The Path of Least Resistance
This chapter examines how “social engineering” can be used in computer hacking to gain access to highly secret computer codes and other confidential information, and how to defend yourself against such influence-based attacks. Drawing on Robert Cialdini's principles of influence, the chapter ex...
Saved in:
Published in | Six Degrees of Social Influence |
---|---|
Main Authors | , |
Format | Book Chapter |
Language | English |
Published |
New York
Oxford University Press
01.03.2012
Oxford University Press, Incorporated |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | This chapter examines how “social engineering” can be used in computer hacking to gain access to highly secret computer codes and other confidential information, and how to defend yourself against such influence-based attacks. Drawing on Robert Cialdini's principles of influence, the chapter explores the concept of resistance to unwanted persuasion by describing Motorola's experience with a social engineering attack from the perspective of the perpetrator. It also considers the points of vulnerability exploited by the attack and the methods by which individuals and organizations can protect themselves against such attacks and thus avoid the path of least resistance. |
---|---|
AbstractList | This chapter examines how “social engineering” can be used in computer hacking to gain access to highly secret computer codes and other confidential information, and how to defend yourself against such influence-based attacks. Drawing on Robert Cialdini's principles of influence, the chapter explores the concept of resistance to unwanted persuasion by describing Motorola's experience with a social engineering attack from the perspective of the perpetrator. It also considers the points of vulnerability exploited by the attack and the methods by which individuals and organizations can protect themselves against such attacks and thus avoid the path of least resistance. |
Author | Sagarin, Brad J Mitnick, Kevin D |
Author_xml | – sequence: 1 fullname: Sagarin, Brad J – sequence: 2 fullname: Mitnick, Kevin D |
BookMark | eNpVkE1PwzAMhoP4ENvYP-DQO-pm12nScEMTX9IkENo9SjJXA6amLN3_J6K7cLAsW-9r632m4qKLHQtxh7BAMLR0oT_E9j6m6PdLoxtAY7QkqNUCgHIBnYlp3kJV1wbN-d8wSuhKTIyqUDbUqGsxT-kr66E2RCQn4naz4-LdDbsitsWaXRqKD06faXBd4Btx2bp94vmpz8Tm6XGzeinXb8-vq4d1GRtoSsUOtXPKecUUtiiVrLwPyGC2miC0WDXM-X2rSCqPdQ28bdkzomNUQDOB49mc8ufIabDsY_wO3A0Htw871w98SFZqkLLRVtucZSbK0ROPvc1g7MjI_qNjT15L9AsCSVyw |
ContentType | Book Chapter |
DBID | FFUUA |
DEWEY | 153.8/52092 |
DOI | 10.1093/acprof:osobl/9780199743056.003.0003 |
DatabaseName | ProQuest Ebook Central - Book Chapters - Demo use only |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Psychology |
EISBN | 0190255919 9780190255916 0199876681 9780199876686 |
Editor | Goldstein, Noah J Braver, Sanford L Kenrick, Douglas T |
Editor_xml | – sequence: 1 fullname: Kenrick, Douglas T – sequence: 2 fullname: Goldstein, Noah J – sequence: 3 fullname: Braver, Sanford L |
ExternalDocumentID | EBC4704487_7_48 acprof_9780199743056_chapter_3 |
