Confidentiality and Social engineering: Difference between pages

From ACT Wiki
(Difference between pages)
Jump to navigationJump to search
imported>Doug Williamson
(Add links.)
 
imported>Doug Williamson
(Add link.)
 
Line 1: Line 1:
1.
''Cyberthreat''


To act so as to refrain from disclosing information that is private or restricted, or to refrain from using such information inappropriately.
In the context of cyber attacks, 'social engineering' means deceiving employees into voluntarily making fraudulent payments or other transactions, by causing them to believe that the fraudulent transactions are legitimate.




2.  
<span style="color:#4B0082">'''''Frauds socially engineered'''''</span>
 
:"... the frauds were successful because, at the final stage of the process, the victims’ employees were either directly or indirectly ‘socially engineered’ into willingly handing over company money, because they believed that they were engaged in legitimate transactions.
 
:In their defence, there are some ‘very good reasons’ why they were so easy to manipulate."
 
:''The Treasurer magazine, March 2017, p39 - Lesley Meall, freelance journalist specialising in technology and finance.''
 
 
Sometimes written 'social-engineering'.


One of the principles of the ACT's Ethical Code.




== See also ==
== See also ==
* [[ACT Competency Framework]]
* [[CEO fraud]]
* [[ACT Ethical Code]]
* [[Cyber attack]]
* [[Confidence]]
* [[Financial engineering]]
* [[Confidential information]]
* [[Fraud]]
* [[Confidential invoice discounting]]
* [[Layering]]
* [[Designated confidential information]]
* [[Phishing]]
* [[Non-disclosure agreement]]
* [[Ransomware]]
* [[Spoofing]]
* [[Whaling]]


[[Category:Ethics]]
[[Category:Technology]]

Revision as of 13:06, 25 September 2022

Cyberthreat

In the context of cyber attacks, 'social engineering' means deceiving employees into voluntarily making fraudulent payments or other transactions, by causing them to believe that the fraudulent transactions are legitimate.


Frauds socially engineered

"... the frauds were successful because, at the final stage of the process, the victims’ employees were either directly or indirectly ‘socially engineered’ into willingly handing over company money, because they believed that they were engaged in legitimate transactions.
In their defence, there are some ‘very good reasons’ why they were so easy to manipulate."
The Treasurer magazine, March 2017, p39 - Lesley Meall, freelance journalist specialising in technology and finance.


Sometimes written 'social-engineering'.


See also