Social engineering: the" dark art"

T Thornburgh - Proceedings of the 1st annual conference on …, 2004 - dl.acm.org
T Thornburgh
Proceedings of the 1st annual conference on Information security curriculum …, 2004dl.acm.org
The key to maintaining the confidentiality, integrity, and availability of an organizations
information and information systems is controlling who accesses what information. This is
accomplished by being able to identify the requestor, verifying the requestor is not an
impostor, and ensuring that the requestor has the proper level of clearance to access a
given resource. There have always been those that attempt to by-pass this security
mechanism through brute force or guile. In the past, those who use guile have been called …
The key to maintaining the confidentiality, integrity, and availability of an organizations information and information systems is controlling who accesses what information. This is accomplished by being able to identify the requestor, verifying the requestor is not an impostor, and ensuring that the requestor has the proper level of clearance to access a given resource. There have always been those that attempt to by-pass this security mechanism through brute force or guile. In the past, those who use guile have been called confidence men and con artists. Today, these people are called social engineers, but the tactics remain the same even if the objectives have changed.
ACM Digital Library