{"title":"Social Engineering: Concepts and Solutions","authors":"Thomas R. Peltier","doi":"10.1201/1086.1065898X/46353.15.4.20060901/95427.3","DOIUrl":null,"url":null,"abstract":"Abstract Social engineering attacks are usually conducted by outsiders who use a variety of psychological tricks to get the computer user to give them the information they need to access a computer or network. Do not be confused about the concept of “outsiders.” Although the true outside hackers get the headlines, the far more prevalent form of social engineering is conducted by one employee on another employee.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2006-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Systems Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1201/1086.1065898X/46353.15.4.20060901/95427.3","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Social Sciences","Score":null,"Total":0}
引用次数: 9
Abstract
Abstract Social engineering attacks are usually conducted by outsiders who use a variety of psychological tricks to get the computer user to give them the information they need to access a computer or network. Do not be confused about the concept of “outsiders.” Although the true outside hackers get the headlines, the far more prevalent form of social engineering is conducted by one employee on another employee.