Overview of Steganography and Security
- Steganography Concept
- Definition: Hiding messages in plain sight by using everyday objects.
- Example: Women knitting socks during wartime, encoding messages via the knitting patterns to evade border checks.
- Implication: This method of communication is effective since it avoids suspicion compared to standard communication methods.
Connection to Technology
Arthur C. Clarke's Quote
- "Any sufficiently advanced technology is indistinguishable from magic" - highlights the concept of hidden threats within technology.
Historical Example
- Ancient Greece:
- Method of messenger stealth included tattooing messages on a shaved slave's head, later concealing it with hair regrowth.
Hidden Information in Technology
Payload and Carrier
- Payload: The actual message being transmitted.
- Carrier: The medium used to conceal the message (e.g., socks or data files).
- Together they create the COBRA message.
Printer Tracking
- Printers embed invisible yellow dots on printed documents that encode the printer’s serial number and print timestamp.
- These dots serve as hidden identifiers, allowing tracing back to the source printer.
Digital Threats and Watermarking
AI-Generated Videos
- Discussion on observation of watermarks in AI-generated videos reflects the importance of identifying authenticity in digital content.
Manipulated Images
- An image can be manipulated such that it contains malware or a virus, though it appears visually appealing.
Operational Security (OPSEC) and Open Source Intelligence (OSINT)
OPSEC
- Definition: The process of protecting sensitive information within an operation.
OSINT
- Definition: Open Source Intelligence gathering, which leverages publicly available information to derive insights.
- Example of geolocation: Skillful individuals can deduce the origins of images based purely on visual information (e.g. location in Geoguessr).
Social Engineering
- Definition: Psychological manipulation to coerce individuals into divulging confidential information.
- Primary Security Threat: Well-intentioned employees can pose the greatest risk due to their susceptibility to manipulation.
Principles of Social Engineering
Reciprocity
- People feel obliged to return favors or gestures.
Commitment and Consistency
- Individuals desire to be consistent with their identity or commitments.
Social Proof
- Individuals are influenced by the actions of others; humans adapt their behavior based on group actions.
Authority
- Tendency to comply with authority figures, which can be exploited in manipulative scenarios.
Truth Bias
- The inclination to believe others are truthful, making it easier for malicious actors to gain trust.
Phishing and Its Variants
Types of Phishing
Phishing
- Mass emails pretending to be legitimate entities seeking sensitive information.
- Example: Emails mimicking banks, social media sites, etc.
- Example: A phishing strategy can yield significant returns from a large sample size (capturing data from a small response rate).
Spear Phishing
- A targeted approach focusing on a specific individual or organization, requiring in-depth research on the target.
Pretexting
- Creating a scenario that allows gathering personal information under false pretenses.
Vishing (Voice Phishing)
- Fraudulent phone calls aiming to extract personal or financial information.
Waterholing
- Definition: A method where malicious actors create a fake login interface to capture user credentials.
- Example: Using a university login page that appears legitimate but is actually a facade to collect login information.
Physical Security Tests
- Thumb Drive Test
- Leaving thumb drives in common areas to test responses from individuals.
- Purpose: To observe human behavior and susceptibility to security breaches.
- Results: High percentage of individuals plugged in unverified devices, indicating a potential security risk.
Conclusion
- Preparedness Against Social Engineering
- The importance of training staff to recognize potential social engineering tactics, scrutinize information, and develop a strong security mindset.