Development of methodical social engineering taxonomy project

Download
Author
Laribee, Lena
Date
2006-06Advisor
Martell, Craig H.
Rowe, Neil C.
Metadata
Show full item recordAbstract
Since security is based on trust in authenticity as well as trust in protection, the weakest link in the security chain is often between the keyboard and chair. We have a natural human willingness to accept someone at his or her word. Attacking computer systems via information gained from social interactions is a form of social engineering. Attackers know how much easier it is to trick insiders instead of targeting the complex technological protections of systems. In an effort to formalize social engineering, we are building two models: Trust and Attack. Because social-engineering attacks are complex and typically require multiple visits and targets, these two models can be applied, individually or together, at various times to each individual attack goal.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. As such, it is in the public domain, and under the provisions of Title 17, United States Code, Section 105, is not copyrighted in the U.S.Collections
Related items
Showing items related by title, author, creator and subject.
-
Homeland Security Affairs Journal, Volume II - 2006: Issue 2, July
Naval Postgraduate School Center for Homeland Defense and Security (CHDS) (Monterey, California. Naval Postgraduate SchoolCenter for Homeland Defense and Security, 2006-07);July 2006. The July 2006 issue of Homeland Security Affairs offers articles about risk perception, domestic right wing extremist groups, social network analysis, and the impact of foreign policy on homeland security. It ... -
SOCIAL MEDIA IN VENEZUELA: A TOOL FOR AUTHORITARIANS, A BOOST TO SOCIAL MOVEMENTS, OR BOTH?
Beaton, Amelia C. (Monterey, CA; Naval Postgraduate School, 2021-12);Various social media platforms have been used as tools by social movements and have propelled democratic ideals. Social media has also been used by autocratic leaders to control and repress populations. Both uses of social ... -
The relevance of social policies for democracy: preventing autocratisation through synergies between SDG 10 and SDG 16
Leininger, Julia; Lührmann, Anna; Sigman, Rachel (Leibniz Information Centre for Economics, 2019-07);Global threats to democracy – one of the world’s most important forms of inclusive governance – have been rising recently. This paper assesses the effects of social and economic inequalities on autocratisation, meaning a ...