The use of formal social engineering techniques to identify weaknesses during a computer vulnerability competition

  • Authors:
  • Derek Kvedar;Michael Nettis;Steven P. Fulton

  • Affiliations:
  • United States Air Force Academy;United States Air Force Academy;United States Air Force Academy

  • Venue:
  • Journal of Computing Sciences in Colleges
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Increased dependency on digital data and reliable networks has created a need for ever-increasing computer security. Many technological options exist for security in both hardware and software and these implementations pose formidable threats for hackers. However social engineering bypasses the electronic security measures and targets the weakest component of networks-the human users. The purpose of the study is to conduct a social engineering operation to prove the viability of social engineering as a method of network attack, as well as display the need to increase education and implement measures to protect against it. The findings of the study suggest that even among those who identify themselves as being aware of social engineering techniques, a well planned and executed event could succeed. The findings suggest that an awareness of the value of the information may encourage users to protect it against possible social engineering attacks.