The Path of Least Resistance

This chapter examines how “social engineering” can be used in computer hacking to gain access to highly secret computer codes and other confidential information, and how to defend yourself against such influence-based attacks. Drawing on Robert Cialdini's principles of influence, the chapter ex...

Full description

Saved in:
Bibliographic Details
Published inSix Degrees of Social Influence
Main Authors Sagarin, Brad J, Mitnick, Kevin D
Format Book Chapter
LanguageEnglish
Published New York Oxford University Press 01.03.2012
Oxford University Press, Incorporated
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:This chapter examines how “social engineering” can be used in computer hacking to gain access to highly secret computer codes and other confidential information, and how to defend yourself against such influence-based attacks. Drawing on Robert Cialdini's principles of influence, the chapter explores the concept of resistance to unwanted persuasion by describing Motorola's experience with a social engineering attack from the perspective of the perpetrator. It also considers the points of vulnerability exploited by the attack and the methods by which individuals and organizations can protect themselves against such attacks and thus avoid the path of least resistance.
ISBN:0199743053
9780199743056
DOI:10.1093/acprof:osobl/9780199743056.003.0003