Peer Reviewed

Social Engineering

This article outlines the threats posed by social engineering attacks, and the role they play in cyber-attacks and cyber security. It defines social engineering and describes some of the techniques and methods used by real-world adversaries. Several case studies are included, covering various types of phishing attack, telephone-based social engineering and in-person, or physical attacks. This article also describes some common steps that organisations can take to reduce the risks posed by social engineering.

Go to the profile of Owen Wright
Oct 21, 2016
3
0

Please sign in or register for FREE

Register to E&T Cyber Security Hub

E&T Cyber Security Hub brings together engineers and cyber security specialists to share practical know-how. With content created ‘by engineers, for engineers,’ it provides peer-reviewed technical information, real-world insights, lessons learnt and case studies, as well as tools for networking and knowledge-sharing, profiles of experts and the opportunity for companies to showcase their expertise.

Register

No comments yet.