Knowledge

Social engineering (security)

Source đź“ť

29: 357:, reported that the HP board hired a private investigation company to delve into who was responsible for leaks within the board. Dunn acknowledged that the company used the practice of pretexting to solicit the telephone records of board members and journalists. Chairman Dunn later apologized for this act and offered to step down from the board if it was desired by board members. Unlike Federal law, California law specifically forbids such pretexting. The four felony charges brought on Dunn were dismissed. 370: 1904: 287:, many other types of private records are being bought and sold in the public market. Alongside many advertisements for cell phone records, wireline records and the records associated with calling cards are advertised. As individuals shift to VoIP telephones, it is safe to assume that those records will be offered for sale as well. Currently, it is legal to sell telephone records, but illegal to obtain them. 275:
states, in part: "Whenever the Commission shall have reason to believe that any such person, partnership, or corporation has been or is using any unfair method of competition or unfair or deceptive act or practice in or affecting commerce, and if it shall appear to the Commission that a proceeding by
213:
One study published in 2016 had researchers drop 297 USB drives around the campus of the University of Illinois. The drives contained files on them that linked to webpages owned by the researchers. The researchers were able to see how many of the drives had files on them opened, but not how many were
90:
One example of social engineering is an individual who walks into a building and posts an official-looking announcement to the company bulletin that says the number for the help desk has changed. So, when employees call for help the individual asks them for their passwords and IDs thereby gaining the
533:
is an American social engineer and information technology security consultant. He is best known as an author of 4 books on social engineering and cyber security and founder of Innocent Lives Foundation, an organization that helps tracking and identifying child trafficking by seeking the assistance
314:
became the first state to sue an online records broker when Attorney General Lisa Madigan sued 1st Source Information Specialists, Inc. A spokeswoman for Madigan's office said. The Florida-based company operates several Web sites that sell mobile telephone records, according to a copy of the suit.
279:
The statute states that when someone obtains any personal, non-public information from a financial institution or the consumer, their action is subject to the statute. It relates to the consumer's relationship with the financial institution. For example, a pretexter using false pretenses either to
154:
they regularly visit. The victim feels safe to do things they would not do in a different situation. A wary person might, for example, purposefully avoid clicking a link in an unsolicited email, but the same person would not hesitate to follow a link on a website they often visit. So, the attacker
59:
for the purpose of information gathering, fraud, or system access, it differs from a traditional "con" in the sense that it is often one of the many steps in a more complex fraud scheme. It has also been defined as "any act that influences a person to take an action that may or may not be in their
417:
numbers, birthdates, etc.), warnings were sent out regarding the dangers of impending security risks. In the day after the establishment of a legitimate help website (equifaxsecurity2017.com) dedicated to people potentially victimized by the breach, 194 malicious domains were reserved from small
266:
law that specifically addresses pretexting of banking records as an illegal act punishable under federal statutes. When a business entity such as a private investigator, SIU insurance investigator, or an adjuster conducts any type of deception, it falls under the authority of the
490:. He became well known for live demonstrations as well as playing recorded calls after talks where he explained his thought process on what he was doing to get passwords through the phone. As a child, Ridpath was connected with Badir Brothers and was widely known within the 1716: 63:
Research done in 2020 has indicated that social engineering will be one of the most prominent challenges of the upcoming decade. Having proficiency in social engineering will be increasingly important for organizations and countries, due to the impact on
303:, Michigan), chairman of the Energy and Commerce Subcommittee on Telecommunications and the Internet, expressed concern over the easy access to personal mobile phone records on the Internet during a House Energy & Commerce Committee hearing on " 280:
get a consumer's address from the consumer's bank, or to get a consumer to disclose the name of their bank, would be covered. The determining principle is that pretexting only occurs when information is obtained through false pretenses.
322:
Several wireless providers, including T-Mobile, Verizon, and Cingular filed earlier lawsuits against records brokers, with Cingular winning an injunction against First Data Solutions and 1st Source Information Specialists. U.S. Senator
442:, had entered their passwords thinking it would be reset, causing their personal information, and thousands of private emails and documents to be leaked. With this information, they hacked into other computers in the 210:, among other media. Curious people take it and plug it into a computer, infecting the host and any attached networks. Again, hackers may give them enticing labels, such as "Employee Salaries" or "Confidential". 271:(FTC). This federal agency has the obligation and authority to ensure that consumers are not subjected to any unfair or deceptive business practices. US Federal Trade Commission Act, Section 5 of the 95:
and starts a conversation with the target. Gradually the hacker gains the trust of the target and then uses that trust to get access to sensitive information like password or bank account details.
1385: 1695:
N.J. Evans. (2009). "Information Technology Social Engineering: An Academic Definition and Study of Social Engineering-Analyzing the Human Firewall." Graduate Theses and Dissertations. 10709.
1059: 319:
quickly followed Madigan's lead, filing suits respectively, against 1st Source Information Specialists and, in Missouri's case, one other records broker â€“ First Data Solutions, Inc.
124:) to engage a targeted victim in a manner that increases the chance the victim will divulge information or perform actions that would be unlikely in ordinary circumstances. An elaborate 276:
it in respect thereof would be to the interest of the public, it shall issue and serve upon such person, partnership, or corporation a complaint stating its charges in that respect."
