CHAPTER 19

SOCIAL ENGINEERING AND LOW-TECH ATTACKS

Karthik Raman, Susan Baumes, Kevin Beets, and Carl Ness

19.1 INTRODUCTION

19.2 BACKGROUND AND HISTORY

19.2.1 Frank Abagnale

19.2.2 Kevin Mitnick and the Media

19.2.3 Frequency of Use

19.2.4 Social Engineering as a Portion of an Attack

19.3 SOCIAL ENGINEERING METHODS

19.3.1 Impersonation

19.3.2 Seduction

19.3.3 Low-Tech Attacks

19.3.4 Network and Voice Methods

19.3.5 Reverse Social Engineering

19.4 PSYCHOLOGY AND SOCIAL PSYCHOLOGY OF SOCIAL ENGINEERING

19.4.1 Psychology

19.4.2 Social Psychology

19.4.3 Social Engineer Profile

19.5 DANGERS OF SOCIAL ENGINEERING AND ITS IMPACT ON BUSINESSES

19.5.1 Consequences

19.5.2 Case Study Examples from Business

19.5.3 Success Rate

19.5.4 Small Businesses versus Large Organizations

19.5.5 Trends

19.6 DETECTION

19.6.1 People

19.6.2 Audit Controls

19.6.3 Technology for Detection

19.7 RESPONSE

19.8 DEFENSE AND MITIGATION

19.8.1 Training and Awareness

19.8.2 Technology for Prevention

19.8.3 Physical Security

19.9 CONCLUSION

19.10 FURTHER READING

19.11 NOTES

19.1 INTRODUCTION.

According to Greek mythology, the Greeks defeated the Trojans in the Trojan War with the help of a wooden statue. After fighting a decade-long war in vain, the Greeks withdrew from their stronghold on the beach. Outside the gates of Troy, they left a giant wooden horse. The statue confused the Trojan soldiers, but it was brought within the fortified walls of Troy. Inside the statue hid several Greek soldiers. When darkness fell, ...

Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.