首页 | 本学科首页   官方微博 | 高级检索  
     


On the anatomy of social engineering attacks—A literature‐based dissection of successful attacks
Authors:Jan‐Willem Hendrik Bullée  Lorena Montoya  Wolter Pieters  Marianne Junger  Pieter Hartel
Affiliation:1. Services, Cyber‐security, and Safety Group (SCS), Faculty of EEMCS, University of Twente, Enschede, The Netherlands;2. Faculty of Technology, Policy and Management;3. Faculty of Faculteit Behavioural, Management and Social Sciences, University of Twente, 7500 AE Enschede;4. Faculty of Electrical Engineering, Mathematics and Computer Science, Delft University of Technology, P.O. Box 5031 2600 GA Delft
Abstract:The aim of this study was to explore the extent to which persuasion principles are used in successful social engineering attacks. Seventy‐four scenarios were extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenario was split into attack steps, containing single interactions between offender and target. For each attack step, persuasion principles were identified. The main findings are that (a) persuasion principles are often used in social engineering attacks, (b) authority (1 of the 6 persuasion principles) is used considerably more often than others, and (c) single‐principle attack steps occur more often than multiple‐principle ones. The social engineers identified in the scenarios more often used persuasion principles compared to other social influences. The scenario analysis illustrates how to exploit the human element in security. The findings support the view that security mechanisms should include not only technical but also social countermeasures.
Keywords:deception  information security  literature study  persuasion  social engineering
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号