HOME

TheInfoList



OR:

In the context of
information security Information security is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorized or inappropriate access to data ...
, social engineering is the use of psychological influence of people into performing actions or divulging
confidential information Confidentiality involves a set of rules or a promise sometimes executed through non-disclosure agreement, confidentiality agreements that limits the access to or places restrictions on the distribution of certain types of information. Legal con ...
. This differs from
psychological manipulation In psychology, manipulation is defined as an action designed to influence or control another person, usually in an underhanded or subtle manner which facilitates one's personal aims. Methods someone may use to manipulate another person may includ ...
in that it doesn't need to be controlling, negative or a one-way transaction. Manipulation involves a
zero-sum game Zero-sum game is a Mathematical model, mathematical representation in game theory and economic theory of a situation that involves two competition, competing entities, where the result is an advantage for one side and an equivalent loss for the o ...
where one party wins and the other loses while social engineering can be win-win for both parties. A type of
confidence trick A scam, or a confidence trick, is an attempt to defraud a person or group after first gaining their trust. Confidence tricks exploit victims using a combination of the victim's credulity, naivety, compassion, vanity, confidence, irrespons ...
for the purpose of information gathering,
fraud In law, fraud is intent (law), intentional deception to deprive a victim of a legal right or to gain from a victim unlawfully or unfairly. Fraud can violate Civil law (common law), civil law (e.g., a fraud victim may sue the fraud perpetrato ...
, or system access, it differs from a traditional "con" in the sense that it is often one of many steps in a more complex fraud scheme. It has also been defined as "any act that influences a person to take an action that may or may not be in their best interests." Research done in 2020 has indicated that social engineering will be one of the most prominent challenges of the upcoming decade. Having proficiency in social engineering will be increasingly important for organizations and countries, due to the impact on
geopolitics Geopolitics () is the study of the effects of Earth's geography on politics and international relations. Geopolitics usually refers to countries and relations between them, it may also focus on two other kinds of State (polity), states: ''de fac ...
as well. Social engineering raises the question of whether our decisions will be accurately informed if our primary information is engineered and biased. Social engineering attacks have been increasing in intensity and number, cementing the need for novel detection techniques and
cyber security Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and networks from thr ...
educational programs.


Techniques and terms

All social engineering techniques are based on exploitable weaknesses in human
decision-making In psychology, decision-making (also spelled decision making and decisionmaking) is regarded as the Cognition, cognitive process resulting in the selection of a belief or a course of action among several possible alternative options. It could be ...
known as
cognitive biases A cognitive bias is a systematic pattern of deviation from norm or rationality in judgment. Individuals create their own "subjective reality" from their perception of the input. An individual's construction of reality, not the objective input, ...
. One example of social engineering is an individual who walks into a building and posts an official-looking announcement to the company bulletin that says the number for the help desk has changed. So, when employees call for help the individual asks them for their passwords and IDs thereby gaining the ability to access the company's private information. Another example of social engineering would be that the hacker contacts the target on a social networking site and starts a conversation with the target. Gradually the hacker gains the trust of the target and then uses that trust to get access to sensitive information like password or bank account details.


Pretexting

Pretexting (adj. pretextual), also known in the UK as blagging, is the act of creating and using an invented scenario (the
pretext A pretext (: ''pretextual'') is an excuse to do something or say something that is not accurate. Pretexts may be based on a half-truth or developed in the context of a misleading fabrication. Pretexts have been used to conceal the true purpose or r ...
) to engage a targeted victim in a manner that increases the chance the victim will divulge information or perform actions that would be unlikely in ordinary circumstances. An elaborate lie, it most often involves some prior research or setup and the use of this information for impersonation (''e.g.'', date of birth,
Social Security number In the United States, a Social Security number (SSN) is a nine-digit number issued to United States nationality law, U.S. citizens, Permanent residence (United States), permanent residents, and temporary (working) residents under section 205(c)(2 ...
, last bill amount) to establish legitimacy in the mind of the target.