1037: 1509: 190:
Unless computer controls block infections, insertion compromises PCs "auto-running" media. Hostile devices can also be used. For instance, a "lucky winner" is sent a free
1125:"Office of Public Affairs | Grand Jury Indicts 12 Russian Intelligence Officers for Hacking Offenses Related to the 2016 Election | United States Department of Justice" 1456: 1639: 283:
While the sale of cell telephone records has gained significant media attention, and telecommunications records are the focus of the two bills currently before the
71:
Social engineering attacks have been increasing in intensity and number, cementing the need for novel detection techniques and cyber security educational programs.
187:
in locations people will find them (bathrooms, elevators, sidewalks, parking lots, etc.), give them legitimate and curiosity-piquing labels, and wait for victims.
474:, but later framed them for erasing the system files at US Leasing after a falling out, leading to Mitnick's first conviction. She retired to professional poker. 214:
inserted into a computer without having a file opened. Of the 297 drives that were dropped, 290 (98%) of them were picked up and 135 (45%) of them "called home".
155:
prepares a trap for the unwary prey at a favored watering hole. This strategy has been successfully used to gain access to some (supposedly) very secure systems.
1124: 68:
as well. Social engineering raises the question of whether our decisions will be accurately informed if our primary information is engineered and biased.
1727: 831: 327:(D-New York) introduced legislation in February 2006 aimed at curbing the practice. The Consumer Telephone Records Protection Act of 2006 would create 1546: 1482: 1063: 1798: 1770: 91:
ability to access the company's private information. Another example of social engineering would be that the hacker contacts the target on a
514:
Brothers Ramy, Muzher, and Shadde Badir—all of whom were blind from birth—managed to set up an extensive phone and computer fraud scheme in
996: 443: 1212:
Proceedings of the 4th Workshop on Ict Uses in Warfare and the Safeguarding of Peace 2012 (Iwsp 2012) and Journal of Information Warfare
889: 857: 748: 2342: 810:"Chinese Espionage Campaign Compromises Forbes.com to Target US Defense, Financial Services Companies in Watering Hole Style Attack" 246:
with fines of up to $ 250,000 and ten years in prison for individuals (or fines of up to $ 500,000 for companies). It was signed by
609:"Cybersecurity, social engineering, artificial intelligence, technological addictions: Societal challenges for the coming decade" 263: 2376: 22: 534:
of information security specialists, using data from open-source intelligence (OSINT) and collaborating with law enforcement.
2319: 1760: 1746: 1630: 1095: 565: 1701:
Z. Wang, L. Sun and H. Zhu. (2020) "Defining Social Engineering in Cybersecurity," in IEEE Access, vol. 8, pp. 85094-85115,
582: 2350: 980:
Mitnick, K (2002): "The Art of Deception", p. 103 Wiley Publishing Ltd: Indianapolis, Indiana; United States of America.
1015: 1791: 912: 2282: 1690: 1676: 1668: 1622: 1577: 1336: 1255: 1183: 985: 381: 2078: 705:
Hatfield, Joseph M (June 2019). "Virtuous human hacking: The ethics of social engineering in penetration-testing".
809: 2332: 1602: 1077: 1784: 929: 1731: 835: 427: 339: 272: 2337: 2258: 2058: 1256:"BsidesPDX Track 1 10/07/11 02:52PM, BsidesPDX Track 1 10/07/11 02:52PM BsidesPDX on USTREAM. Conference" 519: 128:, it most often involves some prior research or setup and the use of this information for impersonation ( 2314: 2272: 1928: 503: 495: 48: 608: 2175: 1893: 1533: 1584: 1417: 2160: 2038: 1933: 1303: 797: 431: 406: 268: 150:
Water holing is a targeted social engineering strategy that capitalizes on the trust users have in
84: 1151: 1038:"Credit reporting firm Equifax says data breach could potentially affect 143 million US consumers" 16:
Psychological manipulation of people into performing actions or divulging confidential information
2248: 2200: 1863: 1702: 446:, implanting malware in them, which caused their computer activities to be monitored and leaked. 410: 1431: 963: 438:'s campaign, disguised as a Google alert. Many members, including the chairman of the campaign, 530: 259: 239: 133: 92: 28: 1593: 793: 2289: 2023: 1404: 206:
with malicious software left in opportunistic or conspicuous places. It may be a CD, DVD, or
1359: 864: 772: 2309: 2221: 2170: 2115: 1983: 1956: 1938: 1836: 1807: 740: 284: 191: 145: 40: 1903: 968:
109th Congress (2005–2006) H.R.4709 – Telephone Records and Privacy Protection Act of 2006
8: 2381: 2093: 1868: 1826: 903:
Conklin, Wm. Arthur; White, Greg; Cothren, Chuck; Davis, Roger; Williams, Dwayne (2015).
300: 486:. He is well known for developing techniques and tactics for social engineering through 482:
Mike Ridpath is a security consultant, published author, speaker and previous member of
2386: 2277: 2205: 2110: 1756: 722: 636: 168: 242:
approved a Senate sponsored bill making the pretexting of telephone records a federal
2325: 2083: 2018: 1968: 1915: 1873: 1821: 1686: 1672: 1664: 1626: 1618: 1573: 1332: 1179: 981: 908: 883: 640: 628: 561: 167:
that uses physical media and relies on the curiosity or greed of the victim. In this
726: 2294: 2234: 1998: 1988: 1883: 714: 620: 551: 350: 56: 1457:"Bens Book of the Month Review of Social Engineering The Science of Human Hacking" 2185: 2165: 2063: 1888: 1878: 1572:
Boyington, Gregory. (1990). 'Baa Baa Black Sheep' Published by Gregory Boyington
1328: 1173: 660:
School of Electrical Engineering and Computer Science, University of North Dakota
555: 435: 414: 354: 324: 207: 203: 184: 80: 52: 2355: 2253: 2103: 2053: 2028: 1993: 1973: 1853: 1841: 718: 247: 1510:"Phishing Dark Waters: The Offensive and Defensive Sides of Malicious E-mails" 1281: 1233: 624: 2370: 2265: 2226: 2195: 2190: 2043: 2033: 2003: 1656: 1652: 1635: 1615:
Hacking the Human: Social Engineering Techniques and Security Countermeasures
632: 467: 459: 21:
For the influencing of attitudes and social behaviors on a large scale, see
2299: 2155: 1858: 1607: 687: 487: 439: 418:
variations on the URL, capitalizing on the likelihood of people mistyping.
331: 164: 1259: 676:
Jaco, K: "CSEPS Course Workbook" (2004), unit 3, Jaco Security Publishing.
2239: 2073: 2048: 2013: 1848: 655: 471: 176: 65: 905:
Principles of Computer Security, Fourth Edition (Official Comptia Guide)
557:
Security engineering: a guide to building dependable distributed systems
369: 2304: 2120: 2068: 1951: 1831: 1776: 1696: 296: 223: 136:, last bill amount) to establish legitimacy in the mind of the target. 104: 2180: 2135: 2130: 1978: 1946: 491: 463: 1208:"Mobile Devices and the Military: useful Tool or Significant Threat" 2140: 2098: 1961: 1207: 769:
The story of HP pretexting scandal with discussion is available at
335: 316: 311: 79:
All social engineering techniques are based on attributes of human
502:, such as, Phrack, B4B0 and 9x on modifying Oki 900s, blueboxing, 2150: 2125: 2088: 409:
in which over 150 million private records were leaked (including
227: 172: 151: 121: 1585:
Re-Floating the Titanic: Dealing with Social Engineering Attacks
688:"HOSTILE INFLUENCE AND EMERGING COGNITIVE THREATS IN CYBERSPACE" 518:
in the 1990s using social engineering, voice impersonation, and
334:
penalties for stealing and selling the records of mobile phone,
2008: 1923: 1661:
The Art of Deception: Controlling the Human Element of Security
1483:"Book Review: Social Engineering: The Science of Human Hacking" 824: 802: 515: 499: 483: 328: 243: 199: 180: 1644: 1594:
Development of methodical social engineering taxonomy project
120:, is the act of creating and using an invented scenario (the 32: 1060:"Straight Talk: Beware scams related to Equifax data breach" 1747:
Should Social Engineering be a part of Penetration Testing?
1001: 1508:
Hadnagy, Christopher; Fincher, Michele (22 January 2020).
125: 902: 1547:"Hacker creates organization to unmask child predators" 1538: 360: 1764:
US Committee on Commerce, Science, and Transportation
907:. New York: McGraw-Hill Education. pp. 193–194. 560:(2 ed.). Indianapolis, IN: Wiley. p. 1040. 421: 290: 202:, suggesting the device's undesirable nature) is any 498:
community for his articles with popular underground
