{"id":3867,"date":"2018-08-07T19:38:36","date_gmt":"2018-08-07T17:38:36","guid":{"rendered":"https:\/\/blog.mi.hdm-stuttgart.de\/?p=3867"},"modified":"2023-08-06T21:49:43","modified_gmt":"2023-08-06T19:49:43","slug":"social-engineering-hacking-the-human-os","status":"publish","type":"post","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/08\/07\/social-engineering-hacking-the-human-os\/","title":{"rendered":"Social Engineering &#8211; Hacking the human OS"},"content":{"rendered":"<h3>Abstract<\/h3>\n<p>Nowadays, our secure systems are already sophisticated and perform well. In addition, research on subjects such as quantum computers ensures continuous improvement. However, even with a completely secure system, we humans pose the most significant threat. Social engineers prey on this to conduct illegal activities. For early detection and prevention, this paper deals with the analysis and discussion of social engineering attacks. The major challenge is to balance trust and mistrust. However, this threshold varies depending on the application. Therefore, it is advisable to extract patterns from past incidents and to recognize them in future scenarios. First, the basic principles and techniques of social engineers are introduced. Three different models are then analyzed. The effects of social networks and the feasibility of the models are outlined in the 58th US election. Finally, possibilities for avoidance, prevention and recovery are discussed.<\/p>\n<h2>Table of contents<\/h2>\n<p><a name=\"toc\"><\/a><\/p>\n<ul>\n<li><a href=\"#motivation\">Motivation<\/a><\/li>\n<li><a href=\"#principlestechniques\">Principles &amp; Techniques<\/a><\/li>\n<li><a href=\"#models\">Models<\/a><\/li>\n<li><a href=\"#socialmedia\">Social media<\/a><\/li>\n<li><a href=\"#conclusion\">Conclusion<\/a><br \/>\n<!--more--><\/li>\n<\/ul>\n<h2>List of figures<\/h2>\n<ol>\n<li><a href=\"#themissinglink\">The missing link<\/a><\/li>\n<li><a href=\"#surveyresults\">Survey cybercrime<\/a><\/li>\n<li><a href=\"#Mitnickattackcycle\">Mitnick attack cycle<\/a><\/li>\n<li><a href=\"#attackcycle\">Attack cycle<\/a><\/li>\n<li><a href=\"#defensecycle\">Defense cycle<\/a><\/li>\n<li><a href=\"#victimcycle\">Victim cycle<\/a><\/li>\n<li><a href=\"#cycleofdeception\">Cycle of deception<\/a><\/li>\n<li><a href=\"#sphericalview\">Spherical view<\/a><\/li>\n<li><a href=\"#attackclassification\">Attack classification<\/a><\/li>\n<li><a href=\"#ontologicalmodel\">Ontological model<\/a><\/li>\n<li><a href=\"#framework\">Framework<\/a><\/li>\n<li><a href=\"#trumprolestructure\">Role structure applied on 58th US presidential election<\/a><\/li>\n<li><a href=\"#trumpframework\">Framework applied on 58th US presidential election<\/a><\/li>\n<\/ol>\n<h2>Motivation<\/h2>\n<p><a name=\"motivation\"><\/a><\/p>\n<p>In times of fake news, manipulation of the presidential elections in the USA, simple procurement of hacking attacks in the dark net and increasing transparency of identities, system security is a fundamental factor for safeguarding privacy and preventing economically justified data theft.<br \/>\nWith the current state of the art, computer systems can be satisfactorily protected at both the software and hardware levels. In the future, these could be further strengthened with the potential of quantum computers in order to take the next step in IT Security.<br \/>\nOur non-autonomous systems will always tend to have a weak point, which is us, the humans. Figure 1 illustrates the missing connection between the different types of security and points to the problem of human security in our systems.<\/p>\n<p><center><\/p>\n<p><a name=\"themissinglink\"><\/a><\/p>\n<table>\n<thead>\n<tr>\n<th align=\"center\"><img decoding=\"async\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/HumanSecurityTheMissingLink.png\" alt=\"Figure 1: The missing link\"><\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td align=\"center\"><center> <em>Figure 1: The missing link<\/em><a href=\"#ref4\">[4]<\/a> <\/center><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><\/center><\/p>\n<p>Social engineers take advantage of this lack to benefit themselves. Social engineering has a far-reaching history that goes back to 1970 for phreaking until today with ingenious complex attacks. Even today, social engineering is one of the biggest threats to businesses, alongside malware. This is shown in figure 2, which is the result of a survey on cybercrime among 254 international companies.<\/p>\n<p><center><\/p>\n<p><a name=\"surveyresults\"><\/a><\/p>\n<table>\n<thead>\n<tr>\n<th align=\"center\"><img decoding=\"async\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/Motivation.png\" alt=\"Figure 2: Survey results\"><\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td align=\"center\"><center> <em>Figure 2: Survey cybercrime<\/em><a href=\"#ref16\">[16]<\/a> <\/center><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><\/center><\/p>\n<p>Social engineering is therefore a global phenomenon and a major risk for a large number of companies. For this reason, it is important to deal with the topic.<\/p>\n<h3>Definition<\/h3>\n<p>There is no explicit definition of social engineering. The first known definition is from Quann and Belford and already fulfills the core statement quite accurately.<\/p>\n<blockquote><p>\n  An attempt to exploit the help desks and other related support services normally associated with computer systems<\/p><\/blockquote>\n<p>It&#8217;s about exploiting help desks that are connected to computers.<br \/>\nObviously, there is the most widespread definition of Kevin Mitnick.<\/p>\n<blockquote><p>\n  Using influence and persuasion to deceive people and take advantage of their misplaced trust in order to obtain insider information<\/p><\/blockquote>\n<p>It states that people can be tricked by conviction to divulge secret information<a href=\"#ref8\">[8]<\/a>.<\/p>\n<p>During the ongoing research, the so far most suitable definition was discovered. It is explained in the following.<\/p>\n<blockquote><p>\n  Any act that influences a person to take an action that may or may not be in their best interest<\/p><\/blockquote>\n<p>This indicates that social engineering exists when a person is influenced by an action that is in the interest of the person or not.<br \/>\nIt is even more generic and also points out that the manipulation does not necessarily have to be negative.<br \/>\nFor example, educational measures also count as social engineering<a href=\"#ref5\">[5]<\/a>.<\/p>\n<h3>Research questions<\/h3>\n<p>This paper addresses the following questions, as outlined in the <a href=\"#toc\">table of contents<\/a>. These will be answered and discussed throughout.<\/p>\n<ul>\n<li>What are the key features and techniques?<\/li>\n<li>To what extent can attacks be mapped into models?<\/li>\n<li>What is the value of the models?\n<ul>\n<li>How reliable are these?<\/li>\n<\/ul>\n<\/li>\n<li>What opportunities do social media offer?<\/li>\n<li>Did Donald Trump hack himself into presidency?<\/li>\n<li>What are countermeasures?\n<ul>\n<li>What is the impact on companies?<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h2>Principles &amp; Techniques<\/h2>\n<p><a name=\"principlestechniques\"><\/a><\/p>\n<p>The principles distinguish between compliance and psychological ones.<\/p>\n<p>First, we will look at Cialdini&#8217;s six key compliance principles. These principles make people submissive.<\/p>\n<ol>\n<li>Friendship or sympathy, the concept behind this principle is that people tend to fulfill a wish of friends rather than strangers.<\/li>\n<li>Commitment or consequence means people are inclined to honor their commitments. In other words, if a person has already been helped once, we also help with new inquiries, because it is a matter of course.<\/li>\n<li>Scarcity depicts that rare or urgent requests are more likely to be met.<\/li>\n<li>Reciprocity states people help when they&#8217;ve been helped previously.<\/li>\n<li>Social validation means people assist someone when it is considered socially correct.<\/li>\n<li>Authority believes people tend to obey authority figures, even if their actions are offensive<a href=\"#ref6\">[6]<\/a>.<\/li>\n<\/ol>\n<p>The four psychological principles are used by social engineers to better read and specifically manipulate human emotions.<\/p>\n<ol>\n<li>Microexpressions state the interpretation of human emotions is essential.<\/li>\n<li>Instant rapport defines directives to build a harmonious relationship with the interlocutor. This includes advice such as a friendly body language or to give your conversation partner the feeling of being needed.<br \/>\nThe goal is to gradually build up a false friendship, so a constant flow of information is achieved.<\/li>\n<li>Interview &amp; interrogation focuses on the analysis of body language. Decisive factors are posture, skin tone, eye characteristics, voice, choice of words or even hands. Besides that, an intriguing observation is in stressful situations the sinus membrane in the face dries out. This causes people to touch their faces more frequently.<br \/>\nIn addition, based on the four common personality types such as active extrovert or introverted, an interview can be adjusted.<\/li>\n<li>The human buffer overflow means certain conditions are expected in the mind, just like in software. This allows implicit commands. With the help of other contexts as well as mental padding, implicit commands can be utilized more easily<a href=\"#ref5\">[5]<\/a>.<\/li>\n<\/ol>\n<p>There is a wide variety of techniques for social engineering attacks. To deal with all these techniques would exceed the scope of this paper. Therefore, the most common and most relevant are outlined next.<\/p>\n<ul>\n<li>Phreaking is one of the earliest techniques. Phone Phreaks understood the telephone network better than support employees and could make free phone calls with so-called blue boxes. The trick was to play a sound used for call forwarding.<\/li>\n<li>Phishing is the best known technique. This includes spamming, emails, social media etc.<\/li>\n<li>Spear Phishing is when few personalized emails are sent to specific destinations. A higher success rate of approx. 50% is achieved, of course with greater effort.<\/li>\n<li>Baiting corresponds to a real Trojan horse. The attacker leaves infected hardware in places, so the victim connects the hardware out of curiosity.<\/li>\n<li>At Dumpster Diving, the victim&#8217;s garbage is searched for information. This is especially relevant for IT companies.<\/li>\n<li>Water holing indicates that potential victims click more frequently on links they know. The attacker sends malware with fake websites that the victim frequently visits.<\/li>\n<li>Quid pro quo assumes that the attacker randomly dials phone numbers at one of the target organizations and pretends to be their support in order to resolve a problem.<\/li>\n<li>Piggybacking means the attacker gains access to a building without identification by simply following a person with identification. The person will open the door as a courtesy<a href=\"#ref5\">[5]<\/a><a href=\"#ref8\">[8]<\/a><a href=\"#ref7\">[7]<\/a>.<\/li>\n<\/ul>\n<h2>Models<\/h2>\n<p><a name=\"models\"><\/a><\/p>\n<p>This section outlines three different models for social engineering attacks. The first is the well-known Mitnick attack cycle. The second model is by Nohlberg and Kowalski. The third ontological model is provided by Mouton et. al.<\/p>\n<h3>Model 1: Mitnick attack cycle<\/h3>\n<p>Figure 3 illustrates the four steps that constitute the model.