usenix conference policies
You are here
Information Security Technology? Don't Rely on It. A Case Study in Social Engineering
Ira S. Winkler & Brian Dealy, Science Applications International Corp.
Many companies spend hundreds of thousands of dollars to ensure corporate computer security. The security protects company secrets, assists in compliance with federal laws, and enforces privacy of company clients. Unfortunately, even the best security mechanisms can be bypassed through Social Engineering. Social Engineering uses very low cost and low technology means to overcome impediments posed by information security measures. This paper details a Social Engineering attack performed against a company with their permission. The attack yielded sensitive company information and numerous user passwords, from many areas within the company, giving the attackers the ability to cripple the company despite extremely good technical information security measures. The results would have been similar with almost any other company. The paper concludes with recommendations for minimizing the Social Engineering threat.
author = {Ira S. Winkler and Brian Dealy},
title = {Information Security Technology? Don{\textquoteright}t Rely on It. A Case Study in Social Engineering},
booktitle = {5th USENIX UNIX Security Symposium (USENIX Security 95)},
year = {1995},
address = {Salt Lake City, UT},
url = {https://www.usenix.org/conference/5th-usenix-unix-security-symposium/information-security-technology-dont-rely-it-case},
publisher = {USENIX Association},
month = jun
}
connect with us