p&gt;Cjsoques: /* Security, Precautions, and Defenses */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Social engineering a method of fraud and hacking that utilizes the humanity and nature of people to retrieve information from them voluntarily.  By playing into the nature of the person, hacking through technological means is sometimes not necessary.  If one can fool a person into giving away information voluntarily, then creating a program or hack to retrieve that information involuntarily is no required.  Furthermore, it can be much simpler and efficient to get information from someone through social engineering than it would ever be to steal that information via a computer program or password cracker.  &lt;br /&gt;
&lt;br /&gt;
This form of forcing users to disclose information must be done through some human means.  The point of social engineering is to utilize the fallacies of human logic and biases to trick the target into revealing confidential information through various methods and tactics.&lt;br /&gt;
&lt;br /&gt;
The precautions necessary against social engineering are required to be very proactive.  For example, you can put an anti virus program that will passively scan your computer for viruses automatically. However, the human must be actively on the defense for social engineering tricks and tactics that may be used against them.  Over the years, general guidelines for companies and employees have been developed to give the knowledge necessary to be vigilant and alert for social engineering fraud attempts.&lt;br /&gt;
&lt;br /&gt;
==Tactics and Methods==&lt;br /&gt;
There are various means of utilizing social engineering to obtain confidential and secret information such as passwords and private data.  All of these methods work through some medium in which the attacker has to actually converse with the victim in some way, whether directly or indirectly.  In all methods, feedback from the victim is required.  This feedback is usually the necessary information the attacker was looking for.&lt;br /&gt;
&lt;br /&gt;
Although social engineering tactics are heavily performed through electronic and computer mediums.  There are many methods in which social engineering can be done through the physical realm.  As long as there can be some form of communication between the attacker and the victim any medium may be used.  Social engineering is so successful because it takes advantage of the fallacies of the human being.  Whether by means of flattery, impersonation, and greed; social engineering is considered to some an art form of psychology.&lt;br /&gt;
&lt;br /&gt;
Social Engineering can be extremely simple to perform, but have dire effects and consequences.  There are even [http://news.cnet.com/8301-1009_3-9995253-83.html guides and tips] on how hackers have used social engineering in extremely simple ways.  Social engineering is considered so dangerous that [http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick], a renouned hacker and early user of social enginering, was considered the most dangerous hacker.  By using social engineering, the FBI though that Mitnick could start a nuclear war by simply utilizing social engineering.  &lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
The main way of retrieving electronic information from victim voluntarily is through [http://en.wikipedia.org/wiki/Phishing phishing].  Phishing, like social engineering, can be performed over various electronic and physical mediums.  In a general term, phishing is pretending to be something legitimate, when you are not.  When you fool the victim into thinking you are the legitimate source that is being faked, they will reveal all the information that would normally be required to use that source.  This may include account numbers, usernames, passwords, or even Social Security Numbers.&lt;br /&gt;
&lt;br /&gt;
A major medium of phishing is through e-mail.  The example of a bank and customer is extremely common.  The attacker will send the victim an e-mail notifying them of some required account information to be updated.  This e-mail will look exactly like the standard e-mail the victim may have received from the bank before.  The victim will be required to login and update their information as soon as possible.  However, the link will not be sent to the bank website, but to a separate server that was setup by the attacker to retrieve the information.  This website, like the e-mail, will look exactly like the actual bank website.  Once the person types their login information, the attacker then has all the information they needed from the victim.  &lt;br /&gt;
&lt;br /&gt;
Although uncommon, phishing may also be performed over the phone by pretending to be a representative of some company that is requesting some kind of account information.  The attacker may even know some basic information about the victim to prove that they are legitimate.  Usually, a victim will not question the call and will provide the necessary information.  The attacker can then use this information to take advantage of the victim by means of identity or property theft.&lt;br /&gt;
&lt;br /&gt;
===Pretexting===&lt;br /&gt;
[http://www.ftc.gov/bcp/conline/pubs/credit/pretext.shtm Pretexting] is a form of using information about the victim to obtain even more information or to use it against the victim.  Through pretexting the attacker uses the limited information gained to obtain more information.  Once enough information is gained.  The attacker may use credit pretending to be the victim, to make purchases acting as the victim, or to manipulate the records of the victim.&lt;br /&gt;
&lt;br /&gt;
The goal of pretexting is to prove to someone that you are legitimately the victim.  This may be done from proving that you know their name, address, phone number, and Social Security Number.  This could also be done by knowing the victim's username and password that was retrieved through phishing.&lt;br /&gt;
&lt;br /&gt;
===Trojan Horse===&lt;br /&gt;
A [http://www.tech-faq.com/trojan-horse-virus.shtml Trojan Horse] a technological form of social engineering.  Not only does it fool the victim that it is from a legitimate source, but it also fools the computer the victim is using.  A trojan horse is a program that may seem to perform a legitimate action, but in fact is collecting sensitive information or stealing data in the background.  This is, of coruse, derived from the ancient tactic used by the Spartans to invade Troy by pretending to be a gift to the Trojans (which is an ancient example of social engineering).&lt;br /&gt;
&lt;br /&gt;
To be specific, a ''gimme'' is a type of Trojan Horse that plays off of Social Engineering.  This tactic goes in conjunction with spamming or phishing.  The user will receive a pop-up ad or e-mail ad notifying the victim of some software that would benefit them.  Because of their curiosity and the seeming innocence of the program, the victim will install it on their machine.  The software may even perform as advertised, but in the background is obtaining account information and other confidential data.&lt;br /&gt;
&lt;br /&gt;
This is where a computer program pretends to be something it is not.  Instead of an actual human being performing the pretexting, it is an automated computer program.&lt;br /&gt;
&lt;br /&gt;
==Security, Precautions, and Defenses==&lt;br /&gt;
There are many precautions and defenses against social engineering.  However, there is a lack of education on the methods to defend against this tactic.  Various methods include vigorous identity verification, minimizing the amount of people that have sensitive information, as well as reducing the trust level of those in control of information.  Many companies have developed security policies and guidelines that employees should follow to minimize the risk of social engineering exploits.&lt;br /&gt;
&lt;br /&gt;
===Proactive Social Defenses===&lt;br /&gt;
SANS Network Security has a good example of a [http://www.sans.org/reading_room/whitepapers/engineering/511.php brief guide] for employees to maintain a proactive awareness against social engineering.  Through proactive self defense a company should develop a detailed policy on security and data release.  These policy should detailed who is able to release information, what information, and to who that information may be released to. &lt;br /&gt;
&lt;br /&gt;
There should be detailed access approval to any secured area or information.  A company should setup a defense against social engineering by always having a detailed access approval process instead of simply not challenging the requester of information. The company should have a designated help desk and support center that is knowledgeable in the policies of data release.  Information such as employee IDs, account information, and passwords should always be challenged with a detailed approval policy.&lt;br /&gt;
&lt;br /&gt;
By detailing who is allowed to release information and what information can be released, a company can minimize the amount of violations through social-engineering.  Usually social engineering succeeds because there is no preset guideline for giving out information for rare instances that social engineers exploit.&lt;br /&gt;
&lt;br /&gt;
===Employee Training===&lt;br /&gt;
Since the human being is the reason for social engineering exploits, the employee is the number one defense against attacks.  By [http://techrepublic.com.com/5208-6230-0.html?forumID=102&amp;amp;threadID=232696 training the employees through examples], they gain an understanding of how easy it is for social engineering to work.&lt;br /&gt;
&lt;br /&gt;
==Ethical and Legal Concerns==&lt;br /&gt;
&lt;br /&gt;
==Study Guide==&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist}}&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/risks/security/precautions/ Security Precautions (Old Project Page)]&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Social_engineering_%28security%29 Social Engineering (Wikipedia)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.securityfocus.com/infocus/1527 Social Engineering Fundamentals]&lt;br /&gt;
&lt;br /&gt;
* [http://searchfinancialsecurity.techtarget.com/tip/0,289483,sid185_gci1294530,00.html Social Engineering Attacks]&lt;br /&gt;
&lt;br /&gt;
* [http://www.sans.org/reading_room/whitepapers/engineering/511.php Proactive Defense to Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://www.morehouse.org/hin/blckcrwl/hack/soceng.txt Social Engineering FAQ]&lt;br /&gt;
&lt;br /&gt;
* [http://www.hackinthebox.org/modules.php?op=modload&amp;amp;name=News&amp;amp;file=article&amp;amp;sid=15170&amp;amp;mode=thread&amp;amp;order=0&amp;amp;thold=0 Social Engineering Defense 101]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cioupdate.com/trends/article.php/3638951 Best Defense Against Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://techrepublic.com.com/5208-6230-0.html?forumID=102&amp;amp;threadID=232696 Social Engineering Self-defense]&lt;br /&gt;
&lt;br /&gt;
* [http://news.cnet.com/8301-1009_3-9995253-83.html Social Engineering: Hackers show how it is done]&lt;/div&gt;</summary>
		<author><name>Cjsoques</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=15034</id>
		<title>Social Engineering</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=15034"/>
		<updated>2008-07-23T17:00:33Z</updated>

		<summary type="html">&lt;p&gt;Cjsoques: /* Security, Precautions, and Defenses */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Social engineering a method of fraud and hacking that utilizes the humanity and nature of people to retrieve information from them voluntarily.  By playing into the nature of the person, hacking through technological means is sometimes not necessary.  If one can fool a person into giving away information voluntarily, then creating a program or hack to retrieve that information involuntarily is no required.  Furthermore, it can be much simpler and efficient to get information from someone through social engineering than it would ever be to steal that information via a computer program or password cracker.  &lt;br /&gt;
&lt;br /&gt;
This form of forcing users to disclose information must be done through some human means.  The point of social engineering is to utilize the fallacies of human logic and biases to trick the target into revealing confidential information through various methods and tactics.&lt;br /&gt;
&lt;br /&gt;
The precautions necessary against social engineering are required to be very proactive.  For example, you can put an anti virus program that will passively scan your computer for viruses automatically. However, the human must be actively on the defense for social engineering tricks and tactics that may be used against them.  Over the years, general guidelines for companies and employees have been developed to give the knowledge necessary to be vigilant and alert for social engineering fraud attempts.&lt;br /&gt;
&lt;br /&gt;
==Tactics and Methods==&lt;br /&gt;
There are various means of utilizing social engineering to obtain confidential and secret information such as passwords and private data.  All of these methods work through some medium in which the attacker has to actually converse with the victim in some way, whether directly or indirectly.  In all methods, feedback from the victim is required.  This feedback is usually the necessary information the attacker was looking for.&lt;br /&gt;
&lt;br /&gt;
Although social engineering tactics are heavily performed through electronic and computer mediums.  There are many methods in which social engineering can be done through the physical realm.  As long as there can be some form of communication between the attacker and the victim any medium may be used.  Social engineering is so successful because it takes advantage of the fallacies of the human being.  Whether by means of flattery, impersonation, and greed; social engineering is considered to some an art form of psychology.&lt;br /&gt;
&lt;br /&gt;
Social Engineering can be extremely simple to perform, but have dire effects and consequences.  There are even [http://news.cnet.com/8301-1009_3-9995253-83.html guides and tips] on how hackers have used social engineering in extremely simple ways.  Social engineering is considered so dangerous that [http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick], a renouned hacker and early user of social enginering, was considered the most dangerous hacker.  By using social engineering, the FBI though that Mitnick could start a nuclear war by simply utilizing social engineering.  &lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
The main way of retrieving electronic information from victim voluntarily is through [http://en.wikipedia.org/wiki/Phishing phishing].  Phishing, like social engineering, can be performed over various electronic and physical mediums.  In a general term, phishing is pretending to be something legitimate, when you are not.  When you fool the victim into thinking you are the legitimate source that is being faked, they will reveal all the information that would normally be required to use that source.  This may include account numbers, usernames, passwords, or even Social Security Numbers.&lt;br /&gt;
&lt;br /&gt;
A major medium of phishing is through e-mail.  The example of a bank and customer is extremely common.  The attacker will send the victim an e-mail notifying them of some required account information to be updated.  This e-mail will look exactly like the standard e-mail the victim may have received from the bank before.  The victim will be required to login and update their information as soon as possible.  However, the link will not be sent to the bank website, but to a separate server that was setup by the attacker to retrieve the information.  This website, like the e-mail, will look exactly like the actual bank website.  Once the person types their login information, the attacker then has all the information they needed from the victim.  &lt;br /&gt;
&lt;br /&gt;
Although uncommon, phishing may also be performed over the phone by pretending to be a representative of some company that is requesting some kind of account information.  The attacker may even know some basic information about the victim to prove that they are legitimate.  Usually, a victim will not question the call and will provide the necessary information.  The attacker can then use this information to take advantage of the victim by means of identity or property theft.&lt;br /&gt;
&lt;br /&gt;
===Pretexting===&lt;br /&gt;
[http://www.ftc.gov/bcp/conline/pubs/credit/pretext.shtm Pretexting] is a form of using information about the victim to obtain even more information or to use it against the victim.  Through pretexting the attacker uses the limited information gained to obtain more information.  Once enough information is gained.  The attacker may use credit pretending to be the victim, to make purchases acting as the victim, or to manipulate the records of the victim.&lt;br /&gt;
&lt;br /&gt;
The goal of pretexting is to prove to someone that you are legitimately the victim.  This may be done from proving that you know their name, address, phone number, and Social Security Number.  This could also be done by knowing the victim's username and password that was retrieved through phishing.&lt;br /&gt;
&lt;br /&gt;
===Trojan Horse===&lt;br /&gt;
A [http://www.tech-faq.com/trojan-horse-virus.shtml Trojan Horse] a technological form of social engineering.  Not only does it fool the victim that it is from a legitimate source, but it also fools the computer the victim is using.  A trojan horse is a program that may seem to perform a legitimate action, but in fact is collecting sensitive information or stealing data in the background.  This is, of coruse, derived from the ancient tactic used by the Spartans to invade Troy by pretending to be a gift to the Trojans (which is an ancient example of social engineering).&lt;br /&gt;
&lt;br /&gt;
To be specific, a ''gimme'' is a type of Trojan Horse that plays off of Social Engineering.  This tactic goes in conjunction with spamming or phishing.  The user will receive a pop-up ad or e-mail ad notifying the victim of some software that would benefit them.  Because of their curiosity and the seeming innocence of the program, the victim will install it on their machine.  The software may even perform as advertised, but in the background is obtaining account information and other confidential data.&lt;br /&gt;
&lt;br /&gt;
This is where a computer program pretends to be something it is not.  Instead of an actual human being performing the pretexting, it is an automated computer program.&lt;br /&gt;
&lt;br /&gt;
==Security, Precautions, and Defenses==&lt;br /&gt;
There are many precautions and defenses against social engineering.  However, there is a lack of education on the methods to defend against this tactic.  Various methods include vigorous identity verification, minimizing the amount of people that have sensitive information, as well as reducing the trust level of those in control of information.  Many companies have developed security policies and guidelines that employees should follow to minimize the risk of social engineering exploits.&lt;br /&gt;
&lt;br /&gt;
==Ethical and Legal Concerns==&lt;br /&gt;
&lt;br /&gt;
==Study Guide==&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist}}&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/risks/security/precautions/ Security Precautions (Old Project Page)]&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Social_engineering_%28security%29 Social Engineering (Wikipedia)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.securityfocus.com/infocus/1527 Social Engineering Fundamentals]&lt;br /&gt;
&lt;br /&gt;
* [http://searchfinancialsecurity.techtarget.com/tip/0,289483,sid185_gci1294530,00.html Social Engineering Attacks]&lt;br /&gt;
&lt;br /&gt;
* [http://www.sans.org/reading_room/whitepapers/engineering/511.php Proactive Defense to Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://www.morehouse.org/hin/blckcrwl/hack/soceng.txt Social Engineering FAQ]&lt;br /&gt;
&lt;br /&gt;
* [http://www.hackinthebox.org/modules.php?op=modload&amp;amp;name=News&amp;amp;file=article&amp;amp;sid=15170&amp;amp;mode=thread&amp;amp;order=0&amp;amp;thold=0 Social Engineering Defense 101]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cioupdate.com/trends/article.php/3638951 Best Defense Against Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://techrepublic.com.com/5208-6230-0.html?forumID=102&amp;amp;threadID=232696 Social Engineering Self-defense]&lt;br /&gt;
&lt;br /&gt;
* [http://news.cnet.com/8301-1009_3-9995253-83.html Social Engineering: Hackers show how it is done]&lt;/div&gt;</summary>
		<author><name>Cjsoques</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=15033</id>
		<title>Social Engineering</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=15033"/>
		<updated>2008-07-23T16:46:03Z</updated>

		<summary type="html">&lt;p&gt;Cjsoques: /* Tactics and Methods */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Social engineering a method of fraud and hacking that utilizes the humanity and nature of people to retrieve information from them voluntarily.  By playing into the nature of the person, hacking through technological means is sometimes not necessary.  If one can fool a person into giving away information voluntarily, then creating a program or hack to retrieve that information involuntarily is no required.  Furthermore, it can be much simpler and efficient to get information from someone through social engineering than it would ever be to steal that information via a computer program or password cracker.  &lt;br /&gt;
&lt;br /&gt;
This form of forcing users to disclose information must be done through some human means.  The point of social engineering is to utilize the fallacies of human logic and biases to trick the target into revealing confidential information through various methods and tactics.&lt;br /&gt;
&lt;br /&gt;
The precautions necessary against social engineering are required to be very proactive.  For example, you can put an anti virus program that will passively scan your computer for viruses automatically. However, the human must be actively on the defense for social engineering tricks and tactics that may be used against them.  Over the years, general guidelines for companies and employees have been developed to give the knowledge necessary to be vigilant and alert for social engineering fraud attempts.&lt;br /&gt;
&lt;br /&gt;
==Tactics and Methods==&lt;br /&gt;
There are various means of utilizing social engineering to obtain confidential and secret information such as passwords and private data.  All of these methods work through some medium in which the attacker has to actually converse with the victim in some way, whether directly or indirectly.  In all methods, feedback from the victim is required.  This feedback is usually the necessary information the attacker was looking for.&lt;br /&gt;
&lt;br /&gt;
Although social engineering tactics are heavily performed through electronic and computer mediums.  There are many methods in which social engineering can be done through the physical realm.  As long as there can be some form of communication between the attacker and the victim any medium may be used.  Social engineering is so successful because it takes advantage of the fallacies of the human being.  Whether by means of flattery, impersonation, and greed; social engineering is considered to some an art form of psychology.&lt;br /&gt;
&lt;br /&gt;
Social Engineering can be extremely simple to perform, but have dire effects and consequences.  There are even [http://news.cnet.com/8301-1009_3-9995253-83.html guides and tips] on how hackers have used social engineering in extremely simple ways.  Social engineering is considered so dangerous that [http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick], a renouned hacker and early user of social enginering, was considered the most dangerous hacker.  By using social engineering, the FBI though that Mitnick could start a nuclear war by simply utilizing social engineering.  &lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
The main way of retrieving electronic information from victim voluntarily is through [http://en.wikipedia.org/wiki/Phishing phishing].  Phishing, like social engineering, can be performed over various electronic and physical mediums.  In a general term, phishing is pretending to be something legitimate, when you are not.  When you fool the victim into thinking you are the legitimate source that is being faked, they will reveal all the information that would normally be required to use that source.  This may include account numbers, usernames, passwords, or even Social Security Numbers.&lt;br /&gt;
&lt;br /&gt;
A major medium of phishing is through e-mail.  The example of a bank and customer is extremely common.  The attacker will send the victim an e-mail notifying them of some required account information to be updated.  This e-mail will look exactly like the standard e-mail the victim may have received from the bank before.  The victim will be required to login and update their information as soon as possible.  However, the link will not be sent to the bank website, but to a separate server that was setup by the attacker to retrieve the information.  This website, like the e-mail, will look exactly like the actual bank website.  Once the person types their login information, the attacker then has all the information they needed from the victim.  &lt;br /&gt;
&lt;br /&gt;
Although uncommon, phishing may also be performed over the phone by pretending to be a representative of some company that is requesting some kind of account information.  The attacker may even know some basic information about the victim to prove that they are legitimate.  Usually, a victim will not question the call and will provide the necessary information.  The attacker can then use this information to take advantage of the victim by means of identity or property theft.&lt;br /&gt;
&lt;br /&gt;
===Pretexting===&lt;br /&gt;
[http://www.ftc.gov/bcp/conline/pubs/credit/pretext.shtm Pretexting] is a form of using information about the victim to obtain even more information or to use it against the victim.  Through pretexting the attacker uses the limited information gained to obtain more information.  Once enough information is gained.  The attacker may use credit pretending to be the victim, to make purchases acting as the victim, or to manipulate the records of the victim.&lt;br /&gt;
&lt;br /&gt;
The goal of pretexting is to prove to someone that you are legitimately the victim.  This may be done from proving that you know their name, address, phone number, and Social Security Number.  This could also be done by knowing the victim's username and password that was retrieved through phishing.&lt;br /&gt;
&lt;br /&gt;
===Trojan Horse===&lt;br /&gt;
