×
10% Discount on All E-Books through IGI Global’s Online Bookstore Extended
(10% discount on all e-books cannot be combined with most offers. Discount is valid on purchases made directly through IGI Global Online Bookstore (
www.igi-global.com
)
and may not be utilized by booksellers and distributors. Offer does not apply to e-Collections and exclusions of select titles may apply. Offer expires June 30, 2022.)
Browse Titles
Login/Create Account
Language:
English
US
China
Cart
0
All Products
All Products
Books
Journals
Videos
Book Chapters
Journal Articles
Video Lessons
Teaching Cases
Special Offers
10% Discount on All E-Books through IGI Global’s Online Bookstore
With the continued paper shortages and supply chain issues, we have been informed by our partners that there will be substantial delays in printing and shipping publications, especially as we approach the holiday season. To help incentive the electronic format and streamline access to the latest research, we are offering a 10% discount on all our e-books through IGI Global’s Online Bookstore. Hosted on the InfoSci
®
platform, these titles feature no DRM, no additional cost for multi-user licensing, no embargo of content, full-text PDF & HTML format, and more.
Browse Titles
IGI Global to Convert an Additional 30 Journals to Full Gold Open Access for the 2022 Volume Year
IGI Global is to convert an additional 30 journals to full gold open access (OA) for their 2022 volume year, which will expand their OA collection to contain 60 gold open access and one (1) platinum open access journal.
Learn More
All IGI Global Scholarly Journals Shift to "Digital Preferred" Format
In response to the overwhelming demand for electronic content coupled with the mission to decrease the overall environmental impacts of print production and distribution, all IGI Global journals will shift into a digital preferred model for the 2022 volume year. Under this model, journals will become primarily available under electronic format and articles will be immediately available upon acceptance. Print subscriptions and print + electronic subscriptions will still be available, but for the print version, all articles that are published during the volume year will become available at the end of the year in a single (1) printed volume.
Learn More
IGI Global’s New DEI e-Book Collection
Acquire Over 320+ E-Books on Diversity, Equity, and Inclusivity from a publisher that has been dedicated to DEI since its inception over 30 years ago. Now, benefit from a collection of all of our DEI e-Books at a 90% Discount.
Learn More
Offering a
5% Pre-Publication Discount
on
All Reference Books Ordered Through IGI Global’s Online Bookstore*
To support customers with accessing the latest research, IGI Global is offering a 5% pre-publication discount on all hardcover, softcover, e-books, and hardcover + e-books titles.
*5% discount offer is eligible on hardcover, softcover, e-books, and hardcover + e-books titles and is automatically applied directly to the shopping cart. Discount offer only valid on purchases made directly through IGI Global’s Online Bookstore and offer expires 30 days after the publication’s release. This automatic discount is not intended for use by book distributors or wholesalers.
Browse Titles
Books
Books
Open Access Books
OnDemand Book Chapters
Journals
Journals
Open Access Journals
OnDemand Journal Articles
e-Collections
e-Collections
Transformative Open Access (Read & Publish)
Open Access
Publish
with Us
Resources
Librarians
e-Collections
Book Title List
Journal Title List
Video Title List
Library Collection Development Service
Browse Forthcoming Books
Consortia Partnerships
Library and Publisher Collaborations
Product Distributors
Catalogs
Open Access Initiative
Instructors
Course Adoption
Teaching Cases
K-12 Online Learning Collection
Researchers
Browse Books
Browse Journals
Browse Forthcoming Books
Search Open Access Content
OnDemand Downloads
Webinars
Authors and Editors
eEditorial Discovery
®
System
Peer Review Process
Ethics and Malpractice
COPE Membership
Fair Use Policy
Open Access Publishing
Author Services
FAQ
Distributors
Distributor Resources
Book Distributors
Journal Subscription Agencies
E-Resource Partners
Browse Forthcoming Books
Catalogs
About Us
Newsroom
What is Social engineering
1.
The manipulation of victims to obtain trust for exploitation.
Learn more in: Towards a Theory for Explaining Socially-Engineered Cyber Deception and Theft
2.
Strategy that handles the vulnerabilities produced in people.
Learn more in: Redesigning the User Interface of a Learning Platform for Social Engineering Integrating Web Accessibility Basics
3.
An activity that is conducted by perpetrators on individuals in the hopes of gaining some personal information, such as credit card numbers, banking information, user names, passwords, and so forth.
Social engineering
can take the form of e-mails, mail, and phone calls. The authors of
social engineering
activities exploit individuals willing to trust, often with bad consequences. It often relies on non-technical means and involves tricking individuals to give up personal information.
