Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
P. 1
Social engineering exploiting the weakest links

Social engineering exploiting the weakest links

Ratings: (0)|Views: 224|Likes:
Published by Stefano Bendandi
How to avoid on-line manipulation: ‘Nigeria-letters’. EU Agency ENISA launches ‘Social Engineering’ -report with 5 defence advice to counter fraud threat.
How to avoid on-line manipulation: ‘Nigeria-letters’. EU Agency ENISA launches ‘Social Engineering’ -report with 5 defence advice to counter fraud threat.

More info:

Published by: Stefano Bendandi on Dec 06, 2008
Copyright:Traditional Copyright: All rights reserved


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF or read online from Scribd
See more
See less



Social Engineering:Exploiting the Weakest Links
Including an interview with
security author,speaker, and consultant Kevin Mitnick 
The European Network and Information Security Agency (ENISA) is an EU agency createdto advance the functioning of the internal market. ENISA is a centre of excellence for theEuropean Member States and European institutions in network and information security,giving advice and recommendations and acting as a switchboard of information for goodpractices. Moreover, the agency facilitates contacts between the European institutions, theMember States and private business and industry actors.
 Contact details
For contacting ENISA or for general enquiries on information security awareness raisingmatters please use the following details:E-mail: KJELL KALMELID, Expert Awareness Raising
Legal notice
Notice must be taken that this publication represents the views and interpretations of the authors and editors,unless stated otherwise. This publication should not be construed to be an action of ENISA or the ENISA bodiesunless adopted pursuant to the ENISA Regulation (EC) No 460/2004. This publication does not necessarilyrepresent state-of the-art and it might be updated from time to time.Third-party sources are quoted as appropriate. ENISA is not responsible for the content of the external sourcesincluding external websites referenced in this publication.This publication is intended for educational and information purposes only. Neither ENISA nor any person actingon its behalf is responsible for the use that might be made of the information contained in this publication.Reproduction is authorised provided the source is acknowledged. © European Network and Information Security Agency (ENISA), 2008
Social Engineering
Exploiting the Weakest Links3
Kjell Kalmelid, Expert Awareness Raising, ENISA and coordinator of this Whitepaper,wishes to acknowledge and warmly thank the three authors of the AR Community, whotogether wrote this Whitepaper. Dr. Maria Papadaki and Prof. Steven Furnell, both fromthe Centre for Information Security and Network Research, University of Plymouth, UnitedKingdom and Prof. Ronald C. Dodge JR, Department of Electrical Engineering andComputer Science, United States Military Academy, West Point, NY, United States.The authors would like to acknowledge the contributions of Taimur Bakhshi, Dr AaronFerguson, and Athanasios Karakasiliotis, whose research studies contributed towards theresearch findings presented here.Thanks must also go to Kevin Mitnick, who kindly reviewed the whitepaper and offeredcomments based on his own experiences, and then gave a significant amount of his timeto be interviewed on the subject.

Activity (5)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
windua liked this
khal_shal7883 liked this
miguel1051 liked this

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->