{"id":96,"date":"2021-10-19T14:30:30","date_gmt":"2021-10-19T18:30:30","guid":{"rendered":"https:\/\/community.mis.temple.edu\/mis5211sec002fall2021\/?p=96"},"modified":"2021-10-19T14:30:30","modified_gmt":"2021-10-19T18:30:30","slug":"human-psyche-is-the-victim","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5211sec002fall2021\/2021\/10\/19\/human-psyche-is-the-victim\/","title":{"rendered":"Human Psyche is the Victim"},"content":{"rendered":"<p>Title: <a href=\"https:\/\/www.darkreading.com\/edge-articles\/how-attackers-hack-humans\">How Attackers Hack Humans<\/a><br \/>\nAuthor: Williesha Morris<br \/>\nPublish Date: October 15, 2021<br \/>\nWebsite: DarkReading.com<\/p>\n<p>We talked about social engineering and how employees are targeted to gather information. Recon 101! Email, phone, text. It&#8217;s an interesting perspective article on hacking humans told from the POV of former CIA operative Peter Wamka. He speaks about how tools 20 years in the making are being used now to rely on soft targets to get to hard targets.<\/p>\n<p>Some key points we talked about in class were distinctly pointed out in the article:<\/p>\n<ul>\n<li>insider targets: overworked, underpaid, and underappreciated employees<\/li>\n<li>job postings: can detail all of the systems and databases that a company uses that can be targeted for infiltration<\/li>\n<li>media releases: show how an organization is growing and changing and name potential targets and their job titles or even hobbies and interests.<\/li>\n<li>internet searches: &#8220;employee manual&#8221; and &#8220;PDF&#8221;\u00a0 can reveal benefit packages, rules, and other confidential information<\/li>\n<li>social media: work history, certifications, volunteer work, political leanings, relationship statuses, and favorite books and movies.<\/li>\n<li>pictures: demonstrate socioeconomic status<\/li>\n<\/ul>\n<p>An interesting take on the article is that it provides an interesting alternative option to protecting their employees. Not jus the IT Security mandatory employee training, but taking &#8220;protecting your people&#8221; to another level.<\/p>\n<ul>\n<li>Offering training or classes with guidance on how to secure their social media profiles.\n<ul>\n<li>&#8220;Helping employees use privacy controls and restricted settings is good for their personal safety and can help the organization, as well.&#8221;<\/li>\n<\/ul>\n<\/li>\n<li>Show how social media posts can be used against a person.<\/li>\n<li>Training to include what work details shouldn&#8217;t be posted socially.<\/li>\n<\/ul>\n<p>Essentially, the company is protecting itself by virtue of protecting you.<\/p>\n<p>Very good read!<\/p>\n<p>Also, if interested:\u00a0 Peter Wamka has a book out that could prove to be very fun: <a href=\"https:\/\/read.amazon.com\/kp\/embed?asin=B08QYZJ13K&amp;preview=newtab&amp;linkCode=kpe&amp;ref_=cm_sw_r_kb_dp_59VVAH905459JSFJEW70\">Confessions of a CIA Spy: The Art of Human Hacking<\/a><\/p>\n<p>Vanessa<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Title: How Attackers Hack Humans Author: Williesha Morris Publish Date: October 15, 2021 Website: DarkReading.com We talked about social engineering and how employees are targeted to gather information. Recon 101! Email, phone, text. It&#8217;s an interesting perspective article on hacking humans told from the POV of former CIA operative Peter Wamka. He speaks about how [&hellip;]<\/p>\n","protected":false},"author":15777,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[451],"tags":[],"class_list":{"0":"post-96","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-8","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec002fall2021\/wp-json\/wp\/v2\/posts\/96","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec002fall2021\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec002fall2021\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec002fall2021\/wp-json\/wp\/v2\/users\/15777"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec002fall2021\/wp-json\/wp\/v2\/comments?post=96"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/mis5211sec002fall2021\/wp-json\/wp\/v2\/posts\/96\/revisions"}],"predecessor-version":[{"id":97,"href":"https:\/\/community.mis.temple.edu\/mis5211sec002fall2021\/wp-json\/wp\/v2\/posts\/96\/revisions\/97"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec002fall2021\/wp-json\/wp\/v2\/media?parent=96"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec002fall2021\/wp-json\/wp\/v2\/categories?post=96"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec002fall2021\/wp-json\/wp\/v2\/tags?post=96"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}