Page 636 - StudyBook.pdf
P. 636

620    Chapter 11 • Operational and Organizational Security: Incident Response

             tion of employment).While this won’t completely eliminate tailgating, it will limit
             the number of people who attempt or allow security breaches.

             Dumpster Diving

             Another threat that can be overlooked in companies is dumpster diving.As with tail-
             gating, it is about as low tech a method of threatening security as anyone could
             think of. It literally involves getting into a dumpster and going through the trash,
             searching through garbage bags, looking in wastebaskets, and other places where
             people may have disposed sensitive information.
                 The reason that this method of breaching security remains popular, is because it
             is so effective. In addition to the rotting refuse of people’s lunches, one can find
             discarded printouts of data, papers with usernames and passwords, test printouts that
             have Internet Protocol (IP) address information, and even old hard drives, CDs,
             DVDs, and other media containing the information you’d normally have to hack
             the network to obtain. Even the most innocuous waste may provide a wealth of
             information. For example, printouts of e-mail will contain a person’s name, e-mail
             address, contact information, and other data that could be used for social engi-
             neering purposes (discussed in the next section).
                 There are many solutions to resolving dumpster diving as a security issue.
             Dumpsters can be locked with a padlock to limit access, or they can be kept in
             locked garages or sheds until they’re ready for pickup. Companies can also imple-
             ment a shredding policy, so that any sensitive information is shredded and rendered
             unusable by anyone who finds it.This is especially important if the company has a
             recycling program, in which paper products are kept separate. If documents aren’t
             shredded, the recycling containers make it even easier to find information, as all of
             the printouts, memos, and other documentation are isolated in a single container.
             Because discarded data isn’t always in paper form, companies also need to implement
             a strict hardware and storage media disposal policy, so that hard disks are completely
             wiped and old CDs and DVDs containing information are destroyed. By obliterating
             the data before the media is disposed, and protecting the waste containers used after-
             wards, dumpster diving becomes difficult or impossible to perform.

             Social Engineering

             Hacking may be done through expert computer skills, programs that acquire infor-
             mation, or through an understanding of human behavior.This last method is called
             social engineering.When social engineering is used, hackers misrepresent themselves
             or trick a person into revealing information. Using this method, a hacker may ask a
             user for their password, or force the user to reveal other sensitive information.


          www.syngress.com
   631   632   633   634   635   636   637   638   639   640   641