Social engineering: Difference between revisions
From ACT Wiki
Jump to navigationJump to search
imported>Doug Williamson (Layout.) |
imported>Doug Williamson (Layout.) |
||
Line 1: | Line 1: | ||
''Cyberthreat'' | ''Cyberthreat''. | ||
In the context of cyber attacks, 'social engineering' means deceiving employees into voluntarily making fraudulent payments or other transactions, by causing them to believe that the fraudulent transactions are legitimate. | In the context of cyber attacks, 'social engineering' means deceiving employees into voluntarily making fraudulent payments or other transactions, by causing them to believe that the fraudulent transactions are legitimate. |
Revision as of 10:15, 16 November 2022
Cyberthreat.
In the context of cyber attacks, 'social engineering' means deceiving employees into voluntarily making fraudulent payments or other transactions, by causing them to believe that the fraudulent transactions are legitimate.
- Frauds socially engineered
- "... the frauds were successful because, at the final stage of the process, the victims’ employees were either directly or indirectly ‘socially engineered’ into willingly handing over company money, because they believed that they were engaged in legitimate transactions.
- In their defence, there are some ‘very good reasons’ why they were so easy to manipulate."
- The Treasurer magazine, March 2017, p39 - Lesley Meall, freelance journalist specialising in technology and finance.
Sometimes written 'social-engineering'.