The Dynamics of Social Engineering and Cybercrime in the Digital Age

Author(s):  
Nabie Y. Conteh ◽  
DeAngela “Dee” Sword

Social engineering attacks have emerged to become one of the most problematic tactics used against businesses today. Social engineers employ both human-based and computer-based tactics to successfully compromise their targeted networks. This chapter will discuss the basics of social engineering and what it means today. It will explain some common attack methods like baiting, phishing, pretexting, quid pro quo, tailgating, and dumpster diving. It will then highlight the impact social engineering has had on the rise in cybercrime and why threat actors have grown more innovative. Finally, this chapter will discuss what multi-layer defense or defense in depth is and offer countermeasures that can be enforced to defend against social engineering attacks.

1997 ◽  
Author(s):  
Walter G. Albert ◽  
Winston Bennett ◽  
Kenneth Pemberton ◽  
Charles Holt ◽  
Pat Waldroop

2020 ◽  
Vol 2 (5) ◽  
pp. 115-119
Author(s):  
M. V. SAVINA ◽  
◽  
A. A. STEPANOV ◽  
I.A. STEPANOV ◽  
◽  
...  

The article highlights the problems of the impact of "digitalization" of society on the formation and transformation of human capital, and above all, the development of new competencies, knowledge and skills. The main components of human capital in the modern era, the features of the formal and informal educational process are clarified and disclosed. The necessity of minimizing the precariat class is proved. The main directions of qualitative improvement of human capital adequate to the challenges of the digital age and globalization are defined.


2019 ◽  
Vol 24 ◽  
Author(s):  
R. Egan ◽  
S. Cartagena ◽  
R. Mohamed ◽  
V. Gosrani ◽  
J. Grewal ◽  
...  

AbstractCyber Operational Risk: Cyber risk is routinely cited as one of the most important sources of operational risks facing organisations today, in various publications and surveys. Further, in recent years, cyber risk has entered the public conscience through highly publicised events involving affected UK organisations such as TalkTalk, Morrisons and the NHS. Regulators and legislators are increasing their focus on this topic, with General Data Protection Regulation (“GDPR”) a notable example of this. Risk actuaries and other risk management professionals at insurance companies therefore need to have a robust assessment of the potential losses stemming from cyber risk that their organisations may face. They should be able to do this as part of an overall risk management framework and be able to demonstrate this to stakeholders such as regulators and shareholders. Given that cyber risks are still very much new territory for insurers and there is no commonly accepted practice, this paper describes a proposed framework in which to perform such an assessment. As part of this, we leverage two existing frameworks – the Chief Risk Officer (“CRO”) Forum cyber incident taxonomy, and the National Institute of Standards and Technology (“NIST”) framework – to describe the taxonomy of a cyber incident, and the relevant cyber security and risk mitigation items for the incident in question, respectively.Summary of Results: Three detailed scenarios have been investigated by the working party:∙Employee leaks data at a general (non-life) insurer: Internal attack through social engineering, causing large compensation costs and regulatory fines, driving a 1 in 200 loss of £210.5m (c. 2% of annual revenue).∙Cyber extortion at a life insurer: External attack through social engineering, causing large business interruption and reputational damage, driving a 1 in 200 loss of £179.5m (c. 6% of annual revenue).∙Motor insurer telematics device hack: External attack through software vulnerabilities, causing large remediation / device replacement costs, driving a 1 in 200 loss of £70.0m (c. 18% of annual revenue).Limitations: The following sets out key limitations of the work set out in this paper:∙While the presented scenarios are deemed material at this point in time, the threat landscape moves fast and could render specific narratives and calibrations obsolete within a short-time frame.∙There is a lack of historical data to base certain scenarios on and therefore a high level of subjectivity is used to calibrate them.∙No attempt has been made to make an allowance for seasonality of renewals (a cyber event coinciding with peak renewal season could exacerbate cost impacts)∙No consideration has been given to the impact of the event on the share price of the company.∙Correlation with other risk types has not been explicitly considered.Conclusions: Cyber risk is a very real threat and should not be ignored or treated lightly in operational risk frameworks, as it has the potential to threaten the ongoing viability of an organisation. Risk managers and capital actuaries should be aware of the various sources of cyber risk and the potential impacts to ensure that the business is sufficiently prepared for such an event. When it comes to quantifying the impact of cyber risk on the operations of an insurer there are significant challenges. Not least that the threat landscape is ever changing and there is a lack of historical experience to base assumptions off. Given this uncertainty, this paper sets out a framework upon which readers can bring consistency to the way scenarios are developed over time. It provides a common taxonomy to ensure that key aspects of cyber risk are considered and sets out examples of how to implement the framework. It is critical that insurers endeavour to understand cyber risk better and look to refine assumptions over time as new information is received. In addition to ensuring that sufficient capital is being held for key operational risks, the investment in understanding cyber risk now will help to educate senior management and could have benefits through influencing internal cyber security capabilities.