Water holing

Water holing is a targeted social engineering strategy that capitalizes on the trust users have in
websites A website (also written as a web site) is any web page whose content is identified by a common domain name and is published on at least one web server. Websites are typically dedicated to a particular topic or purpose, such as news, education ...
they regularly visit. The victim feels safe to do things they would not do in a different situation. A wary person might, for example, purposefully avoid clicking a link in an unsolicited email, but the same person would not hesitate to follow a link on a website they often visit. So, the attacker prepares a trap for the unwary prey at a favored watering hole. This strategy has been successfully used to gain access to some (supposedly) very secure systems.


Baiting

Baiting is like the real-world
Trojan horse In Greek mythology, the Trojan Horse () was a wooden horse said to have been used by the Greeks during the Trojan War to enter the city of Troy and win the war. The Trojan Horse is not mentioned in Homer, Homer's ''Iliad'', with the poem ending ...
that uses physical media and relies on the curiosity or greed of the victim. In this attack, attackers leave
malware Malware (a portmanteau of ''malicious software'')Tahir, R. (2018)A study on malware and malware detection techniques . ''International Journal of Education and Management Engineering'', ''8''(2), 20. is any software intentionally designed to caus ...
-infected
floppy disk A floppy disk or floppy diskette (casually referred to as a floppy, a diskette, or a disk) is a type of disk storage composed of a thin and flexible disk of a magnetic storage medium in a square or nearly square plastic enclosure lined with a ...
s,
CD-ROM A CD-ROM (, compact disc read-only memory) is a type of read-only memory consisting of a pre-pressed optical compact disc that contains computer data storage, data computers can read, but not write or erase. Some CDs, called enhanced CDs, hold b ...
s, or
USB flash drive A flash drive (also thumb drive, memory stick, and pen drive/pendrive) is a data storage device that includes flash memory with an integrated USB interface. A typical USB drive is removable, rewritable, and smaller than an optical disc, and u ...
s in locations people will find them (bathrooms, elevators, sidewalks, parking lots, etc.), give them legitimate and curiosity-piquing labels, and wait for victims. Unless computer controls block infections, insertion compromises PCs "auto-running" media. Hostile devices can also be used. For instance, a "lucky winner" is sent a free
digital audio player A portable media player (PMP) or digital audio player (DAP) is a portable consumer electronics device capable of storing and playing digital media such as audio, images, and video files. Normally they refer to small, battery-powered devices ...
compromising any computer it is plugged to. A "road apple" (the colloquial term for horse
manure Manure is organic matter that is used as organic fertilizer in agriculture. Most manure consists of animal feces; other sources include compost and green manure. Manures contribute to the fertility of soil by adding organic matter and nut ...
, suggesting the device's undesirable nature) is any
removable media In computing, a removable media is a data storage media that is designed to be readily inserted and removed from a system. Most early removable media, such as floppy disks and optical discs, require a dedicated read/write device (i.e. a drive) ...
with malicious software left in opportunistic or conspicuous places. It may be a CD, DVD, or
USB flash drive A flash drive (also thumb drive, memory stick, and pen drive/pendrive) is a data storage device that includes flash memory with an integrated USB interface. A typical USB drive is removable, rewritable, and smaller than an optical disc, and u ...
, among other media. Curious people take it and plug it into a computer, infecting the host and any attached networks. Again, hackers may give them enticing labels, such as "Employee Salaries" or "Confidential". One study published in 2016 had researchers drop 297 USB drives around the campus of the University of Illinois. The drives contained files on them that linked to webpages owned by the researchers. The researchers were able to see how many of the drives had files on them opened, but not how many were inserted into a computer without having a file opened. Of the 297 drives that were dropped, 290 (98%) of them were picked up and 135 (45%) of them "called home".


Quid Pro Quo

An attacker offers to provide sensitive information (e.g. login credentials) or pay some amount of money in exchange for a favor. The attacker may pose as an expert offering free IT help, whereby they need login credentials from the user.


