Social Engineering

International Legal Research

Information about Social Engineering in free legal resources:

Treaties & Agreements

International Organizations

Jurisprudence $ Commentary

European Union

IP Law


Social Engineering

Social Engineering

Overview of Social Engineering in relation to cyber crime: [1]While computer crime is often thought of in terms of purely technical exploits, this mind-set is dangerous and shortsighted. As legendary cybercriminal and current security expert Kevin Mitnick has pointed out, humans are generally the weakest link when it comes to securing information. In The Art of Deception, his 2002 book on the subject, Mitnick describes many of his own exploits using social engineering.


Notes and References

1. By Eric Walter

See Also

  • Types of Cybercrime
  • Cybercriminal

Further Reading

Bangermam, E. (2006, December 11). Congress outlaws pretexting. Available on the Ars Technica Web site: 20061211-8395.html; McQuade, S.C. (2006). Understanding and managing cybercrime. Boston: Allyn & Bacon; FTC. (2006). Pretexting: Your personal information revealed. Federal Trade Commission Web site: (internet link) credit/pretext.shtm; Mitnick, K., Simon, W. L., & Wozniak, S. (2002). The art of deception: Controlling the human element of security. New York: John Wiley & Sons.

Leave a Comment