Accessible Online Security

Logo

A comprehensive guide to Online Security. This is a Mozilla Open Leaders X Project.

View the Project on GitHub BrianObilo/onlinesecurity.github.io

Table of Contents

  1. Introduction
  2. Introduction to Cybersecurity
  3. Cybersecurity Threats
  4. Personal Security
  5. Password Security
  6. Secure Online Communications

3.1 Social Engineering

Social engineering is a technique that uses psychological manipulation to trick users into making security mistakes or giving away sensitive information. This is one of the greatest threats to cybersecurity today because it takes advantage of people’s trusting nature hence it is less predictable and harder to detect and respond to.

Ideally, an attacker gathers information about a user and uses it to establish trust. Once trust is established, the attacker gets the targeted information without raising suspicion.

Social Engineering undoubtedly presents the greatest threat to confidentiality today.

Types of Social Engineering Techniques

1. Phishing

Phishing is one of the most popular social engineering techniques. It involves scams sent via emails, text messages or calls. These scams create a sense of urgency or inspire fear in the target causing them to click on malicious links, divulge sensitive information or download malicious attachments.

Phishing done via text messages is known as smishing while phishing done via phone calls is known as vishing. Vishing can be combined with other forms of social engineering Attackers also take advantage of current events and certain times of the year. These include:

Examples of Phishing Scams

Phishing stats

2. Spear Phishing

Spear phishing is a targeted form of phishing. It targets specific individuals, or organization. These scams are usually tailored to fit the target’s characteristics such as job position and contacts. This makes it less conspicuous. Therefore, spear phishing has a higher success rate but takes longer to plan and execute.

3. Baiting

Baiting uses a false promise to pique a target’s curiosity or greed. This causes the victim to visit/click a malicious website or even plug in a removable media. For instance, enticing ads such as “Win an iPhone” or even cars.

Attackers can also leave infected USB flash drive with tags such as ‘payroll’, and out of curiosity, employees fall victim and end up executing malware on their machines(once they plug in the USB).

4. Pretexting

In this technique, an attacker uses crafted lies to steal information. The attacker pretends to be from a trusted authority such as banks or police, so as to build trust.

For instance, in the Kenyan context, an attacker may impersonate a Safaricom customer care representative and ask the victim to reveal private information such as ID number, MPESA PIN etc.

5. Quid pro quo

Quid pro quo attacks promise a benefit in exchange for information.

Prevention of Social Engineering

  1. Multi Factor Authentication(MFA) - Most attackers are after user credentials, therefore, multi factor authentication protects your accounts in the event of compromise.
  2. Install Anti Malware Software - Anti-malware software will detect and protect your machine from malicious attachments that contain malware.
  3. Email Security - Email is currently the most common way cyber criminals launch and distribute threats. The level of sophistication of email attacks has increased over the past few years. It’s very vital to protect against phony emails. Often email attachments are means of distributing malicious code.

Links in the emails may redirect to sites that seem legitimate but are used for phishing. Often by clicking these links, your system becomes infected and you too, will be propagating those links.

Malware will “read” an infected user’s email list and replicate itself to other users.

Just because an email indicates it originates with trusted source doesn’t mean that is actually true.

Phishing prevention meme

What to do

Activity

Participants should watch the following videos:

My Page


My Page


This is what happens when you respond to spam:

My Page


My Page

Participants will also be taken through practical identification of phishing emails during the online session. Image used for the session.

Phishing prevention meme

Next > 3.2 Malware