n Acta Criminologica: Southern African Journal of Criminology - The criminogenic significance of social engineering and the need for information security
|Article Title||The criminogenic significance of social engineering and the need for information security|
|© Publisher:||Criminological and Victimological Society of Southern Africa (CRIMSA)|
|Journal||Acta Criminologica: Southern African Journal of Criminology|
|Affiliations||1 University of South Africa and 2 University of South Africa|
|Publication Date||Jan 2015|
|Pages||89 - 106|
|Issue||Special Edition 4|
|Keyword(s)||Cybercrime, Hacker, Information assets, Information security, Phishing, Social engineering and Social engineering attacks|
During the course of history, human beings have sought to protect and secure themselves against all types of threats to their well-being and their property. In light of technological advances, the concept of property has evolved to include not only tangible assets such as land or possessions but also intangible belongings such as ideas, artistic works or information. Social engineering involves the targeting of people through deception and manipulation with the purpose of two main outcomes - direct loss of critical information and the achievement of some action intended by the attacker. As a countermeasure, it can be assumed that stricter technical controls should be a viable solution to social engineering. However, stricter technical controls cannot effectively deal with the issues surrounding human beings, their inherent nature and security. The impact of social engineering attacks vary widely according to the nature of the attack. Big corporations, private industries, businesses, government agencies, as well as individuals are at risk to Information Security breaches. Furthermore, many of these cyber-attacks, data breaches and stolen information are carried out for criminal purpose. This article examines the problem of social engineering by contextualising the modern information security and cybercrime culture, identifying harmful and illicit threats and attacks, as well as evaluating the potential impact and consequences of such attacks.
Article metrics loading...