You are on page 1of 11

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/273708458

Social Engineering A General Approach

Article in Informatica Economica · June 2014


DOI: 10.12948/issn14531305/18.2.2014.01

CITATIONS READS

13 4,112

2 authors:

Valerică Greavu-Serban Oana Şerban


Universitatea Alexandru Ioan Cuza 1 PUBLICATION 13 CITATIONS
13 PUBLICATIONS 36 CITATIONS
SEE PROFILE
SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Big Data - Apache Spark benchmarking View project

All content following this page was uploaded by Valerică Greavu-Serban on 18 March 2015.

The user has requested enhancement of the downloaded file.


Informatica Economică vol. 18, no. 2/2014 5

Social Engineering a General Approach

Valerică GREAVU-ŞERBAN, Oana ŞERBAN


Alexandru Ioan Cuza University of Iaşi
valy.greavu@feaa.uaic.ro, oanaserban.so@gmail.com

Social engineering is considered to be a taboo subject in nowadays society. It involves the use
of social skills or to obtain usernames, passwords, credit card data, or to compromise or
altering the information and systems of an entity. Social engineering methods are numerous
and people using it are extremely ingenious and adaptable. This technique takes advantage of
the intrinsic nature of mankind, to manipulate and obtain sensitive information, persuading
people into divulge it, using exceptional communication skills. Thus, five models of
persuasion were identified, based on: simplicity, interest, incongruity, confidence and
empathy, exploiting key factors which predispose people to fall victim to attacks of social
engineering such as greed, self-interest, guilt or ignorance. It is well known fact that security
is as strong as the weakest link in its chain (individuals) therefore, beyond technical
measures, staff training is the key to success in defending against such attacks.
Keywords: Social Engineering, Persuasion, Trust, Risk, Sensitive Information, Online
Security, Confidence, Manipulation, Attack, Staff Training

1 Social Engineering
The society of 21st century has been
defined as being based primarily on
methods through which an individual or a
group of individuals are manipulated into
providing access to certain information or
knowledge. Furthermore it has been founded used to induce certain behaviour. [1]
on the exchange of data between all fields of In order to avoid technical security measures
activity. Nowadays, the amount of set to prevent attackers from breaking into
information held is directly proportional to systems, they have developed various
the power that an individual can have on procedures to bypass the software or
others; therefore, a very important aspect is hardware elements utilized. Social
not only acquiring but also protecting it from engineering is based on using psychological
potential attacks. The emergence of stratagems on system’s users, thereby
numerous systems and protection obtaining important data, such as usernames,
mechanisms seemed to have solved the passwords, security codes, access codes,
security problems. However, it has been credit card numbers and additional
discovered that the crucial element as information for immediate benefits or ulterior
remained the individual and not the machine, ones. [2]
that installing the latest applications does not Under the conditions listed above, plus given
guarantee a complete protection of the the fact that despite the automation of the
system as it is not necessary to force it to machines and networks, nowadays, there is
infiltrate yourself, it is easier to get the not a single computerized system that does
information needed using persuasion or not depend on human factor; social
goodwill. Social engineering is a set of engineering is a hot topic in modern society.
methods by which an individual or group of There will always be people responsible for
individuals are manipulated to provide access providing information and maintenance of
to certain information or to print a certain the systems. However social engineering has
behaviour existed since the beginning of all times and
this due to people’s predilection to be polite,
2 Social Engineering from a Non- to help each other and trust each other. It is in
Technological Point of View human nature [3]. This technique takes
Social engineering represents a set of advantage of the intrinsic nature of mankind

DOI: 10.12948/issn14531305/18.2.2014.01
6 Informatica Economică vol. 18, no. 2/2014