GroupedDBID | -VX 20A 38. AABBV AAWXX ABARN ABBFG ABQPQ ACGYG ACLGV ACNRR ACNUM ACYTI ADPDQ ADPQS ADVEM AERYV AEXCD AHFFV AHUFE AIGZA AIXPE AIYZL AJFER AKQZE ALMA_UNASSIGNED_HOLDINGS ATCZW AZZ BBABE BTL CZZ DNKAV DUGUG EBSCA ECOWB FVYJC GHDSN HQD JJU MYL NRCWT PQQKQ TI5 W2P XI1 ZBOWZ ~UH FFUUA |
ID | FETCH-LOGICAL-o808-6ea17aa6ab6e3cd14642bbc1e09d730cf128ee838f6346b1550edfebe11ae1603 |
ISBN | 0199743053 9780199743056 |
IngestDate | Fri Jul 26 00:01:17 EDT 2024 Tue Jul 16 20:27:54 EDT 2024 |
IsPeerReviewed | false |
IsScholarly | false |
Keywords | persuasion social engineering confidential information computer hacking computer codes least resistance Robert Cialdini Motorola resistance influence |
LCCallNum | BF637.P4 S59 2011 |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-o808-6ea17aa6ab6e3cd14642bbc1e09d730cf128ee838f6346b1550edfebe11ae1603 |
OCLC | 962148386 |
PQID | EBC4704487_7_48 |
ParticipantIDs | proquest_ebookcentralchapters_4704487_7_48 oup_oso_acprof_9780199743056_chapter_3 |
PublicationCentury | 2000 |
PublicationDate | 2012-03-01 2012 |
PublicationDateYYYYMMDD | 2012-03-01 2012-01-01 |
PublicationDate_xml | – month: 03 year: 2012 text: 2012-03-01 day: 01 |
PublicationDecade | 2010 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York – name: United States |
PublicationSubtitle | Science, Application, and the Psychology of Robert Cialdini |
PublicationTitle | Six Degrees of Social Influence |
PublicationYear | 2012 |
Publisher | Oxford University Press Oxford University Press, Incorporated |
Publisher_xml | – name: Oxford University Press – name: Oxford University Press, Incorporated |
SSID | ssj0000593334 ssib011322986 ssib014243776 ssib010068765 |
Score | 1.4193951 |
Snippet | This chapter examines how “social engineering” can be used in computer hacking to gain access to highly secret computer codes and other confidential... |
SourceID | proquest oup |
SourceType | Publisher |
SubjectTerms | Family psychology |
Title | The Path of Least Resistance |
URI | https://doi.org/10.1093/acprof:osobl/9780199743056.003.0003 http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=4704487&ppg=48 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3NS8MwFA9-gIgXP3F-0YN4UDrbJktaj46JCoqHCd5CkiYgyAZugvrX-16TtjrmQS9ltNnoey97H0l-v0fIMVfcZDpP40yYImZlkcaFEyK2gjrqjNOsh2jku3t-_chun3pPLZFNhS6Z6q75nIsr-Y9V4R7YFVGyf7Bs86NwAz6DfeEKFobrTPL7c5nVYzie38FbQLnsaWMDzvambjoyOxceINWrNgSwWQ-u2mPiWI8LZX91fuJ72f8LnDA4lkCC3MCjfLWY4KESpPjic32n55VSBpuFo_yTsX7x5yfaL3aTihE2oW34qLfMPWHmDHn14LLPRAIloJBCsnyRLIoC_NAyxNxBs6qSIk5FtLutKVbIRUtrh2A8KkLa5DnbC0op8wxJ_s1oIFNq3nSFnAWhzr1IF5VA5_PFmYE31vG4SjKG62QNgScRIkJAuA2yYEebZLWJUB9b5AAMGaEho7GLKkNGrSG3yfBqMOxfx6G9RTzOkzzmVqVCKa40t9SUELFYprVJbVKU4HaNg8zB2pzmjlPGNZaStnTwn0tTZbE5-A5ZGo1HdpdEFh6zkpeQjStWWgclo9BcZ1bxDPRadsgJSCdBAdLrQv7QgjReMEk75LRWgKw268MJ4TBgIr8bc-8vg_fJajuLD8jS9PXNHkI6N9VHYTZ8AdgmQC4 |
link.rule.ids | 782,783,787,796,27937 |
linkProvider | ProQuest Ebooks |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Six+Degrees+of+Social+Influence&rft.atitle=The+Path+of+Least+Resistance&rft.date=2012-01-01&rft.pub=Oxford+University+Press%2C+Incorporated&rft.isbn=9780199743056&rft_id=info:doi/10.1093%2Facprof%3Aosobl%2F9780199743056.003.0003&rft.externalDBID=48&rft.externalDocID=EBC4704487_7_48 |
thumbnail_s | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F4704487-l.jpg |