A [http://www.tech-faq.com/trojan-horse-virus.shtml Trojan Horse] a technological form of social engineering.  Not only does it fool the victim that it is from a legitimate source, but it also fools the computer the victim is using.  A trojan horse is a program that may seem to perform a legitimate action, but in fact is collecting sensitive information or stealing data in the background.  This is, of coruse, derived from the ancient tactic used by the Spartans to invade Troy by pretending to be a gift to the Trojans (which is an ancient example of social engineering).&lt;br /&gt;
&lt;br /&gt;
To be specific, a ''gimme'' is a type of Trojan Horse that plays off of Social Engineering.  This tactic goes in conjunction with spamming or phishing.  The user will receive a pop-up ad or e-mail ad notifying the victim of some software that would benefit them.  Because of their curiosity and the seeming innocence of the program, the victim will install it on their machine.  The software may even perform as advertised, but in the background is obtaining account information and other confidential data.&lt;br /&gt;
&lt;br /&gt;
This is where a computer program pretends to be something it is not.  Instead of an actual human being performing the pretexting, it is an automated computer program.&lt;br /&gt;
&lt;br /&gt;
==Security, Precautions, and Defenses==&lt;br /&gt;
&lt;br /&gt;
==Ethical and Legal Concerns==&lt;br /&gt;
&lt;br /&gt;
==Study Guide==&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist}}&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/risks/security/precautions/ Security Precautions (Old Project Page)]&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Social_engineering_%28security%29 Social Engineering (Wikipedia)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.securityfocus.com/infocus/1527 Social Engineering Fundamentals]&lt;br /&gt;
&lt;br /&gt;
* [http://searchfinancialsecurity.techtarget.com/tip/0,289483,sid185_gci1294530,00.html Social Engineering Attacks]&lt;br /&gt;
&lt;br /&gt;
* [http://www.sans.org/reading_room/whitepapers/engineering/511.php Proactive Defense to Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://www.morehouse.org/hin/blckcrwl/hack/soceng.txt Social Engineering FAQ]&lt;br /&gt;
&lt;br /&gt;
* [http://www.hackinthebox.org/modules.php?op=modload&amp;amp;name=News&amp;amp;file=article&amp;amp;sid=15170&amp;amp;mode=thread&amp;amp;order=0&amp;amp;thold=0 Social Engineering Defense 101]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cioupdate.com/trends/article.php/3638951 Best Defense Against Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://techrepublic.com.com/5208-6230-0.html?forumID=102&amp;amp;threadID=232696 Social Engineering Self-defense]&lt;br /&gt;
&lt;br /&gt;
* [http://news.cnet.com/8301-1009_3-9995253-83.html Social Engineering: Hackers show how it is done]&lt;/div&gt;</summary>
		<author><name>Cjsoques</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=15031</id>
		<title>Social Engineering</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=15031"/>
		<updated>2008-07-23T16:33:31Z</updated>

		<summary type="html">&lt;p&gt;Cjsoques: /* Tactics and Methods */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Social engineering a method of fraud and hacking that utilizes the humanity and nature of people to retrieve information from them voluntarily.  By playing into the nature of the person, hacking through technological means is sometimes not necessary.  If one can fool a person into giving away information voluntarily, then creating a program or hack to retrieve that information involuntarily is no required.  Furthermore, it can be much simpler and efficient to get information from someone through social engineering than it would ever be to steal that information via a computer program or password cracker.  &lt;br /&gt;
&lt;br /&gt;
This form of forcing users to disclose information must be done through some human means.  The point of social engineering is to utilize the fallacies of human logic and biases to trick the target into revealing confidential information through various methods and tactics.&lt;br /&gt;
&lt;br /&gt;
The precautions necessary against social engineering are required to be very proactive.  For example, you can put an anti virus program that will passively scan your computer for viruses automatically. However, the human must be actively on the defense for social engineering tricks and tactics that may be used against them.  Over the years, general guidelines for companies and employees have been developed to give the knowledge necessary to be vigilant and alert for social engineering fraud attempts.&lt;br /&gt;
&lt;br /&gt;
==Tactics and Methods==&lt;br /&gt;
There are various means of utilizing social engineering to obtain confidential and secret information such as passwords and private data.  All of these methods work through some medium in which the attacker has to actually converse with the victim in some way, whether directly or indirectly.  In all methods, feedback from the victim is required.  This feedback is usually the necessary information the attacker was looking for.&lt;br /&gt;
&lt;br /&gt;
Although social engineering tactics are heavily performed through electronic and computer mediums.  There are many methods in which social engineering can be done through the physical realm.  As long as there can be some form of communication between the attacker and the victim any medium may be used.  Social engineering is so successful because it takes advantage of the fallacies of the human being.  Whether by means of flattery, impersonation, and greed; social engineering is considered to some an art form of psychology.&lt;br /&gt;
&lt;br /&gt;
Social Engineering can be extremely simple to perform.  There are even [http://news.cnet.com/8301-1009_3-9995253-83.html guides and tips] on how hackers have used social engineering in extremely simple ways.&lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
The main way of retrieving electronic information from victim voluntarily is through [http://en.wikipedia.org/wiki/Phishing phishing].  Phishing, like social engineering, can be performed over various electronic and physical mediums.  In a general term, phishing is pretending to be something legitimate, when you are not.  When you fool the victim into thinking you are the legitimate source that is being faked, they will reveal all the information that would normally be required to use that source.  This may include account numbers, usernames, passwords, or even Social Security Numbers.&lt;br /&gt;
&lt;br /&gt;
A major medium of phishing is through e-mail.  The example of a bank and customer is extremely common.  The attacker will send the victim an e-mail notifying them of some required account information to be updated.  This e-mail will look exactly like the standard e-mail the victim may have received from the bank before.  The victim will be required to login and update their information as soon as possible.  However, the link will not be sent to the bank website, but to a separate server that was setup by the attacker to retrieve the information.  This website, like the e-mail, will look exactly like the actual bank website.  Once the person types their login information, the attacker then has all the information they needed from the victim.  &lt;br /&gt;
&lt;br /&gt;
Although uncommon, phishing may also be performed over the phone by pretending to be a representative of some company that is requesting some kind of account information.  The attacker may even know some basic information about the victim to prove that they are legitimate.  Usually, a victim will not question the call and will provide the necessary information.  The attacker can then use this information to take advantage of the victim by means of identity or property theft.&lt;br /&gt;
&lt;br /&gt;
===Pretexting===&lt;br /&gt;
[http://www.ftc.gov/bcp/conline/pubs/credit/pretext.shtm Pretexting] is a form of using information about the victim to obtain even more information or to use it against the victim.  Through pretexting the attacker uses the limited information gained to obtain more information.  Once enough information is gained.  The attacker may use credit pretending to be the victim, to make purchases acting as the victim, or to manipulate the records of the victim.&lt;br /&gt;
&lt;br /&gt;
The goal of pretexting is to prove to someone that you are legitimately the victim.  This may be done from proving that you know their name, address, phone number, and Social Security Number.  This could also be done by knowing the victim's username and password that was retrieved through phishing.&lt;br /&gt;
&lt;br /&gt;
===Trojan Horse===&lt;br /&gt;
A [http://www.tech-faq.com/trojan-horse-virus.shtml Trojan Horse] a technological form of social engineering.  Not only does it fool the victim that it is from a legitimate source, but it also fools the computer the victim is using.  A trojan horse is a program that may seem to perform a legitimate action, but in fact is collecting sensitive information or stealing data in the background.  This is, of coruse, derived from the ancient tactic used by the Spartans to invade Troy by pretending to be a gift to the Trojans (which is an ancient example of social engineering).&lt;br /&gt;
&lt;br /&gt;
