BURGISTEIN, Switzerland, August 24th 2016 – Dominique C. Brack as known as D#fu5e and VP of operations at social engineering engagement framework (SEEF) will release today the first known social engineering icons.
The SEEF social engineering Icons are a powerful visual tool allowing users to identify a message without having to think. People recognize icons faster than words. Visual perception is one of the most productive ways through which people are able to obtain information and get it processed by the brain.
The SEEF social engineering icons can be used in many different ways:
- Risk assessments and documentation
- Vulnerability reporting
- Attack vector development
- Information security briefings
- Information security awareness trainings
The benefits of using SEEF social engineering icons:
- People are visually-driven creatures
- Icons have a tendency to stick better
- Improving general comprehension
- Conveying a memorable message from c-level to technical experts
Until today social engineering had no icons to describe social engineering attack vectors in a detailed and appealing way. The extensive collection of social engineering icons include icons for: well-known attack vectors like phishing, dumpster diving, tailgating or eavesdropping and also for less known attack vectors like: befriending, reciprocation, shoulder surfing or impersonation. In total there about 33 icons.
The initiative for developing these icons came from the author itself who often speaks at security conferences, has authored a book about social engineering and works as a senior security consultant for the top international companies and governmental organizations. He quotes: “Social engineering is a very complex and abstract topic to grasp. It is not so obvious like technical vulnerabilities in a system it is about the vulnerabilities of the human mind. I needed a visually-driven way to convey this message. For other vulnerabilities there are logos available communicating in a memorable and appealing way the risk associated with such a vulnerability. But for social engineering as one of the top advanced persistent threats there where none. So I had to develop the icons myself. So far the use of the icons where a full success. For my clients and briefings I can now use a set comprehensive icons communicating in a powerful way the risks of social engineering attack vectors”.
As the author was quoted at one of his security conference speeches: “Using the social engineering icons will give you 10% more budget and you will get the hero bonus too”
They are now available for download.
Selz – link follows