1603:Office workers give away passwords for a cheap pen 233: 2368: 1771:Memo to the Press: Pretexting is Already Illegal 1730:. Light Reading Inc. 7 June 2006. Archived from 999:Stephen Shankland, 8 September 2006 1:08 PM PDT 834:. Light Reading Inc. 7 June 2006. Archived from 1096:"2016 Presidential Campaign Hacking Fast Facts" 692:Centre for Economics and Foreign Policy Studies 400: 194:compromising any computer it is plugged to. A " 51:of people into performing actions or divulging 1507: 1432:"43 Best Social Engineering Books of All Time" 1178:. Scorpio Net Security Services. 16 May 2013. 794:Pretexting: Your Personal Information Revealed 308:Why Aren't Phone Records Safe From Pretexting? 1792: 1534:"WTVR:"Protect Your Kids from Online Threats" 1424: 997:HP chairman: Use of pretexting 'embarrassing' 1683:Social Engineering: The Art of Human Hacking 1258:. Ustream.tv. 7 October 2011. Archived from 1234:"Social Engineering: Manipulating the human" 434:sent phishing emails directed to members of 1597:Master's Thesis, Naval Postgraduate School. 449: 444:Democratic Congressional Campaign Committee 1799: 1785: 1386:"Social Engineering A Young Hacker's Tale" 1175:Social Engineering: Manipulating the human 2343:Security information and event management 1016:"Calif. court drops charges against Dunn" 653: 525: 1806: 930:"#BHUSA Dropped USB Experiment Detailed" 704: 685: 550: 27: 1475: 1304:"Social Engineering a General Approach" 927: 773:"HP Pretexting Scandal by Faraz Davani" 606: 74: 2369: 1544: 1149: 888:: CS1 maint: archived copy as title ( 770: 656:"Social Engineering Attacks: A Survey" 253: 23:social engineering (political science) 2320:Host-based intrusion detection system 1780: 1761:Electronic Privacy Information Center 1757:"Protecting Consumers' Phone Records" 1501: 1119: 1117: 315:The attorneys general of Florida and 1697:https://lib.dr.iastate.edu/etd/10709 607:Guitton, Matthieu J. (1 June 2020). 364: 361:Notable social engineering incidents 2351:Runtime application self-protection 1617:Published by Gower Publishing Ltd. 1449: 1205: 990: 733: 432:Russian Military Intelligence (GRU) 13: 1902: 1565: 1360:"Wired 12.02: Three Blind Phreaks" 1114: 422:2016 United States Elections Leaks 345: 291:1st Source Information Specialists 14: 2398: 2283:Security-focused operating system 1728:"Social Engineering, the USB Way" 1710: 1545:Larson, Selena (14 August 2017). 832:"Social Engineering, the USB Way" 509: 198:" (the colloquial term for horse 2079:Insecure direct object reference 812:. invincea.com. 10 February 2015 771:Davani, Faraz (14 August 2011). 751:from the original on 7 July 2024 741:"Fundamentals of cyber security" 454: 368: 2333:Information security management 1717:Social Engineering Fundamentals 1703:doi:10.1109/ACCESS.2020.2992807 1527: 1378: 1352: 1321: 1309:. Informatica Economica journal 1296: 1284:. BrightTALK. 29 September 2011 1274: 1248: 1226: 1199: 1166: 1143: 1088: 1070: 1052: 1030: 1008: 974: 956: 953:Restatement 2d of Torts § 652C. 947: 921: 896: 850: 786: 477: 234:Pretexting of telephone records 226:, pretexting is an invasion of 163:Baiting is like the real-world 139: 1649:. Mitnick Security Publishing. 1282:"Automated Social Engineering" 928:Raywood, Dan (4 August 2016). 763: 698: 679: 670: 647: 600: 575: 544: 1: 2377:Social engineering (security) 1773:. Retrieved 9 September 2006. 1681:Hadnagy, Christopher, (2011) 1600:Leyden, John. 18 April 2003. 1150:Hafner, Katie (August 1995). 964:"Congress outlaws pretexting" 537: 98: 1766:. Retrieved 8 February 2006. 583:"Social Engineering Defined" 428:2016 United States Elections 401:Equifax breach help websites 340:Voice over Internet Protocol 7: 2338:Information risk management 2259:Multi-factor authentication 1815:Related security categories 613:Computers in Human Behavior 116:), also known in the UK as 10: 2403: 2315:Intrusion detection system 2273:Computer security software 1929:Advanced persistent threat 1753:. Retrieved 3 August 2009. 1723:. Retrieved 3 August 2009. 1487:The Ethical Hacker Network 1152:"Kevin Mitnick, unplugged" 1082:Security Through Education 719:10.1016/j.cose.2019.02.012 654:Salahdine, Fatima (2019). 587:Security Through Education 430:, hackers associated with 158: 143: 102: 49:psychological manipulation 20: 2214: 1914: 1900: 1894:Digital rights management 1814: 1591:Laribee, Lena. June 2006 1331:. Hays. 7 November 2018. 