To be specific, a ''gimme'' is a type of Trojan Horse that plays off of Social Engineering.  This tactic goes in conjunction with spamming or phishing.  The user will receive a pop-up ad or e-mail ad notifying the victim of some software that would benefit them.  Because of their curiosity and the seeming innocence of the program, the victim will install it on their machine.  The software may even perform as advertised, but in the background is obtaining account information and other confidential data.&lt;br /&gt;
&lt;br /&gt;
This is where a computer program pretends to be something it is not.  Instead of an actual human being performing the pretexting, it is an automated computer program.&lt;br /&gt;
&lt;br /&gt;
==Security, Precautions, and Defenses==&lt;br /&gt;
&lt;br /&gt;
==Ethical and Legal Concerns==&lt;br /&gt;
&lt;br /&gt;
==Study Guide==&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist}}&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/risks/security/precautions/ Security Precautions (Old Project Page)]&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Social_engineering_%28security%29 Social Engineering (Wikipedia)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.securityfocus.com/infocus/1527 Social Engineering Fundamentals]&lt;br /&gt;
&lt;br /&gt;
* [http://searchfinancialsecurity.techtarget.com/tip/0,289483,sid185_gci1294530,00.html Social Engineering Attacks]&lt;br /&gt;
&lt;br /&gt;
* [http://www.sans.org/reading_room/whitepapers/engineering/511.php Proactive Defense to Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://www.morehouse.org/hin/blckcrwl/hack/soceng.txt Social Engineering FAQ]&lt;br /&gt;
&lt;br /&gt;
* [http://www.hackinthebox.org/modules.php?op=modload&amp;amp;name=News&amp;amp;file=article&amp;amp;sid=15170&amp;amp;mode=thread&amp;amp;order=0&amp;amp;thold=0 Social Engineering Defense 101]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cioupdate.com/trends/article.php/3638951 Best Defense Against Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://techrepublic.com.com/5208-6230-0.html?forumID=102&amp;amp;threadID=232696 Social Engineering Self-defense]&lt;br /&gt;
&lt;br /&gt;
* [http://news.cnet.com/8301-1009_3-9995253-83.html Social Engineering: Hackers show how it is done]&lt;/div&gt;</summary>
		<author><name>Cjsoques</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=15028</id>
		<title>Social Engineering</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=15028"/>
		<updated>2008-07-23T16:31:11Z</updated>

		<summary type="html">&lt;p&gt;Cjsoques: /* Phishing */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Social engineering a method of fraud and hacking that utilizes the humanity and nature of people to retrieve information from them voluntarily.  By playing into the nature of the person, hacking through technological means is sometimes not necessary.  If one can fool a person into giving away information voluntarily, then creating a program or hack to retrieve that information involuntarily is no required.  Furthermore, it can be much simpler and efficient to get information from someone through social engineering than it would ever be to steal that information via a computer program or password cracker.  &lt;br /&gt;
&lt;br /&gt;
This form of forcing users to disclose information must be done through some human means.  The point of social engineering is to utilize the fallacies of human logic and biases to trick the target into revealing confidential information through various methods and tactics.&lt;br /&gt;
&lt;br /&gt;
The precautions necessary against social engineering are required to be very proactive.  For example, you can put an anti virus program that will passively scan your computer for viruses automatically. However, the human must be actively on the defense for social engineering tricks and tactics that may be used against them.  Over the years, general guidelines for companies and employees have been developed to give the knowledge necessary to be vigilant and alert for social engineering fraud attempts.&lt;br /&gt;
&lt;br /&gt;
==Tactics and Methods==&lt;br /&gt;
There are various means of utilizing social engineering to obtain confidential and secret information such as passwords and private data.  All of these methods work through some medium in which the attacker has to actually converse with the victim in some way, whether directly or indirectly.  In all methods, feedback from the victim is required.  This feedback is usually the necessary information the attacker was looking for.&lt;br /&gt;
&lt;br /&gt;
Although social engineering tactics are heavily performed through electronic and computer mediums.  There are many methods in which social engineering can be done through the physical realm.  As long as there can be some form of communication between the attacker and the victim any medium may be used.  Social engineering is so successful because it takes advantage of the fallacies of the human being.  Whether by means of flattery, impersonation, and greed; social engineering is considered to some an art form of psychology.&lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
The main way of retrieving electronic information from victim voluntarily is through [http://en.wikipedia.org/wiki/Phishing phishing].  Phishing, like social engineering, can be performed over various electronic and physical mediums.  In a general term, phishing is pretending to be something legitimate, when you are not.  When you fool the victim into thinking you are the legitimate source that is being faked, they will reveal all the information that would normally be required to use that source.  This may include account numbers, usernames, passwords, or even Social Security Numbers.&lt;br /&gt;
&lt;br /&gt;
A major medium of phishing is through e-mail.  The example of a bank and customer is extremely common.  The attacker will send the victim an e-mail notifying them of some required account information to be updated.  This e-mail will look exactly like the standard e-mail the victim may have received from the bank before.  The victim will be required to login and update their information as soon as possible.  However, the link will not be sent to the bank website, but to a separate server that was setup by the attacker to retrieve the information.  This website, like the e-mail, will look exactly like the actual bank website.  Once the person types their login information, the attacker then has all the information they needed from the victim.  &lt;br /&gt;
&lt;br /&gt;
Although uncommon, phishing may also be performed over the phone by pretending to be a representative of some company that is requesting some kind of account information.  The attacker may even know some basic information about the victim to prove that they are legitimate.  Usually, a victim will not question the call and will provide the necessary information.  The attacker can then use this information to take advantage of the victim by means of identity or property theft.&lt;br /&gt;
&lt;br /&gt;
===Pretexting===&lt;br /&gt;
[http://www.ftc.gov/bcp/conline/pubs/credit/pretext.shtm Pretexting] is a form of using information about the victim to obtain even more information or to use it against the victim.  Through pretexting the attacker uses the limited information gained to obtain more information.  Once enough information is gained.  The attacker may use credit pretending to be the victim, to make purchases acting as the victim, or to manipulate the records of the victim.&lt;br /&gt;
&lt;br /&gt;
The goal of pretexting is to prove to someone that you are legitimately the victim.  This may be done from proving that you know their name, address, phone number, and Social Security Number.  This could also be done by knowing the victim's username and password that was retrieved through phishing.&lt;br /&gt;
&lt;br /&gt;
===Trojan Horse===&lt;br /&gt;
A [http://www.tech-faq.com/trojan-horse-virus.shtml Trojan Horse] a technological form of social engineering.  Not only does it fool the victim that it is from a legitimate source, but it also fools the computer the victim is using.  A trojan horse is a program that may seem to perform a legitimate action, but in fact is collecting sensitive information or stealing data in the background.  This is, of coruse, derived from the ancient tactic used by the Spartans to invade Troy by pretending to be a gift to the Trojans (which is an ancient example of social engineering).&lt;br /&gt;
&lt;br /&gt;
To be specific, a ''gimme'' is a type of Trojan Horse that plays off of Social Engineering.  This tactic goes in conjunction with spamming or phishing.  The user will receive a pop-up ad or e-mail ad notifying the victim of some software that would benefit them.  Because of their curiosity and the seeming innocence of the program, the victim will install it on their machine.  The software may even perform as advertised, but in the background is obtaining account information and other confidential data.&lt;br /&gt;
&lt;br /&gt;
This is where a computer program pretends to be something it is not.  Instead of an actual human being performing the pretexting, it is an automated computer program.&lt;br /&gt;
