03. Attack Tactics

Adversaries:

Targeting individuals is harder than targeting everyone:

Psychology Aspects

The User

Education:

Ability to detect deception:

Behavioral Economics

Present bias and hyperbolic discounting:

Defaults and ‘choice architecture’:

Privacy control settings give people more rope to hang themselves

George Loewenstein

Intentionality and cognition

Education must be fit for audience:

Deception Techniques

Common sales techniques:

Stajano and Wilson’s 7 principles of scam (2011):

User Credentials

Passwords

Passwords:

Advanced tools to safely reuse accounts:

Password recovery is not just a ‘send a magic link’

Good password practices:

Memorability (Yan et al., ‘Password memorability and security, empirical results’, 2004):

Guidelines and real life:

Non-phishing Attacks

(Automated) systems to get illegitimate access to a particular account:

(Automated) systems to get details of all accounts:

(Automated) systems to block accounts:

If your encryption, OS and network security mechanism are trusted, it comes down to two factors:

Security and Organization

Security players:

Types of malware:

Knowledge Bases

Mitre Att&ck:

Tactics:

Assignment