<\/p>\n<p><center><\/p>\n<p><a name=\"Mitnickattackcycle\"><\/a><\/p>\n<table>\n<thead>\n<tr>\n<th align=\"center\"><img decoding=\"async\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/MitnickAttackCycle.png\" alt=\"Figure 3: Mitnick attack cycle\"><\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td align=\"center\"><center> <em>Figure 3: Mitnick attack cycle<\/em><a href=\"#ref1\">[1]<\/a> <\/center><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><\/center><\/p>\n<p>In the first step information about the target is collected. Before the attack is executed, as much knowledge as possible about the target should be gathered.<\/p>\n<p>In the next phase, trust and a relationship is built up with the target.<br \/>\nThis is achieved, for instance through helpfulness or a change of identity to an authority figure.<\/p>\n<p>Next, trust is exploited either by asking for confidential information, demanding for a certain action, or the target seeking help from the attacker.<br \/>\nFinally, the outcome of the previous step is utilized to achieve the goal or to continue.<\/p>\n<p>The advantage of this model is its simplicity. However, the disadvantages are that the respective steps are not transparent and do not allow  recommendations for protective measures<a href=\"#ref1\">[1]<\/a><a href=\"#ref8\">[8]<\/a><a href=\"#ref2\">[2]<\/a>.<\/p>\n<h3>Model 2: Cycle of deception<\/h3>\n<p>This model consists of three cycles. The attack cycle, defense cycle and victim cycle.<\/p>\n<p>The attack cycle depicted in figure 4 starts with the <em>Goal &amp; Plan<\/em> phase.<\/p>\n<p><center><\/p>\n<p><a name=\"attackcycle\"><\/a><\/p>\n<table>\n<thead>\n<tr>\n<th align=\"center\"><img decoding=\"async\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/AttackCycle.png\" alt=\"Figure 4: Attack cycle\"><\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td align=\"center\"><center> <em>Figure 4: Attack cycle<\/em><a href=\"#ref2\">[2]<\/a> <\/center><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><\/center><\/p>\n<p>The attacker intends to serve a purpose. So criminal knowledge is beneficial. Classical characteristics are methods, motive, opportunity and means.<br \/>\n<em>Map &amp; Bond<\/em> is about gathering information through social engineering techniques. This could be Dumpster Diving, desktop hacking or making false friends.<br \/>\nThe <em>Execute<\/em> step represents illegal actions e.g. hacking, sending malware or asking for credentials.<br \/>\n<em>Recruit &amp; Cloak<\/em> tries to mask illegal activity.<br \/>\nFinally, a retrospective is presented at the <em>Evolve<\/em> step. It evaluates whether the process has developed correctly or not. Had the attack been stopped or should have been turned into a simpler attack.<\/p>\n<p>In the defense cycle displayed in figure 5, the first step is <em>Deter<\/em>.<\/p>\n<p><center><\/p>\n<p><a name=\"defensecycle\"><\/a><\/p>\n<table>\n<thead>\n<tr>\n<th align=\"center\"><img decoding=\"async\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/DefenseCycle.png\" alt=\"Figure 5: Defense cycle\"><\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td align=\"center\"><center> <em>Figure 5: Defense cycle<\/em><a href=\"#ref2\">[2]<\/a> <\/center><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><\/center><\/p>\n<p>It concerns the deterrence of attackers by a mature company public order or incident reports to the police.<br \/>\nNext comes <em>Protect<\/em>. This refers to the fact that little sensitive data should be made accessible to the outside world. Employees could be informed about the risks and methods of attackers.<br \/>\nIn the <em>Detect<\/em> step, the network traffic is monitored in order to search for sensitive data.<br \/>\n<em>Respond<\/em> is about reporting social engineering incidents without social or professional stigmata. In addition, by raising employee awareness, it is possible to react to ongoing attacks.<br \/>\nAfter all, you can recover from an attack in the <em>Recovery<\/em> step. As well as learn from this when knowing the value of your data, reporting attacks and creating well thought-out company policies.<\/p>\n<p>A common error in the analysis of attacks is an excessive focus on the attacker. Many incidents can be prevented more easily by focusing on the victim, hence the victim cycle shown in Figure 6.<\/p>\n<p><center><\/p>\n<p><a name=\"victimcycle\"><\/a><\/p>\n<table>\n<thead>\n<tr>\n<th align=\"center\"><img decoding=\"async\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/VictimCycle.png\" alt=\"Figure 6: Victim cycle\"><\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td align=\"center\"><center> <em>Figure 6: Victim cycle<\/em><a href=\"#ref2\">[2]<\/a> <\/center><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><\/center><\/p>\n<p>It begins with the <em>Advertise<\/em> phase. By having a certain value as an employee and making it known, attackers get attentive.<br \/>\nThis is followed by the <em>Socialize &amp; Expose<\/em> phase. The victim and attacker get to know each other. This forms the basis for deception.<br \/>\nIn the <em>Submit<\/em> step, the actual attack is executed. The victim complies with the attacker and reveals the confidential information.<br \/>\nAt this point, the victim can then either <em>accept or ignore<\/em> the procedure. Typically, the victim tells itself that the incident wasn&#8217;t harmful or ignores it deliberately.<br \/>\nEither the victim <em>evolves<\/em> from this and gets more skeptical, or it <em>regresses<\/em> and becomes an even more naive victim.<\/p>\n<p>All cycles have an additional level of control. This contrasts the attacker&#8217;s target with the route to it, which is also indicated in the illustrations of the cycles. The way the goal is achieved is by increasing the level of control. However, there is always a certain risk until then.<\/p>\n<p>The integration of all previous cycles yields the so-called cycle of deception depicted in figure 7.<\/p>\n<p><center><\/p>\n<p><a name=\"cycleofdeception\"><\/a><\/p>\n<table>\n<thead>\n<tr>\n<th align=\"center\"><img decoding=\"async\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/CycleOfDeception.png\" alt=\"Figure 7: Cycle of deception\"><\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td align=\"center\"><center> <em>Figure 7: Cycle of deception<\/em><a href=\"#ref2\">[2]<\/a> <\/center><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><\/center><\/p>\n<p>By merging the cycles, a number of observations can be made.<br \/>\nFor the attacker cycle, the first three steps ensure a unique success of the attack. The <em>Recruit &amp; Cloak<\/em> and <em>Evolve<\/em> steps must also be completed in order to perform future attacks.<br \/>\nIn the defense cycle, only one step must be sufficient to stop the attack.<br \/>\nTherefore, there are many factors for the failure of an attack, e.g. if no plan or method for the attack can be found, cloaking the attack is not possible, the attacker judges the attack itself to be unfeasible or no information on the potential victim can be obtained.<br \/>\nIn the victim cycle, each step must be passed through to perform a successful attack.<br \/>\nIf you want to prevent attacks, you need countermeasures for the first three steps<br \/>\nFor aftercare, countermeasures must be established for steps <em>Recruit &amp; Cloak<\/em> and <em>Evolve<\/em>.<\/p>\n<p>In addition, there are further elements of control, time or impact. The impact describes how obvious the attack is for the victim and the organization<br \/>\nThe goal of the attacker is to achieve a high level of control as fast as possible and with little impact. Additionally, several minor attacks can be performed to implement a step in the main attack cycle.<\/p>\n<p>If these factors are added, this leads to a spherical view illustrated in figure 8.<\/p>\n<p><center><\/p>\n<p><a name=\"sphericalview\"><\/a><\/p>\n<table>\n<thead>\n<tr>\n<th align=\"center\"><img decoding=\"async\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/SphereOfDeception.png\" alt=\"Figure 8: Spherical view\"><\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td align=\"center\"><center> <em>Figure 8: Spherical view<\/em><a href=\"#ref2\">[2]<\/a> <\/center><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><\/center><\/p>\n<p>Beneficial is that the model contains the attacker, the victim, and the defense components. It enables the development of protection strategies. It is modular, so the focus can be placed on individual steps. It is the basis for a potential AI bot suitable for training people. Thus penetration tests are possible.<br \/>\nHowever, a disadvantage is the high complexity<a href=\"#ref2\">[2]<\/a>.<\/p>\n<h3>Model 3: Ontological model<\/h3>\n<p>With this model, the attack is first classified. Figure 9 illustrates the attack classification tree.<\/p>\n<p><center><\/p>\n<p><a name=\"attackclassification\"><\/a><\/p>\n<table>\n<thead>\n<tr>\n<th align=\"center\"><img decoding=\"async\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/Classification.png\" alt=\"Figure 9: Attack classification\"><\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td align=\"center\"><center> <em>Figure 9: Attack classification<\/em><a href=\"#ref8\">[8]<\/a><\/center><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><\/center><\/p>\n<p>First, a social engineering attack is divided into <em>direct communication<\/em> and <em>indirect communication<\/em>.<br \/>\n<em>Direct communication<\/em> is further divided into <em>bidirectional communication<\/em> and <em>unidirectional communication<\/em>. Examples of <em>bidirectional communication<\/em> are conversations via emails or messengers. So two people are conversing. In <em>unidirectional communication<\/em> there are no answers. A classic illustration of this is phishing emails or phishing via social networks.<br \/>\nIn <em>indirect communication<\/em>, there is actually no interaction between the attacker and target. Communication happens via a third party medium, e.g. a compromised USB stick.<\/p>\n<p>Now a role structure of a social engineering attack is indicated in figure 10.<\/p>\n<p><center><\/p>\n<p><a name=\"ontologicalmodel\"><\/a><\/p>\n<table>\n<thead>\n<tr>\n<th align=\"center\"><img decoding=\"async\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/OntologicalModel.png\" alt=\"Figure 10: Ontological model\"><\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td align=\"center\"><center> <em>Figure 10: Ontological model<\/em><a href=\"#ref8\">[8]<\/a><a href=\"#ref3\">[3]<\/a> <\/center><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><\/center><\/p>\n<p>A <em>social engineer<\/em> is an individual or a group.<br \/>\nThe <em>target<\/em> is also an individual, a group, or company.<br \/>\nOne or more <em>compliance principles<\/em> are also included. These are the pretexts why the target fulfills the attackers request, which were mentioned in the section <a href=\"#principlestechniques\">Principles &amp; Techniques<\/a>.<br \/>\nPart of a social engineering attack is the communication <em>medium<\/em> such as email, face to face or telephone.<br \/>\nThe most important point is the <em>goal<\/em> of the attack. Possible goals can be financial gain, unauthorized access or service disruption.<\/p>\n<p>This role structure enables a process flow to be defined. It is implemented in this framework shown in figure 11. The figure refers to the aforementioned role structure and outlines the course of the attack.<\/p>\n<p><center><\/p>\n<p><a name=\"framework\"><\/a><\/p>\n<table>\n<thead>\n<tr>\n<th align=\"center\"><img decoding=\"async\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/AttackFramework.png\" alt=\"Figure 11: Framework\"><\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td align=\"center\"><center> <em>Figure 11: Framework<\/em><a href=\"#ref3\">[3]<\/a> <\/center><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><\/center><\/p>\n<ol>\n<li>In the step <em>Attack Formulation<\/em>, the goal of the attack and the best possible target is defined<\/li>\n<li><em>Information Gathering<\/em> means collecting information about the goal and the target.<\/li>\n<li><em>Preparation<\/em> implies that the information collected is processed to develop an attack vector.<\/li>\n<li><em>Develop a Relationship<\/em> is the initial building of communication through the information collected and the establishment of trust.<\/li>\n<li><em>Exploit the Relationship<\/em> involves first laying the foundation to elicit the information by analyzing the emotional states of the target. Then the attacker figures out how to manipulate them to execute the attack.<\/li>\n<li>In the <em>Debriefing<\/em> step, the target must be returned to a normal emotional state after the exploit.<\/li>\n<li>Finally, in the <em>Transition Phase<\/em>, there are two options. Either going back to the <em>Information Gathering<\/em> step, or if the goal is fulfilled, canceling the process.<\/li>\n<\/ol>\n<p>So, social engineering attacks involve certain recurring patterns. The three models introduced attempt to address them, with different approaches and varying degrees of detail. All three models have their advantages and disadvantages. The Mitnick attack cycle is simple, possibly so much, it is inaccurate for different scenarios. The cycle of deception may be ideal as basis for building an AI to train people to prevent attacks. On the other hand, it is too sophisticated for many other use cases such as a one-off employee training course. The ontological model is a promising intermediate step due to the separation into a role structure and a precisely defined procedure<a href=\"#ref8\">[8]<\/a><a href=\"#ref3\">[3]<\/a>.<\/p>\n<h2>Social media<\/h2>\n<p><a name=\"socialmedia\"><\/a><\/p>\n<p>In this section, the influence of social media on social engineering is analyzed based on the well-known 58th US presidential election in 2016. In addition, this incident is taken to examine the reliability of the promising ontological model.<br \/>\nNow a brief overview of the events during the election campaign.<\/p>\n<ol>\n<li>After Donald Trump won the primary, he was far behind Clinton. Therefore, the goal was formulated to beat Clinton.<\/li>\n<li>For scientific purposes, the company Global Science Research has gained access to the Facebook API. This gave them access to data from over 50 million users.<br \/>\nCambridge Analytica is a company which collects and analyses data on a large scale. Illegally, this data was submitted to Cambridge Analytica by Global Science Research. Next, Cambridge Analytica was involved in the campaign for Donald Trump due to this data.<\/li>\n<li>Subsequently, the data of potential target groups were analyzed in order to adjust the election campaign.<\/li>\n<li>During this canvassing process, volunteers were able to get the most in-depth information about potential voters by means of an app. Cambridge Analytica has also set up a large system of websites and blogs to provide voters with supposedly independent but tailored information.<\/li>\n<li>This manipulated the election and exploited the relationship to the voters.<br \/>\nThe statement &#8220;Make America great again&#8221; is thus a plea to the American voters to comply with Trump&#8217;s inquiry.<\/li>\n<li>The Pledge of Allegiance calmed most voters.<\/li>\n<li>Nevertheless, Trump has achieved his goal of becoming president<a href=\"#ref9\">[9]<\/a><a href=\"#ref10\">[10]<\/a><a href=\"#ref11\">[11]<\/a><a href=\"#ref12\">[12]<\/a>.<\/li>\n<\/ol>\n<p>Interestingly, in the meantime, Russian hacking of Clinton&#8217;s emails took place. It focused on Clinton&#8217;s partnership with Al-Qaida to assassinate Gaddafi as well as arming well-known Al-Qaida terrorists in Libya. In addition, this incident harmed Clinton&#8217;s reputation<a href=\"#ref13\">[13]<\/a><a href=\"#ref14\">[14]<\/a><a href=\"#ref15\">[15]<\/a>.<\/p>\n<p>If this incident is now projected onto our ontological model, the result is the role structure as illustrated in Figure 12.<\/p>\n<p><center><\/p>\n<p><a name=\"trumprolestructure\"><\/a><\/p>\n<table>\n<thead>\n<tr>\n<th align=\"center\"><img decoding=\"async\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/TrumpRoleStructure.png\" alt=\"Figure 12: Role structure applied on 58th US presidential election\"><\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td align=\"center\"><center> <em>Figure 12: Role structure applied on 58th US presidential election<\/em><\/center><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><\/center><\/p>\n<p>Obviously, Donald Trump was not the <em>social engineer<\/em> himself. Thanks to his campaign team and his son-in-law, his attention was drawn to the actual social engineering organization Cambridge Analytica.<br \/>\nThe <em>goal<\/em> to win against Clinton was achieved by influencing voters through the <em>media<\/em> canvassing, Facebook and other websites.<br \/>\nA special kind of spear phishing could be carried out during canvassing. With the help of an app provided by Cambridge Analytica, target groups could already be filtered out during home visits. Thus the <em>targets<\/em> could be made compliant mainly by means of the <em>Compliance Principles<\/em> sympathy and friendship.<\/p>\n<p>The procedure outlined above is projected onto the framework of the ontological model in figure 13.<\/p>\n<p><center><\/p>\n<p><a name=\"trumpframework\"><\/a><\/p>\n<table>\n<thead>\n<tr>\n<th align=\"center\"><img decoding=\"async\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/TrumpOntologicalModelFramework.png\" alt=\"Figure 13: Framework applied on 58th US presidential election\"><\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td align=\"center\"><center> <em>Figure 13: Framework applied on 58th US presidential election<\/em><\/center><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><\/center><\/p>\n<p>It is evident at this point the previously described procedure can be assigned reliably and meaningfully to the model step by step.<\/p>\n<p>This incident indisputably demonstrates an enormous amount of information about its users in social networks. Since social engineers initially seek to obtain as much information as possible about their victims, social networks are a convenient starting point.<br \/>\nTherefore, social networks may pose a serious threat to companies and individuals in terms of social engineering attacks.<\/p>\n<h2>Conclusion<\/h2>\n<p><a name=\"conclusion\"><\/a><\/p>\n<p>To conclude, a brief examination is given of opportunities to prevent social engineering attacks for both companies and individuals. Thereupon it is discussed whether and how to recover from a social engineering attack.<\/p>\n<p>Concerning precautions for social engineering attacks, a company may establish various aspects. In the company it is important to create a basis of trust among employees, otherwise mistrust may arise. Social engineers might exploit this. In addition, security protocols and policies can be applied. Rules such as verifying identities before information is revealed may be included. Disabling macros in Microsoft products can also be beneficial, as many Trojans and other malware are installed in this manner. Blocking USB device connections also prevents malware from entering corporate networks. Also, proper waste management can help prevent Dumpster Diving attacks.<br \/>\nAn additional important factor is the continuous training of employees and the realization of penetration tests. In this way, awareness of social engineering attacks is constantly maintained. Employees therefore understand how to cope with such a situation. This allows a social engineering attack to be detected and stopped in no time.<\/p>\n<p>Private persons are encouraged to do the similar, but the mindset &#8220;Security first&#8221; is particularly important here. Especially in social networks, the information disclosed needs to be questioned more frequently. Google yourself to determine what information is available. If so, it is worth asking yourself whether this information is supposed to be visible. By focusing more on privacy settings, the information available by default is revealed. Thereupon it is possible to adapt them according to your own expectations.<\/p>\n<p>Now, it is clear to see as individuals as well as companies we can take many different countermeasures to prevent social engineering attacks. But at what cost and how to recover if such an attack has already occurred at a company?<\/p>\n<p>First, there is no silver bullet applicable for everyone. So, when an attack has already taken place, several points should be identified. These questions are worth raising.<\/p>\n<ul>\n<li>What are the most relevant goals of the organization or of me?<\/li>\n<li>Is there a favored target group that was preferably attacked? If so, why?<\/li>\n<li>Which communication media are used? Which ones have been exploited? How can this be avoided?<\/li>\n<li>What are objects worth protecting which are particularly important? How can they be protected?<\/li>\n<\/ul>\n<p>After these questions have been analyzed and answered precisely in the form of a retrospective of the social engineering attack, further precautions can be taken. Possibly internal company misunderstandings are clarified, new security protocols are established and the trust of the employees is slowly rebuilt. It is particularly important that all groups of employees participate, since the company is only as strong as the weakest employee. In the best scenario, the specific attack will help to identify further possible attacks. Thus, not only the current attack is overcome, but also future attacks of a different kind can be prevented. However, the process of recovering from a social engineering attack is very difficult and fragile. Sensitive issues such as the question of guilt lie in human nature, but only inhibit recovery.<\/p>\n<p>As a final statement, it is summarized as particularly difficult to find a balance between precaution against social engineering and performance. If too many precautions are taken against social engineering attacks, employees may no longer trust each other. Otherwise, the risk of social engineering attacks is too serious. Nevertheless, relatively significant progress can be achieved with awareness alone. However, this awareness must be constantly renewed, otherwise the effect will cease.<\/p>\n<h2>References<\/h2>\n<p><a name=\"ref1\"><\/a><br \/>\n1. The Art of Deception: Controlling the Human Element of Security, Kevin D. Mitnick, William L. Simon, Steve Wozniak (Foreword by), 2002<br \/>\n<a name=\"ref2\"><\/a><br \/>\n2. The Cycle of Deception &#8211; A Model of Social Engineering<br \/>\nAttacks, Defences and Victims, M. Nohlberg and S. Kowalski, 2008<br \/>\n<a name=\"ref3\"><\/a><br \/>\n3. Social Engineering Attack Framework, Francois Mouton, Mercia M. Malan, Louise Leenen and H.S. Venter, 2014<br \/>\n<a name=\"ref4\"><\/a><br \/>\n4. Hacking the Human: Social Engineering Techniques and Security<br \/>\nCountermeasures, Ian Mann, 2008<br \/>\n<a name=\"ref5\"><\/a><br \/>\n5. The Official Social Engineering Portal, <a href=\"https:\/\/www.social-engineer.org\/\">https:\/\/www.social-engineer.org\/<\/a>, (latest access 15.08.2018)<br \/>\n<a name=\"ref6\"><\/a><br \/>\n6. Influence: Science and Practice, Robert B. Cialdini, 2001 <a href=\"https:\/\/faculty.iiit.ac.in\/~bipin\/files\/Dawkins\/July\/Robert%20Cialdini%20-%20Influence%252C%20Science%20and%20Practice.pdf\">https:\/\/faculty.iiit.ac.in\/~bipin\/files\/Dawkins\/July\/Robert%20Cialdini%20-%20Influence%252C%20Science%20and%20Practice.pdf<\/a>, (latest access 15.08.2018)<br \/>\n<a name=\"ref7\"><\/a><br \/>\n7. Social Engineering (security)<br \/>\n<a