Top Banner
1

Seductive security - Art of seduction

Apr 22, 2015

Download

Technology

b coatesworth

The art of seduction, looking how behavior psychology can influence the perception of information security. How cialdini principles of influence are used in phishing attacks, and viral marketing.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Seductive security - Art of seduction

The perception of information security in a modern business.

Page 2: Seductive security - Art of seduction

Behaviour

F INANCE

TELECOMMS

HEALTHCARE

RETAI L

TECHNOLOGY

DEFENCE

Users

Human behaviour

Page 3: Seductive security - Art of seduction

Human engineering

Carnegie Institute of Technology 85 per cent of your success is due to skills in “human engineering,” your personality and ability to communicate, negotiate, and lead. only 15 per cent is due to technical knowledge.

Page 4: Seductive security - Art of seduction

User experience...

Page 5: Seductive security - Art of seduction

5

Effective security changes peoples behaviour in a subtle way. Behavioural psychology is becoming even more important for security practitioners, helping to influence executive decisions, and also to change peoples perspectives around security, and its misconceptions. Ultimately reducing risk, increasing value, and saving time.

You need to win hearts and minds. To do that, think differently…

Security Perception

Page 6: Seductive security - Art of seduction

Challenging Stereotypes

Page 7: Seductive security - Art of seduction

7

Survival of the fittest Information Security just like the business or brand it protects, must evolve and become best “fitted,” or best “adapted,” to its environment for it to survive, and help the business to grow.

The evolution of security

AGILE FLEXIBLE

ADAPT OR DIE

ADAPTABLE BOLD

Page 8: Seductive security - Art of seduction

Fortress Mentality

STATIC

SLOW

INEFFICIENT

Page 9: Seductive security - Art of seduction

Flexible Framework

AGILE

ADAPTABLE

EVOLVING

Page 10: Seductive security - Art of seduction

Security as a brand

Page 11: Seductive security - Art of seduction

11

Security PR – spin doctors

By making security engaging, it gains more acceptance.

Security should be a positive experience for the majority of people

Acceptance, is not only good for the business, it is good for you.

Try to make security fun for your constituents, while still getting the “message” across.

Page 12: Seductive security - Art of seduction

Making IT personal

Security has to appear human, and not a soulless destroyer of worlds.

NO!!!

Page 13: Seductive security - Art of seduction

IT Savvy – only human

I have won a free iPad!

O’Really…

Page 14: Seductive security - Art of seduction

The Art of

Seduction*

*or, “How Information Security can improve your sex life.”

Page 15: Seductive security - Art of seduction

“Phishing is the act of attempting to acquire information by masquerading as a trustworthy entity in an electronic communication”

Social Enginnering & Phishing

Page 16: Seductive security - Art of seduction

16

Who engages in social engineering Who Uses Social Engineering

We All do.

HACKERS

POLITICIANS

SALESMEN

SPIES

SCAM / CON MEN

PUA

ACTORS

MARKETERS

Page 17: Seductive security - Art of seduction

The Psychology of Seduction

1. Reciprocation (Favours)

2. Commitment

3. Social values

4. Liking

5. Authority

6. Scarcity

Page 18: Seductive security - Art of seduction

Reciprocation

We are hard-wired to respond to a

favour or gift, often not in direct

proportion to the size of the favour

done to us.

Page 19: Seductive security - Art of seduction

Commitment and Consistency

Once we make a choice or take a

stand, we will encounter personal

and inter-personal pressures to

behave consistently with that

commitment.

When we “commit” we want to

believe in a positive outcome.

Page 20: Seductive security - Art of seduction

The Principle of Social Proof

We view a behaviour to be more

correct in a given situation to the

degree that we see others

performing it.

By leveraging the power of social

networking sites such as LinkedIn

and Facebook.

Page 21: Seductive security - Art of seduction

The Principle of Liking

Not a difficult principle to

understand, we prefer to say yes

to requests from someone we

know and like.

Page 22: Seductive security - Art of seduction

The Principle of Authority

Once we realize that obedience to

authority is mostly rewarding, it is

easy to allow ourselves the

convenience of automatic

obedience.

Page 23: Seductive security - Art of seduction

The Principle of Scarcity

One of the most common tactics

is to build time pressure. The

scarcity of time often makes

people comply with requests in

violation of their policies and their

own common sense.

Page 24: Seductive security - Art of seduction

Gamification

Competition Engagement Increase Loyalty Builds Empathy Improves awareness

Page 25: Seductive security - Art of seduction

Trick or Treat

Positive reinforcement

Negative reinforcement

Page 26: Seductive security - Art of seduction

Risk reduction

Find out what people fear…

…Then make it go away.

Page 27: Seductive security - Art of seduction

test

Waterhole’s Social proof = Social behaviour = your social profile

Page 28: Seductive security - Art of seduction

Creatures of habit Social engineering and phishing

works, as we are programmed to

have “rituals”, and the majority of

things we do day to day are

habitual.

Rituals = Patterns of behaviour

Same websites Favourite food

Friendships Social networks

Waterholes exploit your social

patterns, behaviour and rituals.

Page 29: Seductive security - Art of seduction

Asymmetric warfare

INTERNET

Home network Corporate network

Page 30: Seductive security - Art of seduction

Asymmetric warfare

Friends and Family

Page 31: Seductive security - Art of seduction

The art of Seduction Seducers draw you in by focused individualised attention Choose the right victim – study your prey thoroughly and choose only those susceptible to your charms Create a false sense of security – if you are too direct early on, you risk stirring up resistance and that will never be lowered An object of desire – to draw your victim closer, create an aura of desirability Create temptation – find the weakness of theirs, keep it vague and stimulate curiosity Pay attention to detail – the details of seduction, subtle gestures, thoughtful gifts tailored for them

Page 32: Seductive security - Art of seduction

Recap

THANK YOU