to manipulate others and obtain sensitive interest, guilt, likelihood to trust others,
information. In fact, most people who ignorance and so on.
disclose data are aware of that, but they often Successful social engineers are confident and
believe that the information provided is not in control of the conversation. They simply
essential. The goal of social engineers, act as if being part of the system even though
however, is to join pieces of information they should not be and their self-confidence
gathered from various sources. will dispel the doubts of others, with ease.
As for non-technological view, social Social engineers will also use humour and
engineering overlaps to some extent with the compliments in conversation. They may even
policy above all as a social science. Its offer small gifts to employees, establishing a
development made possible the gathering and connection that could be used in the future.
analysis of information about social attitudes These kinds of gestures are often successful
and trends, as it is necessary to establish the manners of winning people’s trust because
initial state of a society and to predict the sympathy and cooperation are great ways in
effects of decisions that might be taken. which people interact naturally, under
Social engineering, however, arose from the suitable conditions. [5]
beginning of all time. "The fall into sin" of If a program cannot be upgraded,
the first two people would not have been downloaded or there are no patches available
possible without the serpent using its power the solution is simple: it can be replaced or
of persuasion on Eve and Eve on Adam. removed. In terms of people decisions are not
Amenhotep III, himself, during Egypt’s so simple. A person who has been victim of a
perhaps most prosperous period has managed social engineering attack cannot be replaced
with his skills as a diplomat to impose and by another version of the same individual;
maintain power on today’s Syria and moreover, hiring a more capable one is not
Palestine, without the need of military necessarily the most feasible solution
control. Even the Greeks used their social because the time used for their training can
skills in order to obtain their goals; see the be a waste of resources, considering that the
well-known story of the Trojan horse built methods of attack are rapidly expanding. [6]
under the command of Ulysses, but brought People are very careful when it comes to
in city by the Trojans themselves. The unauthorized installation of software in order
importance of persuasion and "deception" to extract information from the operating
has been described by Sun Tzu in the "Art of system, but their ability to cope with social
War", stating that it is very important to engineering especially under pressure, lacks.
simulate failure and passivity when you are Individuals tend to trust strangers or partially
active, forcing the enemy to perceive unknown people, accepting to share more or
weaknesses and strengths and contrariwise. less precious information about their work
[4]. In 1979, Kevin Mitnick introduced a new due to either for being ignored or craving to
concept related to the art of persuasion, by be noticed. The solution to this problem is to
taking into consideration the technical notify, educate and inform employees about
aspects of this science. This new domain was the existence of areas and dangerous actions,
called social engineering. Mitnick regardless of their job.
demonstrated that despite the numerous It has been noticed that offering bonuses or
measures of assuring information security favours often creates an obligation of
and the latest technologies, security is as reciprocity to the person who has received
strong as its weakest link, the human factor. them. It has been shown, however, that the
[3] value of these small favours depreciates over
3 The Taxonomy of Vulnerable Users time, so it is vital that the interlocutors
It is said that there are several key factors remember and perceive the importance of the
that prone people to fall victim to social services/goods; so a good social engineer
engineering attacks, for example: greed, self- will always remind the members of staff

DOI: 10.12948/issn14531305/18.2.2014.01
Informatica Economică vol. 18, no. 2/2014 7

about their acts of kindness. [7] response and will and they will passively
Curiosity and the fact that the victims are not witness any events that will threat system’s
well informed are other faults exploited by security.
social engineers. Huge buttons and windows Boredom is also menacing factor
with attractive design promising interesting information’s security being induced by
experiences makes people to access web repetitive tasks. Thus, individuals learn
links without verifying the information shortcuts to ease their tasks’
submitted. accomplishment, using minimal effort. Soon,
Generating the impression of imminence and such persons become lazy and unchallenging
must have service/product leads users to to attack; the social engineer knowing that he
behave correspondingly, regardless of the will receive the necessary information
potential negative effects involved by their without difficulty, due to the attitude adopted
actions. by these people towards their work. [8]
Another characteristic of individuals that is Fear of authority. Many people are reluctant
exploited by social engineers represents in presence of someone perceived or having
kindness to those in need. It is a well-known, an authoritarian attitude, feeling intimidated
classic way to acquire unauthorized access to by them most of the time. Attackers assume
buildings without using any kind of force; similar roles such as lawmen or senior
intruders are helped by employees just officials in companies in order to extract
because they are carrying a huge stack of sensitive information regarding the
folders. organization/entity.
Greed is what makes us susceptible to some
form of bribery or seduction. Thus, people in 4 Persuasion Seen as the Art of
lower positions within companies such as Manipulation
porters, janitors, messengers, dissatisfied “People will do anything for those who
with their remuneration, are more easily encourage their dreams, justify their failures,
persuaded to provide information or access to allay their fears, confirm their suspicions
buildings in exchange of financial benefit, and help them throw rocks at their enemies.”
than those involved in management.
Self-distrust. People are very reluctant to ask Blair Warren
a foreign person to identify or tend not to The purpose of persuasion is to make the one
watch as passwords or access codes are next to you feel fulfilled even if you
entered; as social engineers are masters when managed to convince him. Persuasion is not
it comes to self-confidence and only a science; persuasion is an art, and
dissimulation, they can easily intimidate their sometimes involving compromise beyond
interlocutors. exceptional communication skills. To be
Thoughtless or frivolity are seen as signs that persuasive involves knowing to ask the right
are indicate failure of attention. It is known questions at the right time, convince people
that most users are not experts in security to accept your opinions, all by themselves,
systems, but it is easy to disguise this small and not by using force. Unlike manipulation,
defect through proper education and the outcome of persuasion is sustainable;
implementing realistic policies. [3] persuasion being nothing but a victory over
Another flaw that undermines the security of the others. [9]
a system is the apathy of employees. This is a The purpose of persuasion is to convince
problem connected with human resources people to support an individual. Subjects are
management including the process of those rather undecided, while limiting the
selecting the staff. Associated with effects that people with strong convictions
indifference and insensitivity, apathy can have on the individuals concerned.
characterizes an individual completely Thus five models of persuasion were
detached from the environment, lack of identified based on: simplicity, self-interest,