2021 ◽  
Vol 47 (3) ◽  
pp. 336-354
Author(s):  
Kiron Chatterjee ◽  
Fiona Crawford

The nature of work was undergoing dramatic change before the pandemic as the digital age continued to transform all sectors of society. In this paper we describe pre-pandemic trends in types of work, the workforce and working arrangements in the UK. We show how these changes were having gradual yet significant impacts on commuting and other work-related travel which were apparent in national travel data series. Key features of these impacts were increasing diversification and flexibility in work travel. We bring together findings on how working practices and travel have been altered by the pandemic and report expectations and opinions on its longer-term legacies. The pandemic has accelerated pre-pandemic trends and led to a shift in how work is performed for almost all sectors of the economy – but grasping the opportunity for this to contribute to deep carbon reductions from transport and to improve equity and health outcomes will require carefully directed policy interventions.


2021 ◽  
Author(s):  
Natal'ya Povetkina ◽  
Ekaterina Kudryashova

The work is aimed at forming a systematic theoretical and practical approach to the development of financial literacy in the format of sustainable development in the age of the digital revolution. The authors address the current issues of the evolution of the development and legal identification of financial literacy, consider it in the context of human rights and sustainable development of the state. Special attention is paid to the analysis of the impact of financial literacy on the successful fight against poverty. For researchers, practicing lawyers and economists, state and municipal employees, teachers, postgraduates, students of law and economics universities and faculties.


Author(s):  
Brad J. Sagarin ◽  
Mary Lynn Miller Henningsen

This chapter reviews research on resistance to influence, active or passive processes that reduce the impact of a potential source of social influence. This chapter begins with a discussion of the antecedents of resistance: characteristics of the influence target (strong attitudes, demographics, and personality), perceived aspects of the influence attempt (manipulative intent, threats to freedoms), or counterinfluence messages from a third party (forewarning, inoculation, stealing thunder, the poison parasite defense, resistance to social engineering) that motivate resistance. The chapter proceeds to a discussion of internal mechanisms of resistance (counterarguing, bolstering initial attitudes, derogating the source, attributing negative affect to the message or source, attempting to correct for bias) and external mechanisms of resistance (interpersonal strategies of communicating resistance and issuing refusals) and concludes with a discussion of the consequences of resistance for attitudes and relationships.


2019 ◽  
Vol 26 (2) ◽  
pp. 911-924
Author(s):  
Mark J Rapoport ◽  
Carla Zucchero Sarracini ◽  
Benoit M Mulsant ◽  
Dallas P Seitz ◽  
Frank Molnar ◽  
...  

Clinicians face challenges in deciding which older patients with dementia to report to transportation administrators. This study used a qualitative thematic analysis to understand the utility and limitations of implementing a computer-based Driving in Dementia Decision Tool in clinical practice. Thirteen physicians and eight nurse practitioners participated in an interview to discuss their experience using the tool. While many participants felt the tool provided a useful ‘virtual second opinion’, specialist physicians felt that the tool did not add value to their clinical practice. Barriers to using the Driving in Dementia Decision Tool included lack of integration with electronic medical records and inability to capture certain contextual nuances. Opinions varied about the impact of the tool on the relationship of clinicians with patients and their families. The Driving in Dementia Decision Tool was judged most useful by nurse practitioners and least useful by specialist physicians. This work highlights the importance of tailoring knowledge translation interventions to particular practices.


2018 ◽  
Vol 3 (2) ◽  
pp. 160
Author(s):  
Meri Chrismes Aruan ◽  
Luh Putu Widya Adnyani

The development and progress of IT-based information technology is very rapidly developing and has a very important role. Information systems are a necessity for agencies to utilize information as a basis for data administration and processing. To meet these needs, the agency conducts activities related to computer-based information systems as a tool to increase employee creativity. This system is designed to handle the transaction of escort and payment salary calculations and can guarantee validiity, complete authorization, classification of assessments, timeliness of each payroll transaction. In the Middle School Nusantara Wisata Respati Middle School still uses a manual payroll system, which is Microsoft Excel, so that people who are not authorized to enter and view data and can change the impact will disrupt the activity in processing salary data. For this reason, it is necessary to design a Java-based payroll information system at the Respati Archipelago Tourism Middle School.


Sign in / Sign up

Export Citation Format

Share Document