&lt;br /&gt;
==Security, Precautions, and Defenses==&lt;br /&gt;
&lt;br /&gt;
==Ethical and Legal Concerns==&lt;br /&gt;
&lt;br /&gt;
==Study Guide==&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist}}&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/risks/security/precautions/ Security Precautions (Old Project Page)]&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Social_engineering_%28security%29 Social Engineering (Wikipedia)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.securityfocus.com/infocus/1527 Social Engineering Fundamentals]&lt;br /&gt;
&lt;br /&gt;
* [http://searchfinancialsecurity.techtarget.com/tip/0,289483,sid185_gci1294530,00.html Social Engineering Attacks]&lt;br /&gt;
&lt;br /&gt;
* [http://www.sans.org/reading_room/whitepapers/engineering/511.php Proactive Defense to Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://www.morehouse.org/hin/blckcrwl/hack/soceng.txt Social Engineering FAQ]&lt;br /&gt;
&lt;br /&gt;
* [http://www.hackinthebox.org/modules.php?op=modload&amp;amp;name=News&amp;amp;file=article&amp;amp;sid=15170&amp;amp;mode=thread&amp;amp;order=0&amp;amp;thold=0 Social Engineering Defense 101]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cioupdate.com/trends/article.php/3638951 Best Defense Against Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://techrepublic.com.com/5208-6230-0.html?forumID=102&amp;amp;threadID=232696 Social Engineering Self-defense]&lt;br /&gt;
&lt;br /&gt;
* [http://news.cnet.com/8301-1009_3-9995253-83.html Social Engineering: Hackers show how it is done]&lt;/div&gt;</summary>
		<author><name>Cjsoques</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=15027</id>
		<title>Social Engineering</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=15027"/>
		<updated>2008-07-23T16:30:42Z</updated>

		<summary type="html">&lt;p&gt;Cjsoques: /* Tactics and Methods */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Social engineering a method of fraud and hacking that utilizes the humanity and nature of people to retrieve information from them voluntarily.  By playing into the nature of the person, hacking through technological means is sometimes not necessary.  If one can fool a person into giving away information voluntarily, then creating a program or hack to retrieve that information involuntarily is no required.  Furthermore, it can be much simpler and efficient to get information from someone through social engineering than it would ever be to steal that information via a computer program or password cracker.  &lt;br /&gt;
&lt;br /&gt;
This form of forcing users to disclose information must be done through some human means.  The point of social engineering is to utilize the fallacies of human logic and biases to trick the target into revealing confidential information through various methods and tactics.&lt;br /&gt;
&lt;br /&gt;
The precautions necessary against social engineering are required to be very proactive.  For example, you can put an anti virus program that will passively scan your computer for viruses automatically. However, the human must be actively on the defense for social engineering tricks and tactics that may be used against them.  Over the years, general guidelines for companies and employees have been developed to give the knowledge necessary to be vigilant and alert for social engineering fraud attempts.&lt;br /&gt;
&lt;br /&gt;
==Tactics and Methods==&lt;br /&gt;
There are various means of utilizing social engineering to obtain confidential and secret information such as passwords and private data.  All of these methods work through some medium in which the attacker has to actually converse with the victim in some way, whether directly or indirectly.  In all methods, feedback from the victim is required.  This feedback is usually the necessary information the attacker was looking for.&lt;br /&gt;
&lt;br /&gt;
Although social engineering tactics are heavily performed through electronic and computer mediums.  There are many methods in which social engineering can be done through the physical realm.  As long as there can be some form of communication between the attacker and the victim any medium may be used.  Social engineering is so successful because it takes advantage of the fallacies of the human being.  Whether by means of flattery, impersonation, and greed; social engineering is considered to some an art form of psychology.&lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
The main way of retrieving electronic information from victim voluntarily is through phishing.  Phishing, like social engineering, can be performed over various electronic and physical mediums.  In a general term, phishing is pretending to be something legitimate, when you are not.  When you fool the victim into thinking you are the legitimate source that is being faked, they will reveal all the information that would normally be required to use that source.  This may include account numbers, usernames, passwords, or even Social Security Numbers.&lt;br /&gt;
&lt;br /&gt;
A major medium of phishing is through e-mail.  The example of a bank and customer is extremely common.  The attacker will send the victim an e-mail notifying them of some required account information to be updated.  This e-mail will look exactly like the standard e-mail the victim may have received from the bank before.  The victim will be required to login and update their information as soon as possible.  However, the link will not be sent to the bank website, but to a separate server that was setup by the attacker to retrieve the information.  This website, like the e-mail, will look exactly like the actual bank website.  Once the person types their login information, the attacker then has all the information they needed from the victim.  &lt;br /&gt;
&lt;br /&gt;
Although uncommon, phishing may also be performed over the phone by pretending to be a representative of some company that is requesting some kind of account information.  The attacker may even know some basic information about the victim to prove that they are legitimate.  Usually, a victim will not question the call and will provide the necessary information.  The attacker can then use this information to take advantage of the victim by means of identity or property theft.&lt;br /&gt;
&lt;br /&gt;
===Pretexting===&lt;br /&gt;
[http://www.ftc.gov/bcp/conline/pubs/credit/pretext.shtm Pretexting] is a form of using information about the victim to obtain even more information or to use it against the victim.  Through pretexting the attacker uses the limited information gained to obtain more information.  Once enough information is gained.  The attacker may use credit pretending to be the victim, to make purchases acting as the victim, or to manipulate the records of the victim.&lt;br /&gt;
&lt;br /&gt;
The goal of pretexting is to prove to someone that you are legitimately the victim.  This may be done from proving that you know their name, address, phone number, and Social Security Number.  This could also be done by knowing the victim's username and password that was retrieved through phishing.&lt;br /&gt;
&lt;br /&gt;
===Trojan Horse===&lt;br /&gt;
A [http://www.tech-faq.com/trojan-horse-virus.shtml Trojan Horse] a technological form of social engineering.  Not only does it fool the victim that it is from a legitimate source, but it also fools the computer the victim is using.  A trojan horse is a program that may seem to perform a legitimate action, but in fact is collecting sensitive information or stealing data in the background.  This is, of coruse, derived from the ancient tactic used by the Spartans to invade Troy by pretending to be a gift to the Trojans (which is an ancient example of social engineering).&lt;br /&gt;
&lt;br /&gt;
To be specific, a ''gimme'' is a type of Trojan Horse that plays off of Social Engineering.  This tactic goes in conjunction with spamming or phishing.  The user will receive a pop-up ad or e-mail ad notifying the victim of some software that would benefit them.  Because of their curiosity and the seeming innocence of the program, the victim will install it on their machine.  The software may even perform as advertised, but in the background is obtaining account information and other confidential data.&lt;br /&gt;
&lt;br /&gt;
This is where a computer program pretends to be something it is not.  Instead of an actual human being performing the pretexting, it is an automated computer program.&lt;br /&gt;
&lt;br /&gt;
==Security, Precautions, and Defenses==&lt;br /&gt;
&lt;br /&gt;
==Ethical and Legal Concerns==&lt;br /&gt;
&lt;br /&gt;
==Study Guide==&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist}}&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/risks/security/precautions/ Security Precautions (Old Project Page)]&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Social_engineering_%28security%29 Social Engineering (Wikipedia)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.securityfocus.com/infocus/1527 Social Engineering Fundamentals]&lt;br /&gt;
&lt;br /&gt;
* [http://searchfinancialsecurity.techtarget.com/tip/0,289483,sid185_gci1294530,00.html Social Engineering Attacks]&lt;br /&gt;
&lt;br /&gt;
* [http://www.sans.org/reading_room/whitepapers/engineering/511.php Proactive Defense to Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://www.morehouse.org/hin/blckcrwl/hack/soceng.txt Social Engineering FAQ]&lt;br /&gt;
&lt;br /&gt;
* [http://www.hackinthebox.org/modules.php?op=modload&amp;amp;name=News&amp;amp;file=article&amp;amp;sid=15170&amp;amp;mode=thread&amp;amp;order=0&amp;amp;thold=0 Social Engineering Defense 101]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cioupdate.com/trends/article.php/3638951 Best Defense Against Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://techrepublic.com.com/5208-6230-0.html?forumID=102&amp;amp;threadID=232696 Social Engineering Self-defense]&lt;br /&gt;
&lt;br /&gt;
* [http://news.cnet.com/8301-1009_3-9995253-83.html Social Engineering: Hackers show how it is done]&lt;/div&gt;</summary>
		<author><name>Cjsoques</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=15024</id>
		<title>Social Engineering</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=15024"/>
		<updated>2008-07-23T16:29:12Z</updated>

		<summary type="html">&lt;p&gt;Cjsoques: /* Trojan Horse */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Social engineering a method of fraud and hacking that utilizes the humanity and nature of people to retrieve information from them voluntarily.  By playing into the nature of the person, hacking through technological means is sometimes not necessary.  If one can fool a person into giving away information voluntarily, then creating a program or hack to retrieve that information involuntarily is no required.  Furthermore, it can be much simpler and efficient to get information from someone through social engineering than it would ever be to steal that information via a computer program or password cracker.  &lt;br /&gt;
&lt;br /&gt;
This form of forcing users to disclose information must be done through some human means.  The point of social engineering is to utilize the fallacies of human logic and biases to trick the target into revealing confidential information through various methods and tactics.&lt;br /&gt;
&lt;br /&gt;
The precautions necessary against social engineering are required to be very proactive.  For example, you can put an anti virus program that will passively scan your computer for viruses automatically. However, the human must be actively on the defense for social engineering tricks and tactics that may be used against them.  Over the years, general guidelines for companies and employees have been developed to give the knowledge necessary to be vigilant and alert for social engineering fraud attempts.&lt;br /&gt;
&lt;br /&gt;
==Tactics and Methods==&lt;br /&gt;
There are various means of utilizing social engineering to obtain confidential and secret information such as passwords and private data.  All of these methods work through some medium in which the attacker has to actually converse with the victim in some way, whether directly or indirectly.  In all methods, feedback from the victim is required.  This feedback is usually the necessary information the attacker was looking for.&lt;br /&gt;
&lt;br /&gt;
Although social engineering tactics are heavily performed through electronic and computer mediums.  There are many methods in which social engineering can be done through the physical realm.  As long as there can be some form of communication between the attacker and the victim any medium may be used.  Social engineering is so successful because it takes advantage of the fallacies of the human being.  Whether by means of flattery, impersonation, and greed; social engineering is considered to some an art form of psychology.&lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
The main way of retrieving electronic information from victim voluntarily is through phishing.  Phishing, like social engineering, can be performed over various electronic and physical mediums.  In a general term, phishing is pretending to be something legitimate, when you are not.  When you fool the victim into thinking you are the legitimate source that is being faked, they will reveal all the information that would normally be required to use that source.  This may include account numbers, usernames, passwords, or even Social Security Numbers.&lt;br /&gt;
&lt;br /&gt;
A major medium of phishing is through e-mail.  The example of a bank and customer is extremely common.  The attacker will send the victim an e-mail notifying them of some required account information to be updated.  This e-mail will look exactly like the standard e-mail the victim may have received from the bank before.  The victim will be required to login and update their information as soon as possible.  However, the link will not be sent to the bank website, but to a separate server that was setup by the attacker to retrieve the information.  This website, like the e-mail, will look exactly like the actual bank website.  Once the person types their login information, the attacker then has all the information they needed from the victim.  &lt;br /&gt;
&lt;br /&gt;
Although uncommon, phishing may also be performed over the phone by pretending to be a representative of some company that is requesting some kind of account information.  The attacker may even know some basic information about the victim to prove that they are legitimate.  Usually, a victim will not question the call and will provide the necessary information.  The attacker can then use this information to take advantage of the victim by means of identity or property theft.&lt;br /&gt;
&lt;br /&gt;
===Pretexting===&lt;br /&gt;
[http://www.ftc.gov/bcp/conline/pubs/credit/pretext.shtm Pretexting] is a form of using information about the victim to obtain even more information or to use it against the victim.  Through pretexting the attacker uses the limited information gained to obtain more information.  Once enough information is gained.  The attacker may use credit pretending to be the victim, to make purchases acting as the victim, or to manipulate the records of the victim.&lt;br /&gt;
&lt;br /&gt;
The goal of pretexting is to prove to someone that you are legitimately the victim.  This may be done from proving that you know their name, address, phone number, and Social Security Number.  This could also be done by knowing the victim's username and password that was retrieved through phishing.&lt;br /&gt;
&lt;br /&gt;
===Trojan Horse===&lt;br /&gt;
A [http://www.tech-faq.com/trojan-horse-virus.shtml Trojan Horse] a technological form of social engineering.  Not only does it fool the victim that it is from a legitimate source, but it also fools the computer the victim is using.  A trojan horse is a program that may seem to perform a legitimate action, but in fact is collecting sensitive information or stealing data in the background.  This is, of coruse, derived from the ancient tactic used by the Spartans to invade Troy by pretending to be a gift to the Trojans (which is an ancient example of social engineering).&lt;br /&gt;
&lt;br /&gt;
To be specific, a ''gimme'' is a type of Trojan Horse that plays off of Social Engineering.  This tactic goes in conjunction with spamming or phishing.  The user will receive a pop-up ad or e-mail ad notifying the victim of some software that would benefit them.  Because of their curiosity and the seeming innocence of the program, the victim will install it on their machine.  The software may even perform as advertised, but in the background is obtaining account information and other confidential data.&lt;br /&gt;
&lt;br /&gt;
This is where a computer program pretends to be something it is not.  Instead of an actual human being performing the pretexting, it is an automated computer program.&lt;br /&gt;
&lt;br /&gt;
===Dumpster Diving===&lt;br /&gt;
&lt;br /&gt;
===Phone Impersonation===&lt;br /&gt;
&lt;br /&gt;
==Security, Precautions, and Defenses==&lt;br /&gt;
&lt;br /&gt;
==Ethical and Legal Concerns==&lt;br /&gt;
&lt;br /&gt;
==Study Guide==&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist}}&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/risks/security/precautions/ Security Precautions (Old Project Page)]&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Social_engineering_%28security%29 Social Engineering (Wikipedia)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.securityfocus.com/infocus/1527 Social Engineering Fundamentals]&lt;br /&gt;
&lt;br /&gt;
* [http://searchfinancialsecurity.techtarget.com/tip/0,289483,sid185_gci1294530,00.html Social Engineering Attacks]&lt;br /&gt;
&lt;br /&gt;
* [http://www.sans.org/reading_room/whitepapers/engineering/511.php Proactive Defense to Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://www.morehouse.org/hin/blckcrwl/hack/soceng.txt Social Engineering FAQ]&lt;br /&gt;
&lt;br /&gt;