Social engineering
perpetrators often rely on the goodness and natural tendency of people to help others.
Learn more in: Combating Computer Fraud
4.
It can be defined as the mechanism to obtain information or data of a sensitive nature. In essence, they are persuasive tactics that tend to use the goodwill and lack of caution of users.
Learn more in: Social Research Methods in Cybersecurity: From Criminology to Industrial Cybersecurity
5.
Techniques to manipulate people to obtain information from them that they would not give you voluntarily.
Learn more in: The Ethics of Deception in Cyberspace
6.
An activity that is conducted by perpetrators on individuals in the hopes of gaining some personal information, such as credit card numbers, banking information, user names, passwords, and so forth.
Social engineering
can take the form of e-mails, mail, and phone calls. The authors of
social engineering
activities exploit individuals willing to trust, often with bad consequences. It often relies on non-technical means and involves tricking individuals to give up personal information.
Social engineering
perpetrators often rely on the goodness and natural tendency of people to help others.
Learn more in: Understanding Computer Security
7.
Uses various real-world and electronic methods to coerce users into unknowingly facilitate a compromise whether it be revealing credentials or trying to persuade them to click on a malicious URL link or malware laden file.
Learn more in: Attributed State Actors
8.
The act of gaining either unauthorized access to a system or sensitive information, such as passwords, through the use of trust and relationship building with those who have access to such information.
Learn more in: Guarding Corporate Data from Social Engineering Attacks
9.
It refers to a broad range of malicious activities performed through human interactions. It uses psychological manipulation to trick users into revealing sensitive information or making security mistakes.
Learn more in: The Anatomy of Phishing Attacks and the Detection and Prevention of Fake Domain Names
10.
The art of manipulating individuals so they offer up their private information.
Learn more in: Realizing a Multi-Layered Mobile Strategy for Underserved Areas for Cybersecurity Leadership
11.
An attack where the perpetrator uses
social
skills to trick or manipulate a legitimate employee into providing confidential company information.
Learn more in: An Overview of Threats to Information Security
12.
An attack that uses personal and
social
skills to persuade the target to behave in violation of security principles.
Learn more in: Online Phishing and Solutions
13.
An attack technique carried out by
social
engineers seeking unauthorized access to valuable information assets. This technique exploits human vulnerability in the interaction with humans by using deception and manipulation in order to bypass information security policy.
Learn more in: Social Engineering in Information Security Breaches and the Factors That Explain Its Success: An Organizational Perspective
14.
Act of manipulating people into performing actions or divulging confidential information, rather than by breaking in or using technical cracking techniques.
Learn more in: Online Social and Business Networks’ Implications for Corporate Strategy
15.
Manipulating people through their natural trust or desire to help in order to trick them into divulging information or performing actions.
Learn more in: Marketing Vulnerabilities in an Age of Online Commerce
16.
Manipulating people through their natural trust or desire to help in order to trick them into divulging information or performing actions.
Learn more in: Marketing Vulnerabilities in an Age of Online Commerce
17.
A type of attack taking advantage of human gullibility.
Learn more in: Network Worms
18.
The psychological manipulation of victims by cyber perpetrators, in order to get victims to divulge sensitive confidential information, or to perform certain actions that help perpetrators to successfully execute their cyberattacks.
Learn more in: The Importance of the Human-Centric Approach in Combating Cyber Threats
19.
It is the art of manipulating the mental state of the people in an attempt of divulging the sensitive information. It is the most dangerous danger that today’s enterprises are facing.
Learn more in: Reviewing the Security Features in Contemporary Security Policies and Models for Multiple Platforms
20.
A collection of techniques used to manipulate people, often via a computer or telephone, into performing acts or divulging confidential information to facilitate the execution of a fraud.
Learn more in: The Complex New World of Information Security
21.
The art of influencing and manipulating an individual into acting a certain way that they may or may not intend to do otherwise, and that may or may not be in their best interest.
Learn more in: Dark Web: A Breeding Ground for ID Theft and Financial Crimes
22.
Social engineering
involves criminals making direct contact with you usually by phone or email. They want to gain your confidence and usually pose as a customer service agent so you’ll give the necessary information needed. This is typically a password, the company you work for, or bank information. Cybercriminals will find out what they can about you on the internet and then attempt to add you as a friend on
social
accounts. Once they gain access to an account, they can sell your information or secure accounts in your name.
Learn more in: The Vulnerability of Children in Cyberspace
23.
