The Path of Least Resistance
This chapter examines how “social engineering” can be used in computer hacking to gain access to highly secret computer codes and other confidential information, and how to defend yourself against such influence-based attacks. Drawing on Robert Cialdini's principles of influence, the chapter ex...
Saved in:
Published in | Six Degrees of Social Influence |
---|---|
Main Authors | , |
Format | Book Chapter |
Language | English |
Published |
New York
Oxford University Press
01.03.2012
Oxford University Press, Incorporated |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | This chapter examines how “social engineering” can be used in computer hacking to gain access to highly secret computer codes and other confidential information, and how to defend yourself against such influence-based attacks. Drawing on Robert Cialdini's principles of influence, the chapter explores the concept of resistance to unwanted persuasion by describing Motorola's experience with a social engineering attack from the perspective of the perpetrator. It also considers the points of vulnerability exploited by the attack and the methods by which individuals and organizations can protect themselves against such attacks and thus avoid the path of least resistance. |
---|---|
ISBN: | 0199743053 9780199743056 |
DOI: | 10.1093/acprof:osobl/9780199743056.003.0003 |