The cycle of deception - a model of social engineering attacks, defenses and victims
نویسندگان
چکیده
In this paper we propose a model for describing deceptive crimes in general and social engineering in particular. Our research approach was naïve inductivist and the methods used were literature study and interviews with the lead investigator in a grooming case, as we see many similarities between the techniques used in grooming, and those used in social engineering. From this we create cycles describing attacker, defender, and the victim and merge them into a model describing the cycle of deception. The model is then extended into a possible deception sphere. The resulting models can be used to educate about social engineering, to create automated social engineering attacks, to facilitate better incident reporting, and to understand the impact and economical aspects of defenses.
منابع مشابه
A Novel Trust Management Model in the Social Internet of Things
The Internet of Things (IoT) and social networking integration, create a new concept named Social Internet of Things (SIoT) according to which the things are able to autonomously establish social relationships with regard to the owners. Things in SIoT operate according to a service-oriented architecture. There may be misbehaving owners and consequently misbehaving devices that can perform harmf...
متن کاملAn Analytical Investigation of the Impact of Social and Cultural Factors on the Modeling of Western Patterns in Isfahan City from the Perspective of Victims and Providing Solutions to Coping )Presentation of Cultural Engineering Model(
This study investigates the impact of social and cultural factors on the patterning of western patterns in Isfahan city and presents some strategies to deal with it. The objectives of this study were: 1- Determining the effect of social and cultural factors on the patterning of Western models from the perspective of the children of martyrs and victims; 4) Determining the difference between the ...
متن کاملAndroid UI Deception Revisited: Attacks and Defenses
App-based deception attacks are increasingly a problem on mobile devices and they are used to steal passwords, credit card numbers, text messages, etc. Current versions of Android are susceptible to these attacks. Recently, Bianchi et al. proposed a novel solution “What the App is That” that included a host-based system to identify apps to users via a security indicator and help assure them tha...
متن کاملAdaptations for Exploitation
Human groups contain reproductively relevant resources that differ greatly in their ease of accessibility. The authors advance a conceptual framework for the study of 2 classes of adaptations that have been virtually unexplored: (a) adaptations for exploitation designed to expropriate the resources of others through deception, manipulation, coercion, intimidation, terrorization, and force and (...
متن کاملDetecting Targeted Attacks by Multilayer Deception
Over the past few years, enterprises are facing a growing number of highly customized and targeted attacks that use sophisticated techniques and seek after important company assets, such as customer data and intellectual property. Unlike conventional attacks, targeted attacks are operated by experts who use multiple steps to gain access to sensitive assets, and most of time, leave very few netw...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008