WHAT IS SOCIAL ENGINEERING? Ranson, Violet Computer Science August 24, 2012 SOCIAL ENGINEERING? “social disguise, cultural ploys, and psychological tricks” PRETEXTING • Making up a story BAITING MALWARE= Malicious + Software 1. Tell a deceiving story 2. Break through guards 3. Infect 4. Multiply Violation of Security Using Social Engineering WORKS CITED D. Oliveira, personal communication, August 24, 2012 Goodrich, M. T., & Tamassia, R. (2011). Introduction to Computer Security. Boston, Massachusetts:Pearson. Jack Wiles, Terry Gudaitis, Jennifer Jabbusch, Russ Rogers, Sean Lowther, Chapter 1 - Social engineering: The ultimate low tech hacking threat, Low Tech Hacking, Syngress, Boston, 2012, Pages 1-29, ISBN 9781597496650, 10.1016/ B978-1-59749665-0.00001-0. (http://www.sciencedirect.com/science/article/pii/B9781597496650000010) Sherly Abraham, InduShobha Chengalur-Smith, An overview of social engineering malware: Trends, tactics, and implications, Technology in Society, Volume 32, Issue 3, August 2010, Pages 183-196, ISSN 0160-791X, 10.1016/j.techsoc.2010.07.001. (http://www.sciencedirect.com/science/article/pii/S0160791X10000497)
© Copyright 2024