1236:. YouTube. 7 October 2011 625:10.1016/j.chb.2020.106307 520:Braille-display computers 2039:Denial-of-service attack 1934:Arbitrary code execution 1040:. CNBC. 7 September 2018 798:Federal Trade Commission 707:Computers & Security 686:Kirdemir, Baris (2019). 450:Notable social engineers 407:2017 Equifax data breach 269:Federal Trade Commission 248:President George W. Bush 53:confidential information 2249:Computer access control 2201:Rogue security software 1864:Electromagnetic warfare 1610:. Retrieved 2004-09-09. 411:Social Security numbers 353:, former chairwoman of 305:Phone Records For Sale: 230:tort of appropriation. 2295:Obfuscation (software) 2024:Browser Helper Objects 1908: 1412:Cite journal requires 531:Christopher J. Hadnagy 526:Christopher J. Hadnagy 470:and Lewis de Payne in 260:Gramm-Leach-Bliley Act 240:United States Congress 217: 134:Social Security number 93:social networking site 36: 2290:Data-centric security 2171:Remote access trojans 1906: 1655:, Simon, William L., 1640:KasperaviÄŤius, Alexis 1018:. CNET. 14 March 2007 31: 2222:Application security 2116:Privilege escalation 1984:Cross-site scripting 1837:Cybersex trafficking 1808:Information security 1685:Published by Wiley. 1663:Published by Wiley. 1582:Harley, David. 1998 1206:Niekerk, Brett van. 342:(VoIP) subscribers. 285:United States Senate 250:on 12 January 2007. 192:digital audio player 146:Watering hole attack 75:Techniques and terms 41:information security 1869:Information warfare 1827:Automotive security 1613:Mann, Ian. (2008). 1066:on 6 December 2020. 782:– via Scribd. 462:became involved in 254:Federal legislation 2278:Antivirus software 2146:Social engineering 2111:Polymorphic engine 2064:Fraudulent dialers 1969:Hardware backdoors 1909: 1391:. 15 February 2013 1102:. 27 December 2016 1084:. Social-Engineer. 870:on 11 October 2007 572:Chapter 2, page 17 380:. You can help by 238:In December 2006, 171:, attackers leave 45:social engineering 39:In the context of 37: 2364: 2363: 2326:Anomaly detection 2231:Secure by default 2084:Keystroke loggers 2019:Drive-by download 1907:vectorial version 1874:Internet security 1822:Computer security 1721:Securityfocus.com 1631:978-0-566-08773-8 1588:EICAR Conference. 747:. 19 March 2019. 567:978-0-470-06852-6 552:Anderson, Ross J. 504:satellite hacking 398: 397: 132:, date of birth, 60:best interests." 2394: 2235:Secure by design 2166:Hardware Trojans 1999:History sniffing 1989:Cross-site leaks 1884:Network security 1801: 1794: 1787: 1778: 1777: 1743: 1741: 1739: 1559: 1558: 1556: 1554: 1542: 1536: 1531: 1525: 1524: 1522: 1520: 1505: 1499: 1498: 1496: 1494: 1479: 1473: 1472: 1470: 1468: 1463:. 31 August 2018 1453: 1447: 1446: 1444: 1442: 1428: 1422: 1421: 1415: 1410: 1408: 1400: 1398: 1396: 1390: 1382: 1376: 1375: 1373: 1371: 1356: 1350: 1349: 1347: 1345: 1325: 1319: 1318: 1316: 1314: 1308: 1300: 1294: 1293: 1291: 1289: 1278: 1272: 1271: 1269: 1267: 1262:on 4 August 2012 1252: 1246: 1245: 1243: 1241: 1230: 1224: 1223: 1221: 1219: 1203: 1197: 1196: 1194: 1192: 1170: 1164: 1163: 1147: 1141: 1140: 1138: 1136: 1121: 1112: 1111: 1109: 1107: 1092: 1086: 1085: 1074: 1068: 1067: 1062:. Archived from 1056: 1050: 1049: 1047: 1045: 1034: 1028: 1027: 1025: 1023: 1012: 1006: 994: 988: 978: 972: 971: 960: 954: 951: 945: 944: 942: 940: 925: 919: 918: 900: 894: 893: 887: 879: 877: 875: 869: 863:. Archived from 862: 854: 848: 847: 845: 843: 828: 822: 821: 819: 817: 806: 800: 790: 784: 783: 781: 779: 767: 761: 760: 758: 756: 737: 731: 730: 702: 696: 695: 683: 677: 674: 668: 667: 651: 645: 644: 604: 598: 597: 595: 593: 579: 573: 571: 548: 393: 390: 372: 365: 185:USB flash drives 85:cognitive biases 57:confidence trick 2402: 2401: 2397: 2396: 2395: 2393: 2392: 2391: 2367: 2366: 2365: 2360: 2210: 1910: 1898: 1889:Copy protection 1879:Mobile security 1810: 