IGF 2019 WS #423 SOCIAL ENGINEERING: Most Recurrent but Neglected Cybercrime

Organizer 1: Civil Society, African Group
Organizer 2: Technical Community, African Group
Organizer 3: Civil Society, African Group

Speaker 1: Samuel Osei Mensah, Civil Society, African Group
Speaker 2: Lily Edinam Botsyoe, Technical Community, African Group
Speaker 3: Gabriel Karsan, Civil Society, African Group

Policy Question(s): 

What is Social Engineering?
How it is impacting the digital society?
What are Social engineering attack techniques?
Best Social engineering prevention methods

Relevance to Theme: Understand the concept of social engineering
Learn what makes social engineering especially dangerous
Learn about social engineering attack techniques
Understand social engineering prevention

Relevance to Internet Governance: Today, the Internet is the most powerful tool in the world and has undoubtedly become an important element in our life. Individuals, organizations and governments are relying on the internet for a lot of activities including sharing sensitive information. However, like every single innovation in science and technology, the internet has its own advantages and disadvantages.
Social engineering attacks happen in one or more steps. A perpetrator first investigates the intended victim to gather necessary background information, such as potential points of entry and weak security protocols, needed to proceed with the attack. The session is part of safeguarding the Internet against the manipulation of human feelings, such as curiosity or fear, to carry out schemes and draw victims into their traps.

Format: 

Round Table - Circle - 60 Min

Description: The risk of disclosure of sensitive information constitute the major disadvantages of using the Internet and as it is continuing to evolve, organizations and governments have a vested interest in securing sensitive information stored or shared over the internet. Theis session is to address and draw attention to the protection of sensitive information and the development of countermeasures against illegal access to information are of vital importance to organizations and governments to ensure the trust of clients and citizens. The session will discuss all issues around Social Engineering and it will take a round table discussion.

Expected Outcomes: Organizations and governments have been spending hundreds of thousands of dollars investing in firewalls, intrusion detection systems, encryption systems and other security technologies to prevent cyber criminals from having access to their sensitive information. The session will highlight on latest trends and new preventive ways of using the web.

Discussion Facilitation: 

There will be open questions to keep participation going while organizers will engage other experts to talk on topic for better dialogue.

Online Participation: 

Through social media awareness of the topic prior and during the session organizers plan to include all person available/joined online slots to contribute their questions, suggestions and experience on the topic.

Proposed Additional Tools: Organizers plan to utilize the emerging growth of Youth from Africa interested in keeping the internet healthy. These youth are mostly on major social media platforms: facebook, Twitter and Instagram. In the form of Twitter Chat and updates, we hope to engage more to increase participation.

SDGs: 

GOAL 4: Quality Education
GOAL 5: Gender Equality
GOAL 8: Decent Work and Economic Growth
GOAL 9: Industry, Innovation and Infrastructure
GOAL 10: Reduced Inequalities