href=\"https:\/\/en.wikipedia.org\/wiki\/Social_engineering_(security)\">https:\/\/en.wikipedia.org\/wiki\/Social_engineering_(security)<\/a>, (latest access 15.08.2018)<br \/>\n<a name=\"ref8\"><\/a><br \/>\n8. Towards an Ontological Model Defining the Social Engineering Domain, Francois Mouton, Louise Leenen, Mercia Malan, H. Venter, <a href=\"https:\/\/hal.inria.fr\/hal-01383064\/document\">https:\/\/hal.inria.fr\/hal-01383064\/document<\/a>, (latest access 15.08.2018)<br \/>\n<a name=\"ref9\"><\/a><br \/>\n9. Faq: Was Wir \u00dcber Den Skandal Um Facebook Und Cambridge Analytica Wissen [update]<br \/>\nIngo Dachwitz &#8211; <a href=\"https:\/\/netzpolitik.org\/2018\/cambridge-analytica-was-wir-ueber-das-groesste-datenleck-in-der-geschichte-von-facebook-wissen\/\">https:\/\/netzpolitik.org\/2018\/cambridge-analytica-was-wir-ueber-das-groesste-datenleck-in-der-geschichte-von-facebook-wissen\/<\/a>, (latest access 15.08.2018)<br \/>\n<a name=\"ref10\"><\/a><br \/>\n10. Social Engineering To the Extreme: the Cambridge Analytica Case<br \/>\nAdministrator &#8211; <a href=\"https:\/\/www.dogana-project.eu\/index.php\/social-engineering-blog\/11-social-engineering\/92-cambridge-analytica\">https:\/\/www.dogana-project.eu\/index.php\/social-engineering-blog\/11-social-engineering\/92-cambridge-analytica<\/a>, (latest access 15.08.2018)<br \/>\n<a name=\"ref11\"><\/a><br \/>\n11. Cambridge Analytica: \u201eunsere Daten Haben Trumps Strategie Bestimmt&#8221; &#8211; Welt<br \/>\n<a href=\"https:\/\/www.welt.de\/politik\/ausland\/article174785094\/Cambridge-Analytica-Unsere-Daten-haben-Trumps-Strategie-bestimmt.html\">https:\/\/www.welt.de\/politik\/ausland\/article174785094\/Cambridge-Analytica-Unsere-Daten-haben-Trumps-Strategie-bestimmt.html<\/a>, (latest access 15.08.2018)<br \/>\n<a name=\"ref12\"><\/a><br \/>\n12. Cambridge Analytica Execs Boast Of Role in Getting Donald Trump Elected<br \/>\nEmma Graham-Harrison-Carole Cadwalladr &#8211; <a href=\"https:\/\/www.theguardian.com\/uk-news\/2018\/mar\/20\/cambridge-analytica-execs-boast-of-role-in-getting-trump-elected\">https:\/\/www.theguardian.com\/uk-news\/2018\/mar\/20\/cambridge-analytica-execs-boast-of-role-in-getting-trump-elected<\/a>, (latest access 15.08.2018)<br \/>\n<a name=\"ref13\"><\/a><br \/>\n13. Russia Hackers Discussed Getting Clinton Emails To Michael Flynn \u2013 Report<br \/>\nJulian Borger &#8211; <a href=\"https:\/\/www.theguardian.com\/us-news\/2017\/jun\/30\/russia-hackers-clinton-emails-mike-flynn\">https:\/\/www.theguardian.com\/us-news\/2017\/jun\/30\/russia-hackers-clinton-emails-mike-flynn<\/a>, (latest access 15.08.2018)<br \/>\n<a name=\"ref14\"><\/a><br \/>\n14. Hillary-clinton-mails &#8211; Die Dunklen Machenschaften Der H. Clinton<br \/>\n<a href=\"https:\/\/www.freitag.de\/autoren\/gela\/die-dunklen-machenschaften-der-h-clinton\">https:\/\/www.freitag.de\/autoren\/gela\/die-dunklen-machenschaften-der-h-clinton<\/a>, (latest access 15.08.2018)<br \/>\n<a name=\"ref15\"><\/a><br \/>\n15. Hillary Clinton Supplied Cash, Weapons, Tanks, Training To Al-qaeda To Kill Gaddafi &amp; Weaponize &#8220;isis&#8221; in Syria \u2013 True Pundit<br \/>\n<a href=\"https:\/\/truepundit.com\/hillary-clinton-supplied-cash-weapons-tanks-training-to-al-qaeda-to-kill-gaddafi-weaponize-isis-in-syria\/\">https:\/\/truepundit.com\/hillary-clinton-supplied-cash-weapons-tanks-training-to-al-qaeda-to-kill-gaddafi-weaponize-isis-in-syria\/<\/a>, (latest access 15.08.2018)<br \/>\n<a name=\"ref16\"><\/a><br \/>\n16. Survey results, <a href=\"https:\/\/de.statista.com\/statistik\/daten\/studie\/499324\/umfrage\/vorfaelle-von-cybercrime-in-unternehmen-weltweit\/\">https:\/\/de.statista.com\/statistik\/daten\/studie\/499324\/umfrage\/vorfaelle-von-cybercrime-in-unternehmen-weltweit\/<\/a>, (latest access 15.08.2018)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Abstract Nowadays, our secure systems are already sophisticated and perform well. In addition, research on subjects such as quantum computers ensures continuous improvement. However, even with a completely secure system, we humans pose the most significant threat. Social engineers prey on this to conduct illegal activities. For early detection and prevention, this paper deals with [&hellip;]<\/p>\n","protected":false},"author":874,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[26,651],"tags":[200,199,198,201],"ppma_author":[756],"class_list":["post-3867","post","type-post","status-publish","format-standard","hentry","category-secure-systems","category-system-designs","tag-cambridge-analytica","tag-hacking","tag-social-engineering","tag-social-media"],"aioseo_notices":[],"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":8720,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2019\/09\/03\/social-engineering-learn-from-the-best\/","url_meta":{"origin":3867,"position":0},"title":"Social Engineering \u2013 Learn From the Best!","author":"Gisela Kollotzek","date":"3. September 2019","format":false,"excerpt":"It isn\u2019t always necessary to attack by technical means to collect information or to penetrate a system. In many cases, it\u2019s more effective to exploit the human risk factor. To successfully protect yourself and your company from social engineering, you\u2019ve to understand how a social engineer works. And the best\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/09\/kevin-mitnick-today.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/09\/kevin-mitnick-today.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/09\/kevin-mitnick-today.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/09\/kevin-mitnick-today.