Social engineering: the "Dark Art"
Proceedings of the 1st annual conference on Information security curriculum development
Information security technology?...don't rely on it: a case study in social engineering
SSYM'95 Proceedings of the 5th conference on USENIX UNIX Security Symposium - Volume 5
Hi-index | 0.00 |
Increased dependency on digital data and reliable networks has created a need for ever-increasing computer security. Many technological options exist for security in both hardware and software and these implementations pose formidable threats for hackers. However social engineering bypasses the electronic security measures and targets the weakest component of networks-the human users. The purpose of the study is to conduct a social engineering operation to prove the viability of social engineering as a method of network attack, as well as display the need to increase education and implement measures to protect against it. The findings of the study suggest that even among those who identify themselves as being aware of social engineering techniques, a well planned and executed event could succeed. The findings suggest that an awareness of the value of the information may encourage users to protect it against possible social engineering attacks.