Social engineering: the "Dark Art"

  • Authors:
  • Tim Thornburgh

  • Affiliations:
  • Kennesaw State University, Kennesaw, GA

  • Venue:
  • Proceedings of the 1st annual conference on Information security curriculum development
  • Year:
  • 2004

Quantified Score

Hi-index 0.01

Visualization

Abstract

The key to maintaining the confidentiality, integrity, and availability of an organizations information and information systems is controlling who accesses what information. This is accomplished by being able to identify the requestor, verifying the requestor is not an impostor, and ensuring that the requestor has the proper level of clearance to access a given resource. There have always been those that attempt to by-pass this security mechanism through brute force or guile. In the past, those who use guile have been called confidence men and con artists. Today, these people are called social engineers, but the tactics remain the same even if the objectives have changed.