Manipulating people to reveal confidential information that will usually be used in criminal activities.
Learn more in: Data Privacy vs. Data Security
24.
The act of obtaining private information through non-technical means.
Learn more in: The Security Impacts on Social Media Platforms
25.
The exploitation of psychological triggers and cognitive biases as a means to gain unauthorized access to information or information systems.
Learn more in: Social Engineering and its Countermeasures
26.
Social engineering
, in the context of information security, is the psychological manipulation of people into performing actions or divulging confidential information.
Learn more in: Trends in Malware Attacks: Identification and Mitigation Strategies
27.
the design and implementation of logical procedures to persuade victims to supply confidential information to a spoofed entity.
Learn more in: Emerging Cybercrime Variants in the Socio-Technical Space
28.
The art and science of manipulating people and processes to get what an attacker wants.
Learn more in: Social Engineering Techniques, Password Selection, and Health Care Legislation: A Health Care Setting
29.
A form of cyberattack that involves psychologically manipulating people into providing sensitive information (e.g., usernames, passwords, credit card numbers).
Learn more in: Digital Security Strategy
30.
It refers to a wide range of malicious activities carried out through human interactions. It is based on psychological manipulation to trick users into revealing sensitive information or making security mistakes.
Learn more in: Potential Threats of Social Engineering Practices to Social Work: Concepts, Challenges, and Solutions
31.
Acquiring information about computer systems through non-technical means (Winkler, 1996). Also defined as the practice of obtaining confidential information by manipulation of legitimate users (Wikipedia, 2006).
Learn more in: Critical Success Factors and Indicators to Improve Information Systems Security Management Actions
32.
Social engineering
is an attack method taking advantage of human nature.
Learn more in: Malicious Software in Mobile Devices
33.
The manipulation of another human being to reveal sensitive or private information (such as through deception), often used to commit fraud.
Learn more in: Safe Distances: Online and RL Hyper-Personal Relationships as Potential Attack Surfaces
34.
attacks taking advantage of human nature for deception.
Learn more in: Identity Theft through the Web
35.
Psychological manipulation of people into performing actions or divulging confidential information.
Learn more in: A Routine Activity Theory-Based Framework for Combating Cybercrime
Find more terms and definitions using our
Dictionary Search
.
Social engineering
appears in:
Modern Theories and Practices for Cyber Ethics...
Search inside this book for more research materials.
Recommend to a Librarian
Recommend to a Colleague
Looking for research materials? Search our database for more
Social engineering
downloadable research papers.
InfoSci-OnDemand
Download Premium Research Papers
Full text search our database of 167,400 titles for
Social engineering
to find related research papers.
Learn More About Social engineering in These Related Titles
Critical Perspectives on Social Justice in S...
Social Sciences & Humanities
Copyright 2021. 355 pages.
There is very little discussion of socially just a...
In Stock
$37.50 Individual Chapters
Exploring Online Learning Through Synchronou...
Education
Copyright 2020. 333 pages.
Exploring online learning through the lens of sync...
In Stock
$37.50 Individual Chapters
Handbook of Research on the Global Impacts a...
Media & Communications
Copyright 2020. 539 pages.
The world is witnessing a media revolution similar...
In Stock
$37.50 Individual Chapters
Police Psychology and Its Growing Impact on...
Social Sciences & Humanities
Copyright 2017. 345 pages.
Police psychology has become an integral part of p...
In Stock
$37.50 Individual Chapters
Handbook of Research on Competency-Based Edu...
Education
Copyright 2017. 454 pages.
The majority of adult learners are looking to atta...
In Stock
$37.50 Individual Chapters
Censorship and Student Communication in Onli...
Education
Copyright 2016. 622 pages.
While freedom of speech is a defining characterist...
In Stock
$37.50 Individual Chapters
Modern Societal Impacts of the Model Minorit...
Social Sciences & Humanities
Copyright 2015. 403 pages.
The model minority stereotype is a form of racism...
In Stock
$37.50 Individual Chapters
Educational, Psychological, and Behavioral C...
Media & Communications
Copyright 2014. 465 pages.
Online communities continue to evolve as more peop...
In Stock
$37.50 Individual Chapters
Integrated Operations in the Oil and Gas Ind...
Business & Management
Copyright 2013. 457 pages.
The predicted “ICT revolution” has gained increasi...
In Stock
$37.50 Individual Chapters
Electronic Enterprise: Strategy and Architec...
Business & Management
Copyright 2003. 384 pages.
Enterprise evolution (or electronic enterprise) is...
In Stock
$37.50 Individual Chapters