Social engineering is the acquisition of information about computer systems through non-technical means. While technical security of most critical systems is high, these systems remain vulnerable to attacks from social engineers. Social engineering is a technique that: (a) does not require any (advanced) technical tools, (b) can be used by anyone, (c) is cheap. While some research exists for classifying and analysing social engineering attacks, the integration of social engineering attackers with other attackers such as software or network ones is missing so far. In this paper, we propose to consider social engineering exploits together with technical vulnerabilities. We introduce a method for the integration of social engineering exploits into attack graphs and propose a simple quantitative analysis of the graphs that helps to develop a comprehensive defensive strategy

Analysis of Social Engineering Threats with Attack Graphs

L Krautsevich;A Yautsiukhin
2014

Abstract

Social engineering is the acquisition of information about computer systems through non-technical means. While technical security of most critical systems is high, these systems remain vulnerable to attacks from social engineers. Social engineering is a technique that: (a) does not require any (advanced) technical tools, (b) can be used by anyone, (c) is cheap. While some research exists for classifying and analysing social engineering attacks, the integration of social engineering attackers with other attackers such as software or network ones is missing so far. In this paper, we propose to consider social engineering exploits together with technical vulnerabilities. We introduce a method for the integration of social engineering exploits into attack graphs and propose a simple quantitative analysis of the graphs that helps to develop a comprehensive defensive strategy
2014
Istituto di informatica e telematica - IIT
attack graph
metrics
risk
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/308256
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact