Hacking the Human Operating System

Hacking the Human Operating System

Cover

The prevalence of social engineering in many publicly disclosed cyber attacks suggests there is either an inherent weakness in the ability of victims to distinguish malicious communications or that cyber criminals are using more complex methods to bypass the “human firewall”. 

The truth likely lies somewhere between these two statements, but, regardless of the root cause, we can see that the first line of defence is evidently failing. More importantly, to blame users for breaches is not entirely fair. There are many examples of clearly unsafe user behaviour, but this report will demonstrate that attackers often bypass the consciousness of their targets and attempt to manipulate victims through subconscious influences.

This report will review the concept of social engineering. We will consider the techniques used in recent cyber attacks, as well as the levers to influence victims, communication channels and suggested controls to reduce the risks.

Vendor:
ComputerWeekly.com
Posted:
27 Feb 2017
Published:
27 Feb 2017
Format:
PDF
Length:
20 Page(s)
Type:
Essential Guide
Language:
English
Already a Bitpipe member? Login here

Download this Essential Guide!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.