Scareware

The victim is bombarded with multiple messages about fake threats and alerts, making them think that the system is infected with malware. Thus, attackers force them to install remote login software or other malicious software. Or directly extort a ransom, such as offering to send a certain amount of money in
cryptocurrency A cryptocurrency (colloquially crypto) is a digital currency designed to work through a computer network that is not reliant on any central authority, such as a government or bank, to uphold or maintain it. Individual coin ownership record ...
in exchange for the safety of confidential videos that the criminal has, as he claims.


Tailgating (piggybacking)

An attacker pretends to be a company employee or other person with access rights in order to enter an office or other restricted area. Deception and social engineering tools are actively used. For example, the intruder pretends to be a courier or loader carrying something in his hands and asks an employee who is walking outside to hold the door, gaining access to the building.


Law

In
common law Common law (also known as judicial precedent, judge-made law, or case law) is the body of law primarily developed through judicial decisions rather than statutes. Although common law may incorporate certain statutes, it is largely based on prece ...
, pretexting is an invasion of
privacy Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively. The domain of privacy partially overlaps with security, which can include the concepts of a ...
tort of appropriation.


Pretexting of telephone records

In December 2006,
United States Congress The United States Congress is the legislature, legislative branch of the federal government of the United States. It is a Bicameralism, bicameral legislature, including a Lower house, lower body, the United States House of Representatives, ...
approved a Senate sponsored bill making the pretexting of telephone records a federal
felony A felony is traditionally considered a crime of high seriousness, whereas a misdemeanor is regarded as less serious. The term "felony" originated from English common law (from the French medieval word "''félonie''") to describe an offense that r ...
with fines of up to $250,000 and ten years in prison for individuals (or fines of up to $500,000 for companies). It was signed by President George W. Bush on 12 January 2007.


Federal legislation

The 1999 Gramm-Leach-Bliley Act (GLBA) is a U.S. Federal law that specifically addresses pretexting of banking records as an illegal act punishable under federal statutes. When a business entity such as a private investigator, SIU insurance investigator, or an adjuster conducts any type of deception, it falls under the authority of the
Federal Trade Commission The Federal Trade Commission (FTC) is an independent agency of the United States government whose principal mission is the enforcement of civil (non-criminal) United States antitrust law, antitrust law and the promotion of consumer protection. It ...
(FTC). This federal agency has the obligation and authority to ensure that consumers are not subjected to any unfair or deceptive business practices. US Federal Trade Commission Act, Section 5 of the FTCA states, in part: "Whenever the Commission shall have reason to believe that any such person, partnership, or corporation has been or is using any unfair method of competition or unfair or deceptive act or practice in or affecting commerce, and if it shall appear to the Commission that a proceeding by it in respect thereof would be to the interest of the public, it shall issue and serve upon such person, partnership, or corporation a complaint stating its charges in that respect." The statute states that when someone obtains any personal, non-public information from a financial institution or the consumer, their action is subject to the statute. It relates to the consumer's relationship with the financial institution. For example, a pretexter using false pretenses either to get a consumer's address from the consumer's bank, or to get a consumer to disclose the name of their bank, would be covered. The determining principle is that pretexting only occurs when information is obtained through false pretenses. While the sale of cell telephone records has gained significant media attention, and telecommunications records are the focus of the two bills currently before the
United States Senate The United States Senate is a chamber of the Bicameralism, bicameral United States Congress; it is the upper house, with the United States House of Representatives, U.S. House of Representatives being the lower house. Together, the Senate and ...
, many other types of private records are being bought and sold in the public market. Alongside many advertisements for cell phone records, wireline records and the records associated with calling cards are advertised. As individuals shift to VoIP telephones, it is safe to assume that those records will be offered for sale as well. Currently, it is legal to sell telephone records, but illegal to obtain them.


1st Source Information Specialists

U.S. Rep.
Fred Upton Frederick Stephen Upton (born April 23, 1953) is an American politician who served as a U.S. representative from Michigan from 1987 to 2023. A member of the Republican Party (United States), Republican Party, he represented Kalamazoo, Michigan, ...
(R-
Kalamazoo Kalamazoo ( ) is a city in Kalamazoo County, Michigan, United States, and its county seat. At the 2020 United States census, 2020 census, Kalamazoo had a population of 73,598. It is the principal city of the Kalamazoo–Portage metropolitan are ...
, Michigan), chairman of the Energy and Commerce Subcommittee on Telecommunications and the Internet, expressed concern over the easy access to personal mobile phone records on the Internet during a House Energy & Commerce Committee hearing on "Phone Records For Sale: ''Why Aren't Phone Records Safe From Pretexting?''"
Illinois Illinois ( ) is a U.S. state, state in the Midwestern United States, Midwestern United States. It borders on Lake Michigan to its northeast, the Mississippi River to its west, and the Wabash River, Wabash and Ohio River, Ohio rivers to its ...
became the first state to sue an online records broker when Attorney General Lisa Madigan sued 1st Source Information Specialists, Inc. A spokeswoman for Madigan's office said. The Florida-based company operates several Web sites that sell mobile telephone records, according to a copy of the suit. The attorneys general of Florida and
Missouri Missouri (''see #Etymology and pronunciation, pronunciation'') is a U.S. state, state in the Midwestern United States, Midwestern region of the United States. Ranking List of U.S. states and territories by area, 21st in land area, it border ...
quickly followed Madigan's lead, filing suits respectively, against 1st Source Information Specialists and, in Missouri's case, one other records broker – First Data Solutions, Inc. Several wireless providers, including T-Mobile, Verizon, and Cingular filed earlier lawsuits against records brokers, with Cingular winning an injunction against First Data Solutions and 1st Source Information Specialists. U.S. Senator Charles Schumer (D-New York) introduced legislation in February 2006 aimed at curbing the practice. The Consumer Telephone Records Protection Act of 2006 would create
felony A felony is traditionally considered a crime of high seriousness, whereas a misdemeanor is regarded as less serious. The term "felony" originated from English common law (from the French medieval word "''félonie''") to describe an offense that r ...
criminal In ordinary language, a crime is an unlawful act punishable by a State (polity), state or other authority. The term ''crime'' does not, in modern criminal law, have any simple and universally accepted definition,Farmer, Lindsay: "Crime, definiti ...
penalties for stealing and selling the records of mobile phone,
landline A landline is a physical telephone connection that uses metal wires or optical fiber from the subscriber's premises to the network, allowing multiple phones to operate simultaneously on the same phone number. It is also referred to as plain old ...
, and
Voice over Internet Protocol Voice over Internet Protocol (VoIP), also known as IP telephony, is a set of technologies used primarily for voice communication sessions over Internet Protocol (IP) networks, such as the Internet. VoIP enables Voice call, voice calls to be tran ...
(VoIP) subscribers.


Hewlett Packard

Patricia Dunn, former chairwoman of
Hewlett Packard The Hewlett-Packard Company, commonly shortened to Hewlett-Packard ( ) or HP, was an American multinational information technology company. It was founded by Bill Hewlett and David Packard in 1939 in a one-car garage in Palo Alto, Californi ...
, reported that the HP board hired a private investigation company to delve into who was responsible for leaks within the board. Dunn acknowledged that the company used the practice of pretexting to solicit the telephone records of board members and journalists. Chairman Dunn later apologized for this act and offered to step down from the board if it was desired by board members.HP chairman: Use of pretexting 'embarrassing'
Stephen Shankland, 8 September 2006 1:08 PM PDT '' CNET News.com''
Unlike Federal law, California law specifically forbids such pretexting. The four felony charges brought on Dunn were dismissed.


