Social Engineering in United States
Social Engineering
Overview of Social Engineering in relation to cyber crime: [1] Attacks can take place in person, over the phone, through the Internet (including email, instant messaging, and the like), through hard copy correspondence, or through any other means of communication.
Resources
Notes and References
- By Eric Walter
See Also
- Types of Cybercrime
- Cybercriminal
Further Reading
Bangermam, E. (2006, December 11). Congress outlaws pretexting. Available on the Ars Technica Web site: http://arstechnica.com/news.ars/post/ 20061211-8395.html; McQuade, S.C. (2006). Understanding and managing cybercrime. Boston: Allyn & Bacon; FTC. (2006). Pretexting: Your personal information revealed. Federal Trade Commission Web site: http://www.ftc.gov/bcp/conline/pubs/ credit/pretext.shtm; Mitnick, K., Simon, W. L., & Wozniak, S. (2002). The art of deception: Controlling the human element of security. New York: John Wiley & Sons.
Leave a Reply