Skip to main content


Social Engineering In Evolution Of Attacks


The aim of this eBook is to present the evolution of modern social engineering and to discuss its relationship with modern cybercrime and cyberterrorism trends. The best way to open such document is to report a classic definition of Social Engineering (SE onward in the document), to better underline the difference between what is commonly perceived as SE and what is the current state of this “art”. There are many different definitions of SE, but the following is interesting because it is classic and belongs to the so-called old-school SE.


Social Engineering (SE), in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information.

A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional "con" in that it is often one of many steps in a more complex fraud scheme.

The term "social engineering" as an act of psychological manipulation is also associated with the social sciences, but its usage has caught on among computer and information security professional.

Traditionally, the world of Systems Security mostly focuses on technological threats coming from the compromised technological systems.

Nonetheless, an information system is not composed merely by a technological factor, but also by the “human” factor.  When dealing with Information Security the “human” factor refers to the often forgotten user who plays an important role in a cyberattack.


File Type: PDF
File Size: 4.26 MB
Total Pages: 147

Direct Link Mega:
Download Now
Direct Link AnonFiles:
Download Now
Direct Link Mediafire:
Download Now
Direct Link Solidfiles:
Download Now
Direct Link Sabercathost:
Download Now
Direct Link Tusfiles:
Download Now

Comments

Popular posts from this blog

Web Hacking 101

With a Foreword written by HackerOne Co-Founders Michiel Prins and Jobert Abma, Web Hacking 101 is about the ethical exploration of software for security issues but learning to hack isn't always easy. With few exceptions, existing books are overly technical, only dedicate a single chapter to website vulnerabilities or don't include any real world examples. This book is different. Using publicly disclosed vulnerabilities, Web Hacking 101 explains common web vulnerabilities and will show you how to start finding vulnerabilities and collecting bounties.

Hack-X-Crypt (By Ujjwal Sahay)

This is basically a straight forward guide towards ethical hacking and cyber security.Computer hacking is the practice of altering computer hardware and software to carry out a goal outside of the creator‘s original intention. People who slot in computer hacking actions and activities are often entitled as hackers. The majority of people assume that hackers are computer criminals. They fall short to identify the fact that criminals and hackers are two entirely unrelated things.

High Performance Cloud Auditing

This eBook mainly focuses on cloud security and high performance computing for cloud auditing. The eBook discusses emerging challenges and techniques developed for high performance semantic cloud auditing, and presents the state of the art in cloud auditing, computing and security techniques with focus on technical aspects and feasibility of auditing issues in federated cloud computing environments.