Spelling suggestions: "subject:"cocial engineering"" "subject:"cocial ingineering""
1 |
Identity theft prevention in CyberCIEGERuppar, Carrie Aliene 12 1900 (has links)
The increase in online activities which involve peopleâ s identification information means that identity theft has become a widespread computer security issue. Identity theft is defined as the misuse of personal information and identity. To address this problem, an Information Assurance training tool, such as CyberCIEGE, can be used for user awareness and education. This thesis incorporated current research on identity theft attacks and prevention techniques into a customized scenario definition file for the CyberCIEGE game engine. The scenario teaches players about methods of identity theft prevention in computing and networked environments by focusing on four main prevention techniques: updating antivirus protection regularly, being cautious about executable email attachments, resisting phishing attacks, and using secure web browser connections for online transactions. After scenario development, an informal test process of the Identity Theft scenario was conducted. Testing found that the experienced and expected results coincided. Recommendations for improvement of the CyberCIEGE game engine, Scenario Definition Tool, and Identity Theft scenario were also provided.
|
2 |
Development of methodical social engineering taxonomy projectLaribee, Lena 06 1900 (has links)
Since security is based on trust in authenticity as well as trust in protection, the weakest link in the security chain is often between the keyboard and chair. We have a natural human willingness to accept someone at his or her word. Attacking computer systems via information gained from social interactions is a form of social engineering. Attackers know how much easier it is to trick insiders instead of targeting the complex technological protections of systems. In an effort to formalize social engineering, we are building two models: Trust and Attack. Because social-engineering attacks are complex and typically require multiple visits and targets, these two models can be applied, individually or together, at various times to each individual attack goal. / US Air Force (USAF) author.
|
3 |
Social Ingenjörskonst : En studie i modern IT-brottslighetHjorth, Elin January 2012 (has links)
Social ingenjörskonst är ett stort hot mot informationssäkerhet. Den här uppsatsen undersöker hur en attack går till, vilka som utgör hotet och vilka som utgör måltavlor, samt hur attackerna kan förebyggas. Hackaren framställs ofta som en ung man som drivs av nyfikenhet och får kickar av att manipulera och stjäla information. Den sociala ingenjören besitter även förmågan att manipulera människor på ett sätt som den traditionella hackaren saknar. Många spelar på mottagarens medkänsla, tacksamhet, lojalitet eller respekt för auktoriteter för att vinna förtroende. I takt med att den tekniska säkerhet förstärks är det troligt att fler väljer att använda människor istället för tekniken när de utför en attack. Många företag använder tekniska lösningar för att förhindra angrepp, men man glömmer ofta att teknisk säkerhet är verkningslös om den används fel av personalen. Eftersom den sociala ingenjörens måltavla ofta är den som inte utbildats i säkerhetsmedvetande, måste alla i personalen utbildas.
|
4 |
Social Engineering der Mensch als Sicherheitsrisiko in der ITLipski, Marcus January 2009 (has links)
Zugl.: Darmstadt, Private FernFachhochsch., Diplomarbeit, 2009
|
5 |
The making of modern Malaysia's educational policy as a social engineering strategy designed to bring about an ideal Bangsa MalaysiaIp, Po-chu. January 1999 (has links)
Thesis (M.A.)--University of Leicester in association with The University of Hong Kong, 1999. / Includes bibliographical references (leaves 101-105) Also available in print.
|
6 |
A defense-in-depth approach to phishingBarnes, David S. 09 1900 (has links)
Phishing is a form of crime in which identity theft is accomplished by use of deceptive electronic mail and a fake site on the World Wide Web. Phishing threatens financial institutions, retail companies, and consumers daily and phishers remain successful by researching anti-phishing countermeasures and adapting their attack methods to the countermeasures, either to exploit them, or completely circumvent them. An effective solution to phishing requires a multi-faceted defense strategy. We propose a model for phishing. We report on a survey we conducted of user detection of phishing. We also report on experiments to assess the success of automated methods for assessing clues to phishing email. We present recommendations for a defense-in-depth strategy to prevent phishing.
