Authors
Kristian Beckers, Leanid Krautsevich, Artsiom Yautsiukhin
Publication date
2014/9/10
Book
International Workshop on Data Privacy Management
Pages
216-232
Publisher
Springer International Publishing
Description
Social engineering is the acquisition of information about computer systems by methods that deeply include non-technical means. While technical security of most critical systems is high, the systems remain vulnerable to attacks from social engineers. Social engineering is a technique that: (i) does not require any (advanced) technical tools, (ii) can be used by anyone, (iii) is cheap.
While some research exists for classifying and analysing social engineering attacks, the integration of social engineering attackers with other attackers such as software or network ones is missing so far. In this paper, we propose to consider social engineering exploits together with technical vulnerabilities. We introduce a method for the integration of social engineering exploits into attack graphs and propose a simple quantitative analysis of the graphs that helps to develop a comprehensive defensive strategy.
Total citations
2014201520162017201820192020202120222023202415252536332
Scholar articles
K Beckers, L Krautsevich, A Yautsiukhin - International Workshop on Data Privacy Management, 2014