Skip to main content


Social Engineering And Influence


As technology matures, new threats rise and take the place of the “traditional” issues (insecure infrastructure, insecurely developed software, etc.), threats that revolve around exploiting human vulnerabilities instead of technical vulnerabilities. One of the most famous threats that have risen in the area of Information Security is Social Engineering.The goal of this study is to take an interpretive approach on Social Engineering, by using Cialdini’s principles of influence.


In order to be able to interpret the attacks, the study examines documented attacks (by Kevin Mitnick), abstracts them, categorizes them into four main categories (Gain Physical Access, Install Malware, Information Extraction, Perform an Action), models them by graphically depicting the execution path of the attack and finally interprets how the victims were influenced (or manipulated) to assist the attacker(s).

This study is executed using the Literature Review methodology, following the eight steps proposed by Okoli. During the execution of the study the author examines the principles of Influence, Social Engineering models and additional psychological principles used in Social Engineering.

The author, based on the findings in the literature, creates Social Engineering attack models and interprets the findings.The importance of the study is that it explains how the well-known principles of Influence are used in Social Engineering attacks.

The psychological findings and the models created lead the author to believe that there is a possibility for them to be used as a framework for solving Social Engineering attacks.

Today, more than ever, security threats and security risks are an important area of every organization’s practices, independent of the field the organization is targeting. Most (or all) of the security risks have already been identified so far, and have been addressed by one (or combination) of the following approaches: technology, policy, or education (training).


File Type: PDF
File Size: 2.29 MB

Direct Link Mega:
Download Now
Direct Link AnonFiles:
Download Now
Direct Link Mediafire:
Download Now
Direct Link Solidfiles:
Download Now
Direct Link Sabercathost:
Download Now
Direct Link Tusfiles:
Download Now

Comments

Popular posts from this blog

Web Hacking 101

With a Foreword written by HackerOne Co-Founders Michiel Prins and Jobert Abma, Web Hacking 101 is about the ethical exploration of software for security issues but learning to hack isn't always easy. With few exceptions, existing books are overly technical, only dedicate a single chapter to website vulnerabilities or don't include any real world examples. This book is different. Using publicly disclosed vulnerabilities, Web Hacking 101 explains common web vulnerabilities and will show you how to start finding vulnerabilities and collecting bounties.

High Performance Cloud Auditing

This eBook mainly focuses on cloud security and high performance computing for cloud auditing. The eBook discusses emerging challenges and techniques developed for high performance semantic cloud auditing, and presents the state of the art in cloud auditing, computing and security techniques with focus on technical aspects and feasibility of auditing issues in federated cloud computing environments.

Hack-X-Crypt (By Ujjwal Sahay)

This is basically a straight forward guide towards ethical hacking and cyber security.Computer hacking is the practice of altering computer hardware and software to carry out a goal outside of the creator‘s original intention. People who slot in computer hacking actions and activities are often entitled as hackers. The majority of people assume that hackers are computer criminals. They fall short to identify the fact that criminals and hackers are two entirely unrelated things.