|
7 |
The Workers' Leadership Role in a Lean TransformationWilson, Jane T. 25 January 2014 (has links)
<p> This research explored the challenges that New Hampshire manufacturers faced in introducing and sustaining improvement initiatives and the social dimension of this issue.</p><p> Using an ethnographic methodology, participant-observation was employed to examine the culture of a New Hampshire manufacturer. Through active participation in work groups, regular assignments, and meetings, an understanding of the impact the culture had on the implementation of a set of improvement techniques known as lean manufacturing was gained. Observations illuminated the leadership roles that both management and workers play. Nine themes described the lived experience and the social forces that guided that experience. These themes were: subgroups, lack of overall teamwork, dominant clique, lack of management interaction, focus on the past, workers social lives, individual cooperation, pride in workmanship, lack of process ownership. The effect of these nine themes on the lean initiatives was explored. Finally, the study extrapolated the findings to provide recommendations on successful practices in sustaining lean improvements.</p>
|
8 |
Keep Sunday free: social engineering through shop trading hours in New ZealandKennedy, Ann-Marie January 2009 (has links)
The purpose of this thesis is to explore Social Engineering and how marketing communications may be able to affect it. This research takes a step back from other research in the area and considers the decision makers behind Social Engineering, instead of Social Engineering interventions. One way for stakeholders to influence Social Engineering is through influencing the initial decision of which Social Engineering intervention to use. The influence of marketing communications is considered using diffusion theory, which uncovers how marketing communications diffuse through and influence a decision making group. First, the research uncovers the Social Engineering Decision Making Process. This is the decision making process of Governments for Social Engineering Decisions. The Social Engineering Decision Making Process is the combination of Podgórecki’s Sociotechnical Paradigm (1990) and Roger’s Innovation Diffusion Process (2003). The research then explores this framework through its illustration in a retailing context. The Social Engineering intervention chosen for this research is the shop trading hour legislation in New Zealand. The Social Engineering decision studied is the decision to introduce Sunday trading through the Shop Trading Hours Act Repeal Act (1990). An historical analysis explores the Social Engineering of shop trading hours, in line with an Historical methodology and Constructivist and Hermeneutic viewpoint. This narrative is created through document analysis and semi-structured in-depth interviews with five different stakeholder groups from the decision to introduce Sunday trading. The historical narrative also illustrates the Social Engineering Decision Making Process. Lastly, to uncover the influence of marketing communications and the media on the Social Engineering Decision Making Process, a content analysis of marketing communications and media over the time of the decision to introduce Sunday trading occurs. Government discussions and reports regarding the decision are also analysed. If the communications influence the Government discussions, then their themes would be present in Government documents directly following the communications. The results lend support to the Social Engineering Decision Making Process. Results outline the aspects of the legislative process that reflect each stage of the Social Engineering Decision Making Process. Findings also find support for the influence of Marketing communications and media on the Government’s decision making. The three most effective times for stakeholders to try to influence the process, through either mass or interpersonal communications are also identified.
|
9 |
Keep Sunday free: social engineering through shop trading hours in New ZealandKennedy, Ann-Marie January 2009 (has links)
The purpose of this thesis is to explore Social Engineering and how marketing communications may be able to affect it. This research takes a step back from other research in the area and considers the decision makers behind Social Engineering, instead of Social Engineering interventions. One way for stakeholders to influence Social Engineering is through influencing the initial decision of which Social Engineering intervention to use. The influence of marketing communications is considered using diffusion theory, which uncovers how marketing communications diffuse through and influence a decision making group. First, the research uncovers the Social Engineering Decision Making Process. This is the decision making process of Governments for Social Engineering Decisions. The Social Engineering Decision Making Process is the combination of Podgórecki’s Sociotechnical Paradigm (1990) and Roger’s Innovation Diffusion Process (2003). The research then explores this framework through its illustration in a retailing context. The Social Engineering intervention chosen for this research is the shop trading hour legislation in New Zealand. The Social Engineering decision studied is the decision to introduce Sunday trading through the Shop Trading Hours Act Repeal Act (1990). An historical analysis explores the Social Engineering of shop trading hours, in line with an Historical methodology and Constructivist and Hermeneutic viewpoint. This narrative is created through document analysis and semi-structured in-depth interviews with five different stakeholder groups from the decision to introduce Sunday trading. The historical narrative also illustrates the Social Engineering Decision Making Process. Lastly, to uncover the influence of marketing communications and the media on the Social Engineering Decision Making Process, a content analysis of marketing communications and media over the time of the decision to introduce Sunday trading occurs. Government discussions and reports regarding the decision are also analysed. If the communications influence the Government discussions, then their themes would be present in Government documents directly following the communications. The results lend support to the Social Engineering Decision Making Process. Results outline the aspects of the legislative process that reflect each stage of the Social Engineering Decision Making Process. Findings also find support for the influence of Marketing communications and media on the Government’s decision making. The three most effective times for stakeholders to try to influence the process, through either mass or interpersonal communications are also identified.
|
10 |
From social engineering to democracy promotion an examination of 125 years U.S. political and economic policy /Ricker, Jennifer K. January 2007 (has links)
Thesis (M.A.)--Bowling Green State University, 2007. / Document formatted into pages; contains v, 140 p. Includes bibliographical references.
|
Page generated in 0.098 seconds