and users more inter-connected as a result, virtual
social interaction has inevitably followed on a huge
scale. Facebook accounts for approximately 3 in 4
minutes spent on social networking sites and 1 in
every 7 minutes spent online around the world (The
New Age, 2011). Moreover, digital deposits now go
far beyond the superficial “toast and coffee for
breakfast” type of blog. Website forums, Facebook,
Twitter, Tumblr, Wordpress.com are all examples of
social networking media that mobilise social
networks and allow the expression of opinions and
the disclosure of personal data. These data are, to
varying degrees, public and therefore open to
exploitation.
Our inter-connected virtual society has presented
opportunities to the malicious hacker, not only in
terms of direct brute force attack but also in terms of
psychological manipulation, and both contribute
towards what is known as the vector attack in
computer security terminology. Security of
Information Technology has thus become a major
concern for companies and governments. In 2010 in
the UK, cyber-terrorism was prioritised as a Tier
One threat to national security by the government.
The term cyber security is widely adopted to define
this phenomenon.
In the literature, the terms social engineering and
cognitive hacking appear to be synonymous, though
the latter has appeared less recently since it was
coined within a body of work by Cybenko et al.
(2002) and Giani and Thompson (2007). Enrici et al.
(2010) offer a discourse on the cognitive profiling of
a computer hacker and the psychological effects of
human factors in terms of usability and of human
errors in terms of failure, all within the context of IT
security.
Stech (2011) confirms that there have been few
publications that map the social and behavioural
aspects of cyber-deception to the classical denial and
deception tactics adopted in conventional warfare.
Rather, the focus has been on recognising that a
social engineering attack incorporates both technical
and social considerations that feed on the lethargy of
the user regarding security and the aggression of the
malicious hacker (Abraham and Chengalur-Smith,
2010). This combination is further endorsed by
Maan and Sharma (2012). A framework of feedback
loops has also been considered to model the
manoeuvres of the attacker against those of the
organisational countermeasures, where they
postulate that an organisation’s technical defences
are superior to their human equivalents (Gonzalez et
al., 2006). The same authors argue that the key for
the social engineer is to make the countermeasures
transparent so that they can be incorporated into the
main attack feedback loop, which measures the
outcomes of each attack, in order to evaluate the
next action to take.
With specific reference to social media content,
the use of natural language processing has been used
to measure information assurance (Raskin et al.,
2010). This technique applies to monitoring
suspicious activity at social networking sites, where
postings may exhibit inconsistency and therefore
expose the possibility of uncovering insider threats
to social engineering attacks. Linked to this is
research implementing an automated social
engineering bot attack on social media sites such as
Twitter ad Facebook (Huber et al., 2009). In a recent
review, Heikkinen (2010) states how the user can be
lulled into a false sense of security knowing that the
company implement firewall strategies and virus
detection, and emphasise the importance of user
training. The focus of our paper encapsulates the
spirit of Heikkinen’s work as well as encompassing
the notion of the partial technical and social attack of
other authors’ research already outlined.
The next section presents our case study to
illustrate the creative ideas behind the processes of
social engineering to compromise security measures
on a computer system.
3 CASE STUDY
The focus of the case study is on the proposed attack
of a company with whom we have previously
consulted. For privacy, we refer to the company as X
hereafter. The key to unlocking the security
measures on X’s computer system is its employees
by exposing them to a vector attack. All employee
data have also been made anonymous. The full
process of how the employees may be deceived to
disclose the necessary information to breach security
is revealed.
3.1 Aim
The purpose of the case study is to demonstrate
show how a malicious attacker, coupled with the
appropriate use of software tools can harness and
integrate open intelligence gathering into the social
engineering process to bring about a successful
vector attack.
3.2 The Procedure
We adopt a sequence of events to illustrate how a
KDIR2012-InternationalConferenceonKnowledgeDiscoveryandInformationRetrieval
276