Logo wars, the fight for attention and resources

BURGISTEIN, Switzerland, September 1st 2016 – Dominique C. Brack, known as D#fu5e and VP of operations at social engineering engagement framework (SEEF), will release the first known social engineering icons, today.

The SEEF social engineering Icons are a powerful visual tool, allowing users to identify a message, without having to think. People recognize icons faster than words. Visual perception is one of the most productive ways through which people can obtain information and process it.

The SEEF social engineering icons can be used in many ways:

• Risk assessments and documentation
• Vulnerability reporting
• Attack vector development
• Information security briefings
• Information security awareness trainings

The benefits of using SEEF social engineering icons:

• People are visually-driven creatures;
• Icons have a tendency to stick better;
• Improving general comprehension;
• Conveying a memorable message from c-level to technical experts.

Until today, social engineering had no icons to describe social engineering attack vectors in a detailed and appealing way. The extensive collection of social engineering icons includes icons for: well-known attack vectors, like phishing, dumpster diving, tailgating, or eavesdropping, and for less known attack vectors like: befriending, reciprocation, shoulder surfing, or impersonation. In total, there about 38 icons.

The initiative for developing these icons came from the author, who often speaks at security conferences, has authored a book about social engineering, and works as a senior security consultant for the top international companies and governmental organizations. He quotes:

“Social engineering is a very complex and abstract topic to grasp. It is not so obvious like technical vulnerabilities in a system; it is about the vulnerabilities of the human mind. I needed a visually-driven way to convey this message. For other vulnerabilities, there are logos available, communicating in a memorable and appealing way the risk associated with such a vulnerability”.

But for social engineering, as one of the top advanced persistent threats, there were none. So I had to develop the icons myself. So far, the use of the icons was a full success. For my clients and briefings, I can now use a set comprehensive icons, communicating in a powerful way the risks of social engineering attack vectors.”

As the author was quoted at one of his security conference speeches: “Using the social engineering icons will give you 10% more budget, and you will get the hero bonus too.”
They are now available for download. As a free version for using based on the respective license agreement and a paid version which includes vector files.

Related Links: