Digital Social Engineering Attacks

Contributed by Christopher Hovis
This paper will look at how social engineers exploit human vulnerabilities through digital social engineering attacks and how those attacks can affect the confidentiality, integrity, and accessibility of information and computer systems. Social engineering attacks are propagated by malicious links, spoofing websites, SMS text, or pop-up windows that ask for sensitive information or infect the target’s computer with malware for use in a later attack. This paper will define the types of human vulnerabilities that are exploited during a social engineering attack and define and discuss the most used attack techniques that are carried out by social engineers in the attempt to collect a target’s information, gain access to their systems, or prevent them from accessing their systems or devices.
This document is in PDF format. To view it click here.
 
 
 

Rate this article: 
No votes yet