* [http://www.hackinthebox.org/modules.php?op=modload&amp;amp;name=News&amp;amp;file=article&amp;amp;sid=15170&amp;amp;mode=thread&amp;amp;order=0&amp;amp;thold=0 Social Engineering Defense 101]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cioupdate.com/trends/article.php/3638951 Best Defense Against Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://techrepublic.com.com/5208-6230-0.html?forumID=102&amp;amp;threadID=232696 Social Engineering Self-defense]&lt;br /&gt;
&lt;br /&gt;
* [http://news.cnet.com/8301-1009_3-9995253-83.html Social Engineering: Hackers show how it is done]&lt;/div&gt;</summary>
		<author><name>Cjsoques</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=15022</id>
		<title>Social Engineering</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Social_Engineering&amp;diff=15022"/>
		<updated>2008-07-23T16:28:46Z</updated>

		<summary type="html">&lt;p&gt;Cjsoques: /* Trojan Horse */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Social engineering a method of fraud and hacking that utilizes the humanity and nature of people to retrieve information from them voluntarily.  By playing into the nature of the person, hacking through technological means is sometimes not necessary.  If one can fool a person into giving away information voluntarily, then creating a program or hack to retrieve that information involuntarily is no required.  Furthermore, it can be much simpler and efficient to get information from someone through social engineering than it would ever be to steal that information via a computer program or password cracker.  &lt;br /&gt;
&lt;br /&gt;
This form of forcing users to disclose information must be done through some human means.  The point of social engineering is to utilize the fallacies of human logic and biases to trick the target into revealing confidential information through various methods and tactics.&lt;br /&gt;
&lt;br /&gt;
The precautions necessary against social engineering are required to be very proactive.  For example, you can put an anti virus program that will passively scan your computer for viruses automatically. However, the human must be actively on the defense for social engineering tricks and tactics that may be used against them.  Over the years, general guidelines for companies and employees have been developed to give the knowledge necessary to be vigilant and alert for social engineering fraud attempts.&lt;br /&gt;
&lt;br /&gt;
==Tactics and Methods==&lt;br /&gt;
There are various means of utilizing social engineering to obtain confidential and secret information such as passwords and private data.  All of these methods work through some medium in which the attacker has to actually converse with the victim in some way, whether directly or indirectly.  In all methods, feedback from the victim is required.  This feedback is usually the necessary information the attacker was looking for.&lt;br /&gt;
&lt;br /&gt;
Although social engineering tactics are heavily performed through electronic and computer mediums.  There are many methods in which social engineering can be done through the physical realm.  As long as there can be some form of communication between the attacker and the victim any medium may be used.  Social engineering is so successful because it takes advantage of the fallacies of the human being.  Whether by means of flattery, impersonation, and greed; social engineering is considered to some an art form of psychology.&lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
The main way of retrieving electronic information from victim voluntarily is through phishing.  Phishing, like social engineering, can be performed over various electronic and physical mediums.  In a general term, phishing is pretending to be something legitimate, when you are not.  When you fool the victim into thinking you are the legitimate source that is being faked, they will reveal all the information that would normally be required to use that source.  This may include account numbers, usernames, passwords, or even Social Security Numbers.&lt;br /&gt;
&lt;br /&gt;
A major medium of phishing is through e-mail.  The example of a bank and customer is extremely common.  The attacker will send the victim an e-mail notifying them of some required account information to be updated.  This e-mail will look exactly like the standard e-mail the victim may have received from the bank before.  The victim will be required to login and update their information as soon as possible.  However, the link will not be sent to the bank website, but to a separate server that was setup by the attacker to retrieve the information.  This website, like the e-mail, will look exactly like the actual bank website.  Once the person types their login information, the attacker then has all the information they needed from the victim.  &lt;br /&gt;
&lt;br /&gt;
Although uncommon, phishing may also be performed over the phone by pretending to be a representative of some company that is requesting some kind of account information.  The attacker may even know some basic information about the victim to prove that they are legitimate.  Usually, a victim will not question the call and will provide the necessary information.  The attacker can then use this information to take advantage of the victim by means of identity or property theft.&lt;br /&gt;
&lt;br /&gt;
===Pretexting===&lt;br /&gt;
[http://www.ftc.gov/bcp/conline/pubs/credit/pretext.shtm Pretexting] is a form of using information about the victim to obtain even more information or to use it against the victim.  Through pretexting the attacker uses the limited information gained to obtain more information.  Once enough information is gained.  The attacker may use credit pretending to be the victim, to make purchases acting as the victim, or to manipulate the records of the victim.&lt;br /&gt;
&lt;br /&gt;
The goal of pretexting is to prove to someone that you are legitimately the victim.  This may be done from proving that you know their name, address, phone number, and Social Security Number.  This could also be done by knowing the victim's username and password that was retrieved through phishing.&lt;br /&gt;
&lt;br /&gt;
===Trojan Horse===&lt;br /&gt;
A Trojan Horse a technological form of social engineering.  Not only does it fool the victim that it is from a legitimate source, but it also fools the computer the victim is using.  A trojan horse is a program that may seem to perform a legitimate action, but in fact is collecting sensitive information or stealing data in the background.  This is, of coruse, derived from the ancient tactic used by the Spartans to invade Troy by pretending to be a gift to the Trojans (which is an ancient example of social engineering).&lt;br /&gt;
&lt;br /&gt;
To be specific, a ''gimme'' is a type of Trojan Horse that plays off of Social Engineering.  This tactic goes in conjunction with spamming or phishing.  The user will receive a pop-up ad or e-mail ad notifying the victim of some software that would benefit them.  Because of their curiosity and the seeming innocence of the program, the victim will install it on their machine.  The software may even perform as advertised, but in the background is obtaining account information and other confidential data.&lt;br /&gt;
&lt;br /&gt;
This is where a computer program pretends to be something it is not.  Instead of an actual human being performing the pretexting, it is an automated computer program.&lt;br /&gt;
&lt;br /&gt;
===Dumpster Diving===&lt;br /&gt;
&lt;br /&gt;
===Phone Impersonation===&lt;br /&gt;
&lt;br /&gt;
==Security, Precautions, and Defenses==&lt;br /&gt;
&lt;br /&gt;
==Ethical and Legal Concerns==&lt;br /&gt;
&lt;br /&gt;
==Study Guide==&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist}}&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
* [http://ethics.csc.ncsu.edu/risks/security/precautions/ Security Precautions (Old Project Page)]&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Social_engineering_%28security%29 Social Engineering (Wikipedia)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.securityfocus.com/infocus/1527 Social Engineering Fundamentals]&lt;br /&gt;
&lt;br /&gt;
* [http://searchfinancialsecurity.techtarget.com/tip/0,289483,sid185_gci1294530,00.html Social Engineering Attacks]&lt;br /&gt;
&lt;br /&gt;
* [http://www.sans.org/reading_room/whitepapers/engineering/511.php Proactive Defense to Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://www.morehouse.org/hin/blckcrwl/hack/soceng.txt Social Engineering FAQ]&lt;br /&gt;
&lt;br /&gt;
* [http://www.hackinthebox.org/modules.php?op=modload&amp;amp;name=News&amp;amp;file=article&amp;amp;sid=15170&amp;amp;mode=thread&amp;amp;order=0&amp;amp;thold=0 Social Engineering Defense 101]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cioupdate.com/trends/article.php/3638951 Best Defense Against Social Engineering]&lt;br /&gt;
&lt;br /&gt;
* [http://techrepublic.com.com/5208-6230-0.html?forumID=102&amp;amp;threadID=232696 Social Engineering Self-defense]&lt;br /&gt;
&lt;br /&gt;
* [http://news.cnet.com/8301-1009_3-9995253-83.html Social Engineering: Hackers show how it is done]&lt;/div&gt;</summary>
		<author><name>Cjsoques</name></author>
	</entry>
</feed>