1805: 1737: 1735: 1734:on 13 July 2006 1726: 1713: 1708: 1647:Course Workbook 1568: 1566:Further reading 1563: 1562: 1552: 1550: 1543: 1539: 1532: 1528: 1518: 1516: 1506: 1502: 1492: 1490: 1481: 1480: 1476: 1466: 1464: 1455: 1454: 1450: 1440: 1438: 1430: 1429: 1425: 1413: 1411: 1402: 1401: 1394: 1392: 1388: 1384: 1383: 1379: 1369: 1367: 1358: 1357: 1353: 1343: 1341: 1339: 1327: 1326: 1322: 1312: 1310: 1306: 1302: 1301: 1297: 1287: 1285: 1280: 1279: 1275: 1265: 1263: 1254: 1253: 1249: 1239: 1237: 1232: 1231: 1227: 1217: 1215: 1204: 1200: 1190: 1188: 1186: 1172: 1171: 1167: 1148: 1144: 1134: 1132: 1129:www.justice.gov 1123: 1122: 1115: 1105: 1103: 1094: 1093: 1089: 1076: 1075: 1071: 1058: 1057: 1053: 1043: 1041: 1036: 1035: 1031: 1021: 1019: 1014: 1013: 1009: 995: 991: 979: 975: 962: 961: 957: 952: 948: 938: 936: 926: 922: 915: 901: 897: 881: 880: 873: 871: 867: 860: 858:"Archived copy" 856: 855: 851: 841: 839: 838:on 13 July 2006 830: 829: 825: 815: 813: 808: 807: 803: 791: 787: 777: 775: 768: 764: 754: 752: 739: 738: 734: 703: 699: 684: 680: 675: 671: 652: 648: 605: 601: 591: 589: 581: 580: 576: 568: 549: 545: 540: 528: 512: 480: 457: 452: 436:Hillary Clinton 424: 415:drivers license 403: 394: 388: 385: 378:needs expansion 363: 355:Hewlett Packard 348: 346:Hewlett Packard 325:Charles Schumer 293: 256: 236: 220: 208:USB flash drive 204:removable media 161: 148: 142: 107: 101: 81:decision-making 77: 26: 17: 12: 11: 5: 2400: 2390: 2389: 2384: 2379: 2362: 2361: 2359: 2358: 2356:Site isolation 2353: 2348: 2347: 2346: 2340: 2330: 2329: 2328: 2323: 2312: 2307: 2302: 2297: 2292: 2287: 2286: 2285: 2280: 2270: 2269: 2268: 2263: 2262: 2261: 2254:Authentication 2246: 2245: 2244: 2243: 2242: 2232: 2229: 2218: 2216: 2212: 2211: 2209: 2208: 2203: 2198: 2193: 2188: 2183: 2178: 2173: 2168: 2163: 2158: 2153: 2148: 2143: 2138: 2133: 2128: 2123: 2118: 2113: 2108: 2107: 2106: 2096: 2091: 2086: 2081: 2076: 2071: 2066: 2061: 2056: 2054:Email spoofing 2051: 2046: 2041: 2036: 2031: 2026: 2021: 2016: 2011: 2006: 2001: 1996: 1994:DOM clobbering 1991: 1986: 1981: 1976: 1974:Code injection 1971: 1966: 1965: 1964: 1959: 1954: 1949: 1941: 1936: 1931: 1926: 1920: 1918: 1912: 1911: 1901: 1899: 1897: 1896: 1891: 1886: 1881: 1876: 1871: 1866: 1861: 1856: 1854:Cyberterrorism 1851: 1846: 1845: 1844: 1842:Computer fraud 1839: 1829: 1824: 1818: 1816: 1812: 1811: 1804: 1803: 1796: 1789: 1781: 1775: 1774: 1769:Plotkin, Hal. 1767: 1754: 1751:Darknet.org.uk 1744: 1724: 1712: 1711:External links 1709: 1707: 1706: 1699: 1693: 1679: 1657:Wozniak, Steve 1653:Mitnick, Kevin 1650: 1636:Mitnick, Kevin 1633: 1611: 1598: 1589: 1580: 1569: 1567: 1564: 1561: 1560: 1537: 1526: 1500: 1489:. 26 July 2018 1474: 1461:RSA Conference 1448: 1423: 1414:|journal= 1377: 1366:. 14 June 1999 1351: 1337: 1320: 1295: 1273: 1247: 1225: 1214:. academia.edu 1198: 1184: 1165: 1142: 1131:. 13 July 2018 1113: 1087: 1069: 1051: 1029: 1007: 989: 973: 955: 946: 920: 914:978-0071835978 913: 895: 849: 823: 801: 785: 762: 732: 697: 678: 669: 646: 599: 574: 566: 542: 541: 539: 536: 527: 524: 511: 510:Badir Brothers 508: 479: 476: 456: 453: 451: 448: 423: 420: 405:Following the 402: 399: 396: 395: 375: 373: 362: 359: 347: 344: 292: 289: 255: 252: 235: 232: 219: 216: 160: 157: 144:Main article: 141: 138: 103:Main article: 100: 97: 76: 73: 15: 9: 6: 4: 3: 2: 2399: 2388: 2385: 2383: 2380: 2378: 2375: 2374: 2372: 2357: 2354: 2352: 2349: 2344: 2341: 2339: 2336: 2335: 2334: 2331: 2327: 2324: 2321: 2318: 2317: 2316: 2313: 2311: 2308: 2306: 2303: 2301: 2298: 2296: 2293: 2291: 2288: 2284: 2281: 2279: 2276: 2275: 2274: 2271: 2267: 2266:Authorization 2264: 2260: 2257: 2256: 2255: 2252: 2251: 2250: 2247: 2241: 2238: 2237: 2236: 2233: 2230: 2228: 2227:Secure coding 2225: 2224: 2223: 2220: 2219: 2217: 2213: 2207: 2204: 2202: 2199: 2197: 2196:SQL injection 2194: 2192: 2189: 2187: 2184: 2182: 2179: 2177: 2176:Vulnerability 2174: 2172: 2169: 2167: 2164: 2162: 2161:Trojan horses 2159: 2157: 2156:Software bugs 2154: 2152: 2149: 2147: 2144: 2142: 2139: 2137: 2134: 2132: 2129: 2127: 2124: 2122: 2119: 2117: 2114: 2112: 2109: 2105: 2102: 2101: 2100: 2097: 2095: 2092: 2090: 2087: 2085: 2082: 2080: 2077: 2075: 2072: 2070: 2067: 2065: 2062: 2060: 2057: 2055: 2052: 2050: 2047: 2045: 2044:Eavesdropping 2042: 2040: 2037: 2035: 2034:Data scraping 2032: 2030: 2027: 2025: 2022: 2020: 2017: 2015: 2012: 2010: 2007: 2005: 2004:Cryptojacking 2002: 2000: 1997: 1995: 1992: 1990: 1987: 1985: 1982: 1980: 1977: 1975: 1972: 1970: 1967: 1963: 1960: 1958: 1955: 1953: 1950: 1948: 1945: 1944: 1942: 1940: 1937: 1935: 1932: 1930: 1927: 1925: 1922: 1921: 1919: 1917: 1913: 1905: 1895: 1892: 1890: 1887: 1885: 1882: 1880: 1877: 1875: 1872: 1870: 1867: 1865: 1862: 1860: 1857: 1855: 1852: 1850: 1847: 1843: 1840: 1838: 1835: 1834: 1833: 1830: 1828: 1825: 1823: 1820: 1819: 1817: 1813: 1809: 1802: 1797: 1795: 1790: 1788: 1783: 1782: 1779: 1772: 1768: 1765: 1762: 1758: 1755: 1752: 1748: 1745: 1733: 1729: 1725: 1722: 1718: 1715: 1714: 1704: 1700: 1698: 1694: 1692: 1691:0-470-63953-9 1688: 1684: 1680: 1678: 1677:0-7645-4280-X 1674: 1670: 1669:0-471-23712-4 1666: 1662: 1658: 1654: 1651: 1648: 1646: 1641: 1637: 1634: 1632: 1628: 1624: 1623:0-566-08773-1 1620: 1616: 1612: 1609: 1605: 1604: 1599: 1596: 1595: 1590: 1587: 1586: 1581: 1579: 1578:0-553-26350-1 1575: 1571: 1570: 1548: 1541: 1535: 1530: 1515: 1511: 1504: 1488: 1484: 1478: 1462: 1458: 1452: 1437: 1436:BookAuthority 1433: 1427: 1419: 1406: 1387: 1381: 1365: 1361: 1355: 1340: 1338:9781839473036 1334: 1330: 1329:"Cyber Crime" 1324: 1305: 1299: 1283: 1277: 1261: 1257: 1251: 1235: 1229: 1213: 1209: 1202: 1187: 1185:9789351261827 1181: 1177: 1176: 1169: 1161: 1157: 1153: 1146: 1130: 1126: 1120: 1118: 1101: 1097: 1091: 1083: 1079: 1073: 1065: 1061: 1055: 1039: 1033: 1017: 1011: 1005: 1003: 998: 993: 987: 986:0-471-23712-4 983: 977: 969: 965: 959: 950: 935: 934:info security 931: 924: 916: 910: 906: 899: 891: 885: 866: 859: 853: 837: 833: 827: 811: 805: 799: 795: 789: 774: 766: 750: 746: 742: 736: 728: 724: 720: 716: 712: 708: 701: 693: 689: 682: 673: 665: 661: 657: 650: 642: 638: 634: 630: 626: 622: 618: 614: 610: 603: 588: 584: 578: 569: 563: 559: 558: 553: 547: 543: 535: 532: 523: 521: 517: 507: 505: 501: 497: 493: 489: 485: 475: 473: 469: 468:Kevin Mitnick 465: 461: 460:Susan Headley 455:Susan Headley 447: 445: 441: 437: 433: 429: 419: 416: 412: 408: 392: 383: 379: 376:This section 374: 371: 367: 366: 358: 356: 352: 351:Patricia Dunn 343: 341: 337: 333: 330: 326: 320: 318: 313: 309: 306: 302: 298: 288: 286: 281: 277: 274: 270: 265: 261: 251: 249: 245: 241: 231: 229: 225: 215: 211: 209: 205: 201: 197: 193: 188: 186: 182: 178: 174: 170: 166: 156: 153: 147: 137: 135: 131: 127: 123: 119: 115: 111: 106: 96: 94: 88: 86: 82: 72: 69: 67: 61: 58: 54: 50: 46: 42: 34: 30: 24: 19: 2300:Data masking 2145: 1859:Cyberwarfare 1763: 1750: 1736:. Retrieved 1732:the original 1720: 1682: 1660: 1643: 1614: 1608:The Register 1601: 1592: 1583: 1551:. Retrieved 1540: 1529: 1517:. Retrieved 1513: 1503: 1491:. Retrieved 1486: 1477: 1465:. Retrieved 1460: 1451: 1439:. Retrieved 1435: 1426: 1405:cite journal 1393:. Retrieved 1380: 1368:. Retrieved 1363: 1354: 1342:. Retrieved 1323: 1311:. Retrieved 1298: 1286:. Retrieved 1276: 1264:. Retrieved 1260:the original 1250: 1238:. Retrieved 1228: 1216:. Retrieved 1211: 1201: 1189:. Retrieved 1174: 1168: 1159: 1155: 1145: 1133:. Retrieved 1128: 1104:. Retrieved 1099: 1090: 1081: 1072: 1064:the original 1054: 1042:. Retrieved 1032: 1020:. Retrieved 1010: 1000: 992: 976: 967: 958: 949: 937:. Retrieved 933: 923: 904: 898: 872:. Retrieved 865:the original 852: 840:. Retrieved 836:the original 826: 814:. Retrieved 804: 788: 776:. Retrieved 765: 753:. Retrieved 745:BBC Bitesize 744: 735: 710: 706: 700: 691: 681: 672: 663: 659: 649: 616: 612: 602: 590:. Retrieved 586: 577: 556: 546: 529: 513: 488:cold calling 481: 478:Mike Ridpath 458: 440:John Podesta 425: 404: 386: 382:adding to it 377: 349: 321: 307: 304: 294: 282: 278: 264:U.S. Federal 262:(GLBA) is a 257: 237: 221: 212: 195: 189: 177:floppy disks 165:Trojan horse 162: 149: 140:Water holing 129: 117: 113: 109: 108: 89: 78: 70: 62: 55:. A type of 44: 38: 18: 2240:Misuse case 2074:Infostealer 2049:Email fraud 2014:Data breach 1849:Cybergeddon 1659:,. (2002). 