Notable social engineering incidents


2017 Equifax breach help websites

Following the 2017 Equifax data breach linked to
China China, officially the People's Republic of China (PRC), is a country in East Asia. With population of China, a population exceeding 1.4 billion, it is the list of countries by population (United Nations), second-most populous country after ...
's
People's Liberation Army The People's Liberation Army (PLA) is the military of the Chinese Communist Party (CCP) and the People's Republic of China (PRC). It consists of four Military branch, services—People's Liberation Army Ground Force, Ground Force, People's ...
in which over 150 million private records were leaked (including Social Security numbers, and
drivers license A driver's license, driving licence, or driving permit is a legal authorization, or the official document confirming such an authorization, for a specific individual to operate one or more types of motorized vehicles—such as motorcycles, car ...
numbers, birthdates, etc.), warnings were sent out regarding the dangers of impending security risks. In the day after the establishment of a legitimate help website (equifaxsecurity2017.com) dedicated to people potentially victimized by the breach, 194 malicious domains were reserved from small variations on the URL, capitalizing on the likelihood of people mistyping.


2017 Google and Facebook phishing emails

Two tech giants—
Google Google LLC (, ) is an American multinational corporation and technology company focusing on online advertising, search engine technology, cloud computing, computer software, quantum computing, e-commerce, consumer electronics, and artificial ...
and
Facebook Facebook is a social media and social networking service owned by the American technology conglomerate Meta Platforms, Meta. Created in 2004 by Mark Zuckerberg with four other Harvard College students and roommates, Eduardo Saverin, Andre ...
—were phished out of $100 million by a
Lithuania Lithuania, officially the Republic of Lithuania, is a country in the Baltic region of Europe. It is one of three Baltic states and lies on the eastern shore of the Baltic Sea, bordered by Latvia to the north, Belarus to the east and south, P ...
n fraudster. He impersonated a hardware supplier to falsely invoice both companies over two years. Despite their technological sophistication, the companies lost the money, although they were later able to recuperate the majority of the funds stolen.


2016 United States Elections leaks

During the
2016 United States Elections Elections in the United States, Elections were held in the United States on November 8, 2016. Republican Party (United States), Republican nominee Donald Trump defeated Democratic Party (United States), Democratic former Secretary of State (Uni ...
, hackers associated with Russian Military Intelligence (GRU) sent phishing emails directed to members of
Hillary Clinton Hillary Diane Rodham Clinton ( Rodham; born October 26, 1947) is an American politician, lawyer and diplomat. She was the 67th United States secretary of state in the administration of Barack Obama from 2009 to 2013, a U.S. senator represent ...
's campaign, disguised as a Google alert. Many members, including the chairman of the campaign, John Podesta, had entered their passwords thinking it would be reset, causing their personal information, and thousands of private emails and documents to be leaked. With this information, they hacked into other computers in the
Democratic Congressional Campaign Committee The Democratic Congressional Campaign Committee (DCCC) is the Democratic Hill committee for the United States House of Representatives, working to elect Democrats to that body. The DCCC recruits candidates, raises funds and organizes races in ...
, implanting malware in them, which caused their computer activities to be monitored and leaked.


2015 Ubiquiti Networks scam

In 2015, specialized
Wi-Fi Wi-Fi () is a family of wireless network protocols based on the IEEE 802.11 family of standards, which are commonly used for Wireless LAN, local area networking of devices and Internet access, allowing nearby digital devices to exchange data by ...
hardware and software maker Ubiquiti lost nearly $47 million to hackers. Attackers sent Ubiquiti's accounting department a
phishing Phishing is a form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware. Phishing attacks have become increasingly sophisticate ...
email from a
Hong Kong Hong Kong)., Legally Hong Kong, China in international treaties and organizations. is a special administrative region of China. With 7.5 million residents in a territory, Hong Kong is the fourth most densely populated region in the wor ...
branch with instructions to change payment account details. Upon discovering the theft, the company began cooperating with law enforcement, but was only able to recover $8 million of the stolen funds, although they had hoped for $15 million.


