Social engineering: Difference between revisions
From ACT Wiki
Jump to navigationJump to search
imported>Doug Williamson (Add link.) |
imported>Doug Williamson (Layout.) |
||
Line 4: | Line 4: | ||
<span style="color:#4B0082">'''''Frauds socially engineered'''''</span> | :<span style="color:#4B0082">'''''Frauds socially engineered'''''</span> | ||
:"... the frauds were successful because, at the final stage of the process, the victims’ employees were either directly or indirectly ‘socially engineered’ into willingly handing over company money, because they believed that they were engaged in legitimate transactions. | :"... the frauds were successful because, at the final stage of the process, the victims’ employees were either directly or indirectly ‘socially engineered’ into willingly handing over company money, because they believed that they were engaged in legitimate transactions. |
Revision as of 13:06, 25 September 2022
Cyberthreat
In the context of cyber attacks, 'social engineering' means deceiving employees into voluntarily making fraudulent payments or other transactions, by causing them to believe that the fraudulent transactions are legitimate.
- Frauds socially engineered
- "... the frauds were successful because, at the final stage of the process, the victims’ employees were either directly or indirectly ‘socially engineered’ into willingly handing over company money, because they believed that they were engaged in legitimate transactions.
- In their defence, there are some ‘very good reasons’ why they were so easy to manipulate."
- The Treasurer magazine, March 2017, p39 - Lesley Meall, freelance journalist specialising in technology and finance.
Sometimes written 'social-engineering'.