1553:14 November 1162:(2): 80(9). 816:23 February 713:: 354–366. 506:and RCMAC. 472:Los Angeles 426:During the 66:geopolitics 2382:Cybercrime 2371:Categories 2305:Encryption 2181:Web shells 2121:Ransomware 2069:Hacktivism 1832:Cybercrime 1642:. (2004). 1519:22 January 1493:22 January 1467:22 January 1441:22 January 1395:13 January 1344:11 January 1313:11 January 1078:"Phishing" 619:: 106307. 538:References 297:Fred Upton 295:U.S. Rep. 224:common law 196:road apple 175:-infected 114:pretextual 110:Pretexting 105:Pretexting 99:Pretexting 2387:Deception 2136:Shellcode 2131:Scareware 1979:Crimeware 1939:Backdoors 778:15 August 641:214111644 633:0747-5632 592:3 October 492:phreaking 464:phreaking 301:Kalamazoo 258:The 1999 83:known as 2310:Firewall 2215:Defenses 2141:Spamming 2126:Rootkits 2099:Phishing 2059:Exploits 1738:23 April 1370:11 April 1288:11 April 1266:11 April 1240:11 April 1191:11 April 1135:7 August 1106:7 August 1022:11 April 1004:News.com 884:cite web 842:23 April 749:Archived 727:86565713 666:(4): 89. 554:(2008). 389:May 2024 336:landline 332:criminal 317:Missouri 312:Illinois 152:websites 118:blagging 2151:Spyware 2094:Payload 2089:Malware 2029:Viruses 2009:Botnets 1916:Threats 1156:Esquire 970:. 2007. 939:28 July 874:2 March 496:hacking 228:privacy 181:CD-ROMs 173:malware 159:Baiting 122:pretext 47:is the 2345:(SIEM) 2322:(HIDS) 2206:Zombie 1943:Bombs 1924:Adware 1689:  1675:  1667:  1629:  1621:  1576:  1335:  1218:11 May 1182:  984:  911:  755:7 July 725:  639:  631:  564:  516:Israel 500:ezines 484:w00w00 413:, and 338:, and 329:felony 244:felony 200:manure 169:attack 112:(adj. 2191:Worms 2186:Wiper 2104:Voice 1952:Logic 1645:CSEPS 1549:. CNN 1514:ISACA 1389:(PDF) 1364:Wired 1307:(PDF) 1044:3 May 868:(PDF) 861:(PDF) 723:S2CID 637:S2CID 466:with 183:, or 35:alert 33:OPSEC 1957:Time 1947:Fork 1740:2014 1687:ISBN 1673:ISBN 1665:ISBN 1627:ISBN 1619:ISBN 1574:ISBN 1555:2019 1521:2020 1495:2020 1469:2020 1443:2020 1418:help 1397:2020 1372:2012 1346:2020 1333:ISBN 1315:2015 1290:2012 1268:2012 1242:2012 1220:2013 1193:2012 1180:ISBN 1137:2024 1108:2024 1046:2024 1024:2012 1002:CNET 982:ISBN 941:2017 909:ISBN 890:link 876:2012 844:2014 818:2017 780:2011 757:2024 629:ISSN 594:2021 562:ISBN 494:and 273:FTCA 130:e.g. 1962:Zip 1671:or 1625:or 1160:124 1100:CNN 796:", 715:doi 621:doi 617:107 522:. 384:. 299:(R- 222:In 218:Law 126:lie 87:. 2373:: 1759:, 1749:– 1719:– 1638:, 1606:. 1512:. 1485:. 1459:. 1434:. 1409:: 1407:}} 1403:{{ 1362:. 1210:. 1158:. 1154:. 1127:. 1116:^ 1098:. 1080:. 966:. 932:. 886:}} 882:{{ 743:. 721:. 711:83 709:. 690:. 664:11 662:. 658:. 635:. 627:. 615:. 611:. 585:. 310:" 179:, 43:, 1800:e 1793:t 1786:v 1742:. 1705:. 1557:. 1523:. 1497:. 1471:. 1445:. 1420:) 1416:( 1399:. 1374:. 1348:. 1317:. 1292:. 1270:. 1244:. 1222:. 1195:. 1139:. 1110:. 1048:. 1026:. 943:. 917:. 892:) 878:. 846:. 820:. 792:" 759:. 729:. 717:: 694:. 643:. 623:: 596:. 570:. 391:) 387:( 25:.

Index

social engineering (political science)
Definition of Social Engineering in Layman's Terms
OPSEC
information security
psychological manipulation
confidential information
confidence trick
geopolitics
decision-making
cognitive biases
social networking site
Pretexting
pretext
lie
Social Security number
Watering hole attack
websites
Trojan horse
attack
malware
floppy disks
CD-ROMs
USB flash drives
digital audio player
manure
removable media
USB flash drive
common law
privacy
United States Congress

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