Effects of Digital Convergence on Social Engineering Attack Channels

2010 ◽  
pp. 1764-1777
Author(s):  
Bogdan Hoanca ◽  
Kenrick Mock

Social engineering refers to the practice of manipulating people to divulge confidential information that can then be used to compromise an information system. In many cases, people, not technology, form the weakest link in the security of an information system. This chapter discusses the problem of social engineering and then examines new social engineering threats that arise as voice, data, and video networks converge. In particular, converged networks give the social engineer multiple channels of attack to influence a user and compromise a system. On the other hand, these networks also support new tools that can help combat social engineering. However, no tool can substitute for educational efforts that make users aware of the problem of social engineering and policies that must be followed to prevent social engineering from occurring.

Author(s):  
Bogdan Hoanca

Social engineering refers to the practice of manipulating people to divulge confidential information that can then be used to compromise an information system. In many cases, people, not technology, form the weakest link in the security of an information system. This chapter discusses the problem of social engineering and then examines new social engineering threats that arise as voice, data, and video networks converge. In particular, converged networks give the social engineer multiple channels of attack to influence a user and compromise a system. On the other hand, these networks also support new tools that can help combat social engineering. However, no tool can substitute for educational efforts that make users aware of the problem of social engineering and policies that must be followed to prevent social engineering from occurring.


2010 ◽  
pp. 1282-1296
Author(s):  
Bogdan Hoanca

Social engineering refers to the practice of manipulating people to divulge confidential information that can then be used to compromise an information system. In many cases, people, not technology, form the weakest link in the security of an information system. This chapter discusses the problem of social engineering and then examines new social engineering threats that arise as voice, data, and video networks converge. In particular, converged networks give the social engineer multiple channels of attack to influence a user and compromise a system. On the other hand, these networks also support new tools that can help combat social engineering. However, no tool can substitute for educational efforts that make users aware of the problem of social engineering and policies that must be followed to prevent social engineering from occurring.


2014 ◽  
Vol 4 (3) ◽  
pp. 198-209 ◽  
Author(s):  
Ann-Marie Kennedy ◽  
Andrew Parsons

Purpose – The aim of this article is to explore how social engineering and social marketing are connected, and how social marketing is a tool used to achieve adherence to social engineering. Design/methodology/approach – Through examination of contemporary and historical thinking around social marketing, we present a conceptual argument that social marketing is another tool of the social engineer, and that social engineering, through methods such as social marketing, is pervasive throughout all societies in positive ways. Findings – We develop a conceptual model of social engineering and social marketing, which goes beyond behaviour change to incorporate the essentials of society and the influencers of those essentials. In doing so, we show that social marketing influenced behaviour lies within the social engineering influenced laws, codes and norms of society, which in turn lie within the morals, values and beliefs of society. Originality/value – This article provides for the first time a conceptual grounding of social marketing within social engineering, enabling academics and practitioners to contextualise social marketing activities in a broader societal framework.


2022 ◽  
Vol 14 (1) ◽  
pp. 1-26
Author(s):  
Louay Karadsheh ◽  
Haroun Alryalat ◽  
Ja'far Alqatawna ◽  
Samer Fawaz Alhawari ◽  
Mufleh Amin AL Jarrah

The objective of this paper is to examine a model to identify Social Engineer Attack Phases to improve the security countermeasures by Social-Engineer Involvement. A questionnaire was developed and distributed to a sample of 243 respondents who were actively engaged in 3 Jordanian telecommunication companies. All hypotheses were tested using (PLS-SEM). The results of the study indicate that Social Engineer Attack Phases (Identification the potential target, Target Recognition, Decision approach, and Execution) have a partially mediate and significant impact on improving the security countermeasures by Social-Engineer Involvement. On the other hand, the Social Engineer Attack Phases (Information Aggregations, Analysis and Interpretation, Armament, and Influencing) have a fully mediate and significant impact on improving the security countermeasures by Social-Engineer Involvement. The findings of this study help to provide deep insight to help security professionals prepare better and implement the right and appropriate countermeasures, whether technical or soft measures.


2006 ◽  
pp. 109-147 ◽  
Author(s):  
Robert Biel

This article considers capitalism as a dissipative system, developing at the expense of exporting disorder into two sorts of ‘environment’: the physical ecosystem; and a subordinate area of society which serves to nourish mainstream order without experiencing its benefits. Particularly significant is the relationship between the two forms of dissipation. The paper begins by assessing the dangers of translating systems theory into social relations, concluding that the project is nevertheless worthwhile, provided that exploitation and struggle are constantly borne in mind. Exploring the concepts of ‘core’ and ‘periphery,’ the paper highlights the contradictory nature of an attribute of chaos which is both ascribed to the out-group, and also really exported to it. If the core’s growth merely destroyed peripheral order, the entropy of capitalism would be starkly exposed in the form of an exhaustion of future room for maneuver. This problem can be kept at bay by maintaining a self-reproducing ‘low’ order within the subordinate social system; however the fundamental entropy is still there, and will sooner or later manifest itself in the shape of threats to the sustainability of that subordinate system. At the level of the international political economy (IPE), this dialectic unfolds against the background of a ‘lumpy’ development whereby (following structural crises) order can be reconstituted, but at a cost which must be absorbed somewhere. In the case of the post-World War II reordering, this cost was massively exported to the physical environment. Since a high level of ecological depletion now appears permanently embedded within the capitalist IPE, future major efforts of order-building cannot rely on this dimension to the same degree, and must instead access some new forms of dissipative relationship with the social environment. The paper argues that this is the fundamental significance of the ‘sustainable development’ discourse: it brings together the physical and social environments into a single approach, where substitution between one and the other can be experimented. To some extent, the social environment can be treated as ‘fuel,’ and contemporary management sys-tems are noteworthy for exploring the access to an added value through the self-exploitation of small producers, realized through emergent process such as production chains. But ultimately, the ‘fuel’ definition cannot be separated from the other definition of dissipa-tion, the export of disorder; and this must be managed somehow. The dominant interests respond by means of social engineering in the periphery, for example by pushing the sustainability notion in the direction of social development theories like ‘sustainable livelihoods.’ Most immediately the problem appears in the form of purely negative phenomena: namely unmanageable levels of poverty and conflict. But there is another issue, even more threatening to the capitalist order, but hopeful for those critical of it: the increasing likelihood of unco-opted forms of emergent social order.


2017 ◽  
Vol 1 (2) ◽  
pp. 129-141
Author(s):  
Yayuk Kusumawati

In the social life, there is circulation life which change quickly and slowly, so the system of law in Indonesia should be adjusted unnamed conservative. To answer that challenge, needed the social engineering in the social life to fulfill their goals. Social engineering presented to solve problem in social life. Principle, fungtion of the low to be able to change the symbol or method in social life, it can make the habitual  become strong or  more loyalited and may be the other habitual which happen in social life. That condition, such as deleted the habitual which not match to social need or create new habitual which though more benefit and kindness than before. Refer to the dynamic social circulation, the changing is a necessary. In this term, fungtion of the low must be maximalized for justice and peace, it is mean to social wealth


Author(s):  
Nabie Y. Conteh ◽  
Malcolm D. Royer

This chapter is primarily intended to firstly define and review the literature in cybersecurity and vividly shed light on the mechanisms involved in the social engineering phenomenon. It will discuss the various attempts at network intrusion and the steps typically taken in the implementation of cyber-thefts. The chapter will provide the rationale behind the justification of why humans are considered to be the weakest link in these attacks. The study will also explain the reasons for the rise in cybercrimes and their impact on organizations. In closing, the chapter will put forward some recommendations to serve as preventative measures and solutions to the threats and vulnerabilities posed by cyber-attacks. Finally, measures, such as conducting regular, thorough, and relevant awareness training, frequent drills, and realistic tests, will be addressed with a view to maintaining a steady focus on the overall discipline of the organization, thereby hardening the component of the network that is the softest by nature—the human vulnerability factor.


2011 ◽  
Vol 4 (1) ◽  
pp. 147-168 ◽  
Author(s):  
Ma Ran

The state-sanctioned Shanghai International Film Festival (SIFF) is the only film festival accredited by the Fédération Internationale des Associations de Producteurs de Films (FIAPF) in the Greater China region. This paper intends to explore the perceived paradoxes of the SIFF by approaching its vaguely defined vision of “being international/internationalization” (or guojihua). The vision of guojihua has, at best, fuelled the persistent efforts of the SIFF to emulate the globally standardized festival framework and redirect the global capital flow into its newly installed film market. On the other hand, the SIFF has been reluctant to use one of its most precious cultural legacies – the cosmopolitanism of the Republican era – as a branding resource. The main argument is that the weakened connection between the SIFF and its locality/cultural memory is not only a result of the superficial understanding of guojihua, but also of the fact that the central and the local government often hold conflicting ideas regarding the social engineering of Shanghai’s image.


Etyka ◽  
1973 ◽  
Vol 12 ◽  
pp. 79-94
Author(s):  
Janusz Goćkowski

As a specific type of operational behaviour intended to furnish solutions of social problems social engineering functions in virtue of certain moral norms and evaluations. The directives and methods of social engineering are conceived and applied in accordance with a moral point of view held by the social engineer. This moral point of view, with its characteristic values, goals, norms and evaluations, influences the selection of the ways and means that he makes to realize his project. The social engineer is both a specialist who designs and applies certain norms, and a moralist who identifies, explains and justifies the motives and objectives underlying them. The directives of the adherent to a moral system and those of the engineer with a certain professional specialization constitute independent variables in his mind.


Author(s):  
B. Bhagyavati

This chapter will present a detailed view of social engineering and why it is important for users to beware of hackers using this technique. What social engineering is, what techniques can be employed by social engineers and what kinds of information can be gathered by these techniques will form the core of the chapter. We will also present case studies of notorious social engineers such as Kevin Mitnick. Different modes of social engineering attacks will be described. Such attacks could occur in person, via the telephone, or via the Internet. An in depth presentation of the consequences of a successful social engineering attack will be presented. A series of steps users can take in order to avoid becoming a victim of the social engineer are explored, along with examples. We will also present strategies for training employees and users so that there is minimal risk of a successful social engineering attack. Finally, we caution against ignoring the training and awareness program for front-line employees such as secretaries. Since social engineers often try to bypass front-line employees, there is a critical need to train frontliners to recognize and repel such attacks.


Sign in / Sign up

Export Citation Format

Share Document