
Security Basics mailing list archives
Re: Re: Steps to avoid Social Engineering (voice recognition)
From: "Steve" <securityfocus () delahunty com>
Date: Mon, 25 Apr 2005 08:04:22 -0400
Somebody mentioned voice recognition as a possibility. And while it might be expensive for this certain purpose I read a very interesting article recently about the use of such technology at a bank related to authentication and authorization. See http://www.nwc.com/showArticle.jhtml?articleID=48800445 The Payoff: Voice of Authority Associated Bank, Green Bay, Wis. Associated Bank is reducing customer calls by using voiceprint technology to dole out personal ID numbers without human intervention. STEVE ----- Original Message ----- From: "Steve" <securityfocus () delahunty com> To: "Raoul Armfield" <armfield () amnh org>; "Tabs The Cat" <tabsthecat () gmail com> Cc: <security-basics () securityfocus com> Sent: Thursday, April 21, 2005 12:20 PM Subject: Re: Re: Steps to avoid Social Engineering For email verification, could use PGP. We have a service provider that makes us use keyfob (SecureID) to authenicate when we call in. STEVE ----- Original Message ----- From: "Raoul Armfield" <armfield () amnh org> To: "Tabs The Cat" <tabsthecat () gmail com> Cc: <security-basics () securityfocus com> Sent: Tuesday, April 19, 2005 3:58 PM Subject: [Re: Steps to avoid Social Engineering Tabs The Cat wrote:
Hello y'all, I have a question for you guys (and gals). We all know about social engineering. Some of us use it on a daily basis. And we all know how it can be even more dangerous than any computerized attacks, but how can we protect against it? I'll give you an example: we have a database based program that was written by and maintained by a third party that is in another city. In the past when they needed access for maintenance, we would provide them it via VPN. Recently there has been a problem so they were contacted. Earlier today someone from that company phoned me to discuss details about the VPN. I haven't given them any information yet. In this case I am fairly positive it is legit since they knew the company that we use as well as who lodged the complaint. But how could I get this person (or any one in the future) prove to me that they are the people who are they say they are? Any advice? Tabs
I am a security newbie so take this with a grain of salt. How about if you agree, in advance, on an (list of) email address(es) you can send something to. Then when they call send a message to that email address and have them read off a keyword. The reason I suggest doing it in advance is that the person you speak with may give you a fake address rendering this method useless. -- Raoul Armfield Support Specialist IT-Call Center armfield at amnh dot org American Museum of Natural History Central Park West at 79th Street New York, New York 10024-5192 (212) 313-7258 5152 1277 A04B 04C2 BBE4 3EE8 8369 3541 8B93 42DA
Current thread:
- Re: Re: Steps to avoid Social Engineering (voice recognition) Steve (Apr 25)