Social Engineering

Social Engineering in United States

Social Engineering

Overview of Social Engineering in relation to cyber crime: [1] Attacks can take place in person, over the phone, through the Internet (including email, instant messaging, and the like), through hard copy correspondence, or through any other means of communication.

Resources

Notes and References

  1. By Eric Walter

See Also

  • Types of Cybercrime
  • Cybercriminal

Further Reading

Bangermam, E. (2006, December 11). Congress outlaws pretexting. Available on the Ars Technica Web site: http://arstechnica.com/news.ars/post/ 20061211-8395.html; McQuade, S.C. (2006). Understanding and managing cybercrime. Boston: Allyn & Bacon; FTC. (2006). Pretexting: Your personal information revealed. Federal Trade Commission Web site: http://www.ftc.gov/bcp/conline/pubs/ credit/pretext.shtm; Mitnick, K., Simon, W. L., & Wozniak, S. (2002). The art of deception: Controlling the human element of security. New York: John Wiley & Sons.


Posted

in

,

by

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *