Social Engineering

Social Engineering

Social Engineering

Overview of Social Engineering in relation to cyber crime: [1]While computer crime is often thought of in terms of purely technical exploits, this mind-set is dangerous and shortsighted. As legendary cybercriminal and current security expert Kevin Mitnick has pointed out, humans are generally the weakest link when it comes to securing information. In The Art of Deception, his 2002 book on the subject, Mitnick describes many of his own exploits using social engineering.

Resources

Notes and References

1. By Eric Walter

See Also

  • Types of Cybercrime
  • Cybercriminal

Further Reading

Bangermam, E. (2006, December 11). Congress outlaws pretexting. Available on the Ars Technica Web site: https://arstechnica.com/news.ars/post/ 20061211-8395.html; McQuade, S.C. (2006). Understanding and managing cybercrime. Boston: Allyn & Bacon; FTC. (2006). Pretexting: Your personal information revealed. Federal Trade Commission Web site: (internet link) ftc.gov/bcp/conline/pubs/ credit/pretext.shtm; Mitnick, K., Simon, W. L., & Wozniak, S. (2002). The art of deception: Controlling the human element of security. New York: John Wiley & Sons.


Posted

in

,

by

Tags:

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *