Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Social engineering (security)
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
==Further reading== {{refbegin|2}} * Boyington, Gregory. (1990). 'Baa Baa Black Sheep' Published by Gregory Boyington {{ISBN|0-553-26350-1}} * Harley, David. 1998 ''[http://smallbluegreenblog.files.wordpress.com/2010/04/eicar98.pdf Re-Floating the Titanic: Dealing with Social Engineering Attacks] {{Webarchive|url=https://web.archive.org/web/20160922222220/http://smallbluegreenblog.files.wordpress.com/2010/04/eicar98.pdf |date=22 September 2016 }}'' EICAR Conference. * Laribee, Lena. June 2006 ''[http://faculty.nps.edu/ncrowe/oldstudents/laribeethesis.htm Development of methodical social engineering taxonomy project]'' Master's Thesis, Naval Postgraduate School. * Leyden, John. 18 April 2003. ''[https://www.theregister.co.uk/2003/04/18/office_workers_give_away_passwords/ Office workers give away passwords for a cheap pen]''. [[The Register]]. Retrieved 2004-09-09. * Mann, Ian. (2008). ''Hacking the Human: Social Engineering Techniques and Security Countermeasures'' Published by Gower Publishing Ltd. {{ISBN|0-566-08773-1}} or {{ISBN|978-0-566-08773-8}} * [[Kevin Mitnick|Mitnick, Kevin]], [[Alexis Kasperavičius|Kasperavičius, Alexis]]. (2004). ''[[CSEPS]] Course Workbook''. Mitnick Security Publishing. <!-- Is there an ISBN? --> * [[Kevin Mitnick|Mitnick, Kevin]], Simon, William L., [[Steve Wozniak|Wozniak, Steve]],. (2002). ''The Art of Deception: Controlling the Human Element of Security'' Published by Wiley. {{ISBN|0-471-23712-4}} or {{ISBN|0-7645-4280-X}} * Hadnagy, Christopher, (2011) ''Social Engineering: The Art of Human Hacking'' Published by Wiley. {{ISBN|0-470-63953-9}} * N.J. Evans. (2009). "Information Technology Social Engineering: An Academic Definition and Study of Social Engineering-Analyzing the Human Firewall." Graduate Theses and Dissertations. 10709. https://lib.dr.iastate.edu/etd/10709 * Z. Wang, L. Sun and H. Zhu. (2020) "Defining Social Engineering in Cybersecurity," in IEEE Access, vol. 8, pp. 85094-85115, [[doi:10.1109/ACCESS.2020.2992807]]. {{refend}}
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)