2014 Sony pictures leak

On 24 November 2014, the
hacker A hacker is a person skilled in information technology who achieves goals and solves problems by non-standard means. The term has become associated in popular culture with a security hackersomeone with knowledge of bug (computing), bugs or exp ...
group " Guardians of Peace" (probably linked to
North Korea North Korea, officially the Democratic People's Republic of Korea (DPRK), is a country in East Asia. It constitutes the northern half of the Korea, Korean Peninsula and borders China and Russia to the north at the Yalu River, Yalu (Amnok) an ...
) leaked confidential data from the film studio
Sony Pictures Entertainment Sony Pictures Entertainment Inc. is an American diversified multinational mass media and entertainment studio conglomerate that produces, acquires, and distributes filmed entertainment (theatrical motion pictures, television programs, and rec ...
. The data included emails, executive salaries, and employees' personal and family information. The phishers pretended to be high up employees to install malware on workers' computers.


2013 Department of Labor watering hole attack

In 2013, a
U.S. Department of Labor The United States Department of Labor (DOL) is one of the executive departments of the U.S. federal government. It is responsible for the administration of federal laws governing occupational safety and health, wage and hour standards, unem ...
server was hacked and used to host malware and redirect some visitors to a site using a zero-day
Internet Explorer Internet Explorer (formerly Microsoft Internet Explorer and Windows Internet Explorer, commonly abbreviated as IE or MSIE) is a deprecation, retired series of graphical user interface, graphical web browsers developed by Microsoft that were u ...
exploit to install a remote access trojan called
Poison Ivy Poison ivy is a type of allergenic plant in the genus '' Toxicodendron'' native to Asia and North America. Formerly considered a single species, '' Toxicodendron radicans'', poison ivies are now generally treated as a complex of three separate s ...
. Watering hole attacks were used, with the attackers creating pages related to toxic nuclear substances overseen by the Department of Energy. The targets were likely DoL and DOE employees with access to sensitive nuclear data.


2011 RSA SecurID phishing attack

In 2011, hackers broke into the сryptographic corporation RSA  and obtained information about SecurID two-factor authentication fobs. Using this data, the hackers later tried to infiltrate the network of defense contractor
Lockheed Martin The Lockheed Martin Corporation is an American Arms industry, defense and aerospace manufacturer with worldwide interests. It was formed by the merger of Lockheed Corporation with Martin Marietta on March 15, 1995. It is headquartered in North ...
. The hackers gained access to the key fob data by sending emails to four employees of the parent corporation from an alleged recruitment site. The emails contained an Excel attachment titled 2011 Recruitment Plan. The spreadsheet contained a zero-day Flash exploit that provided backdoor access to the work computers.


Notable social engineers


Susan Headley

Susan Headley became involved in
phreaking Phreaking is a slang term coined to describe the activity of a culture of people who study, experiment with, or explore telecommunication systems, such as equipment and systems connected to public telephone networks. The term ''phreak'' is a se ...
with
Kevin Mitnick Kevin David Mitnick (August 6, 1963 – July 16, 2023) was an American computer security consultant, author, and convicted hacker. In 1995, he was arrested for various computer and communications-related crimes, and spent five years in prison ...
and Lewis de Payne in
Los Angeles Los Angeles, often referred to by its initials L.A., is the List of municipalities in California, most populous city in the U.S. state of California, and the commercial, Financial District, Los Angeles, financial, and Culture of Los Angeles, ...
, but later framed them for erasing the system files at US Leasing after a falling out, leading to Mitnick's first conviction. She retired to professional poker.


Mike Ridpath

Mike Ridpath is a security consultant, published author, speaker and previous member of w00w00. He is well known for developing techniques and tactics for social engineering through cold calling. He became well known for live demonstrations as well as playing recorded calls after talks where he explained his thought process on what he was doing to get passwords through the phone. As a child, Ridpath was connected with Badir Brothers and was widely known within the
phreaking Phreaking is a slang term coined to describe the activity of a culture of people who study, experiment with, or explore telecommunication systems, such as equipment and systems connected to public telephone networks. The term ''phreak'' is a se ...
and hacking community for his articles with popular underground ezines, such as, Phrack, B4B0 and 9x on modifying Oki 900s, blueboxing, satellite hacking and RCMAC.


Badir Brothers

Brothers Ramy, Muzher, and Shadde Badir—all of whom were blind from birth—managed to set up an extensive phone and computer fraud scheme in
Israel Israel, officially the State of Israel, is a country in West Asia. It Borders of Israel, shares borders with Lebanon to the north, Syria to the north-east, Jordan to the east, Egypt to the south-west, and the Mediterranean Sea to the west. Isr ...
in the 1990s using social engineering, voice impersonation, and Braille-display computers.


Christopher J. Hadnagy

Christopher J. Hadnagy is an American social engineer and information technology security consultant. He is best known as an author of 4 books on social engineering and cyber security and founder of Innocent Lives Foundation, an organization that helps tracking and identifying child trafficking by seeking the assistance of information security specialists, using data from open-source intelligence (OSINT) and collaborating with law enforcement."WTVR:"Protect Your Kids from Online Threats"
/ref>CNN Cable News Network (CNN) is a multinational news organization operating, most notably, a website and a TV channel headquartered in Atlanta. Founded in 1980 by American media proprietor Ted Turner and Reese Schonfeld as a 24-hour cable ne ...
">


See also

* Advance-fee scam *
Phishing Phishing is a form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware. Phishing attacks have become increasingly sophisticate ...
* Pretexting


References


Further reading

* Boyington, Gregory. (1990). 'Baa Baa Black Sheep' Published by Gregory Boyington * Harley, David. 1998
Re-Floating the Titanic: Dealing with Social Engineering Attacks
'' EICAR Conference. * Laribee, Lena. June 2006

' Master's Thesis, Naval Postgraduate School. * Leyden, John. 18 April 2003.
Office workers give away passwords for a cheap pen
'.
The Register ''The Register'' (often also called El Reg) is a British Technology journalism, technology news website co-founded in 1994 by Mike Magee (journalist), Mike Magee and John Lettice. The online newspaper's Nameplate_(publishing), masthead Logo, s ...
. Retrieved 2004-09-09. * Mann, Ian. (2008). ''Hacking the Human: Social Engineering Techniques and Security Countermeasures'' Published by Gower Publishing Ltd. or * Mitnick, Kevin, Kasperavičius, Alexis. (2004). '' CSEPS Course Workbook''. Mitnick Security Publishing. * Mitnick, Kevin, Simon, William L., Wozniak, Steve,. (2002). ''The Art of Deception: Controlling the Human Element of Security'' Published by Wiley. or * Hadnagy, Christopher, (2011) ''Social Engineering: The Art of Human Hacking'' Published by Wiley. * N.J. Evans. (2009). "Information Technology Social Engineering: An Academic Definition and Study of Social Engineering-Analyzing the Human Firewall." Graduate Theses and Dissertations. 10709. https://lib.dr.iastate.edu/etd/10709 * Z. Wang, L. Sun and H. Zhu. (2020) "Defining Social Engineering in Cybersecurity," in IEEE Access, vol. 8, pp. 85094-85115, doi:10.1109/ACCESS.2020.2992807.


External links


Social Engineering Fundamentals
– ''Securityfocus.com''. Retrieved 3 August 2009. *
Should Social Engineering be a part of Penetration Testing?
– ''Darknet.org.uk''. Retrieved 3 August 2009.

Electronic Privacy Information Center The Electronic Privacy Information Center (EPIC) is an independent nonprofit research center established in 1994 to protect privacy, freedom of expression, and democratic values in the information age. Based in Washington, D.C., their mission i ...
''US Committee on Commerce, Science, and Transportation''. Retrieved 8 February 2006. *Plotkin, Hal
Memo to the Press: Pretexting is Already Illegal
Retrieved 9 September 2006. {{DEFAULTSORT:Social Engineering - Information Security Cybercrime Deception