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":2442,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2017\/07\/28\/social-engineering-firewall-rules-for-your-brain-part-1\/","url_meta":{"origin":3867,"position":1},"title":"Social Engineering: Firewall-Rules for your brain \u2013 Part 1","author":"Simon Schuster","date":"28. July 2017","format":false,"excerpt":"Humans can be regarded as one of the biggest weaknesses for secure systems. Their interaction with technology and awareness for information security makes them usually the \u201cweak link\u201d for gaining access to enterprise networks and private information. From an attackers point of view the investment of using a human to\u2026","rel":"","context":"In &quot;Secure Systems&quot;","block_context":{"text":"Secure Systems","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/system-designs\/secure-systems\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/07\/01_Communication_Model_Barnlund-300x153.jpeg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/07\/01_Communication_Model_Barnlund-300x153.jpeg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/07\/01_Communication_Model_Barnlund-300x153.jpeg?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":3232,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2017\/10\/06\/usable-security-users-are-not-your-enemy\/","url_meta":{"origin":3867,"position":2},"title":"Usable Security &#8211; Users are not your enemy","author":"mw195","date":"6. October 2017","format":false,"excerpt":"Introduction Often overlooked, usability turned out to be one of the most important aspects of security. Usable systems enable users to accomplish their goals with increased productivity, less errors and security incidents. And It stills seems to be the exception rather than the rule. When it comes to software, many\u2026","rel":"","context":"In &quot;Secure Systems&quot;","block_context":{"text":"Secure Systems","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/system-designs\/secure-systems\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/10\/windows-uac.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":5120,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2019\/02\/09\/observability-where-do-we-go-from-here\/","url_meta":{"origin":3867,"position":3},"title":"Observability?! \u2013 Where do we go from here?","author":"Alexander Wallrabenstein","date":"9. February 2019","format":false,"excerpt":"The last two years in software development and operations have been characterized by the emerging idea of \u201cobservability\u201d. The need for a novel concept guiding the efforts to control our systems arose from the accelerating paradigm changes driven by the need to scale and cloud native technologies. In contrast, the\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"MEME: I always, always test my code. The I test it again in production.","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/02\/meme-1.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/02\/meme-1.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/02\/meme-1.jpg?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":20593,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2021\/09\/25\/herzlichen-gluckwunsch-sie-haben-gewonnen\/","url_meta":{"origin":3867,"position":4},"title":"HERZLICHEN GL\u00dcCKWUNSCH &#8211; Sie haben gewonnen!","author":"Eric Prytulla","date":"25. September 2021","format":false,"excerpt":"\u00dcber Social Engineering und wie man sich sch\u00fctzen kann. Jeder kennt E-Mails mit Titeln wie diesem. Eine wildfremde Person verspricht Gewinne in Millionenh\u00f6he. Und alles, was daf\u00fcr ben\u00f6tigt wird, sind ein paar pers\u00f6nliche Daten. Ein Traum vieler Menschen wird wahr und man will dem Titel glauben. Doch was passiert, wenn\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/09\/Spam.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":1701,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2016\/11\/14\/malvertising-part-2\/","url_meta":{"origin":3867,"position":5},"title":"Malvertising Part 2","author":"Jonathan Peter","date":"14. November 2016","format":false,"excerpt":"Welcome to the second part of my series about malvertising. In this second post, we\u2019ll get to the important stuff: What is malvertising and how often do these attacks happen? As previously mentioned, the word malvertising is composed of advertising and malware. It\u2019s an attack form in which a victim\u2026","rel":"","context":"In &quot;Secure Systems&quot;","block_context":{"text":"Secure Systems","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/system-designs\/secure-systems\/"},"img":{"alt_text":"bildschirmfoto-2016-10-03-um-20-53-58","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/10\/Bildschirmfoto-2016-10-03-um-20.53.58.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/10\/Bildschirmfoto-2016-10-03-um-20.53.58.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/10\/Bildschirmfoto-2016-10-03-um-20.53.58.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/10\/Bildschirmfoto-2016-10-03-um-20.53.58.png?resize=700%2C400&ssl=1 2x"},"classes":[]}],"jetpack_sharing_enabled":true,"authors":[{"term_id":756,"user_id":874,"is_guest":0,"slug":"bk095","display_name":"Benjamin Kowatsch","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/c116ef233d434d6a1429a9859521721a6b19e51194e6256f04d9431cfe4a8bd2?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/3867","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/users\/874"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/comments?post=3867"}],"version-history":[{"count":37,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/3867\/revisions"}],"predecessor-version":[{"id":24769,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/3867\/revisions\/24769"}],"wp:attachment":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/media?parent=3867"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/categories?post=3867"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/tags?post=3867"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/ppma_author?post=3867"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}