DOI: 10.12948/issn14531305/18.2.2014.01
8 Informatica Economică vol. 18, no. 2/2014

mismatch, trust, and empathy. [10] coat. When the supervisor was not wearing
Simplicity refers to the technique of his uniform, the number of those complying
presenting the arguments supporting a cause has been decreased with almost 25 %.
and not the topic itself; the more complex the Empathy. Humans evolved in small
speech will be, the more confused the listener communities and then in societies. Living
will get. If the goal is to determine someone together has been advantageous for survival,
to remember something, then a subtle based on the existence of trust and for
message will be more effective (using simple gaining it one must understand how others
titles- based on the principle “less is more”). think and feel. Empathy is nothing but
Self-interest. Despite the fact that humans are evidence of exaggerated worry towards the
social animals characterized by selfishness, rest of the community. Showing empathy and
after all what motivates them itself- interest. trust increases considerably the chances to
Faced with the fact that others may have as a prevail upon a certain person.
goal taking advantage of others, the All elements mentioned above show signs of
temptation is to be the first to act. It has been being deeply embedded in the human psyche.
proved that helping others, being altruistic, Among all the need for identity comes first
triggers fulfilment which is the ultimate goal. and is supplied largely by interactions
Another important concept when it comes to between individuals. A factor of great social
self-interest is related to perception. People importance is creating connections with other
do things that they consider assumed in their members of the society thus emerging a mix
advantage. Therefore, the individual’s belief of identities.
that an idea is his benefit will determine him Aristotle described three ways of changing
to apprehend it, regardless of the veracity of others’ opinions and imposing one’s own
its accuracy. beliefs. Thereby the ethos uses trust and
Mismatch. Congruent shapes are those that focuses mainly on the speaker, designating
are identical in all aspects; coinciding exactly him/her as a moral person, having good
when superimposed. The incongruous do not character. Reputation and credibility depend
seem to belong together. In an attempt of on the competence and the way they are
understanding their personal universe, people depicted. Self- confidence, according to
will continuously seek for well-known Aristotle, is one of the key factors when it
known models. The main advantage is that comes to persuasion, often coexisting with
the models are reliable and predictable, and mimics, gestures, and eye contact signalling
the brain generates the perception of retrieval self-reliance.
in their harmony. The reverse is feeling Pathos often appeals to listener’s emotions
uncomfortable when things cannot be and aims to stimulate his interest. An
assigned to existing models. If things are effective way to arouse passion is to appeal
different than the pattern imagined, to one’s moral and spiritual values; ethos
confusion may occur, and the subjects often facilitating then the process of displaying
resort to self-deception and predisposition to individual’s values and juggling with
see what people want to see, not reality. objectives, interests, and even opinions of
Confidence will cover a lot of shortcomings. others. [11]
The ability to present things as an expert Language has also a significant effect on
guarantees success. This goes for people emotions, keywords being able to prompt
granted with authority; symbols of power are sensations and feelings.
accepted and followed unconditionally. For Logos focuses on arguments using logic and
example, in the famous Milgram rational explanations or conclusive
experiments, about 65 % of people involved evidences. The latter, together with science
were persuaded to administer lethal doses of are based on the use of empirical evidence.
electricity to strangers just because they have Providing evidence makes it difficult to
been ordered to do so by a man in a white pledge a negative response in the context of

DOI: 10.12948/issn14531305/18.2.2014.01
Informatica Economică vol. 18, no. 2/2014 9

non-existence of prior knowledge of one of protect attacks.


the participants at the act of persuasion.
Evidence can include statistics, photos or What is a cyber-attack?
even experiments. Cyber-attack is an action intended to affect
Cialdini, however, believes that persuasion is an organization's network or its components,
based on six principles: reciprocity, social disrupting its activities, disrupting data flows,
proof, sympathy, authority, consistency, and causing a delay in the delivery of services.
rarity. The purpose of these actions is to obtain
People generally seek to return favours, to confidential information related to accounts,
pay debts and to treat others as they are customer lists, technical data, or immediate
treated. According to the principle of material benefits, most often through illegal
reciprocity, this attitude can induce the need transfer of money in different accounts. [13]
to offer concessions to people who have
previously provided them. [12] What is a social engineering attack?
Social proof is a psychological phenomenon A social engineering attack supposes the use
where people assume the actions of others in of social skills in order to compromise or
an attempt to reflect correct behaviour for a alter the information and information systems
given situation that is the behaviour adopted; of an entity. Thus an attacker may seem
individuals tend to judge the correctness of bashful and respectable, claiming to be a new
their actions according to others’ employee, a maintenance person or even
apprehension about them. Cialdini states that research, being willing to provide papers in
we are often influenced by people we like order to prove it. Asking various questions
mainly because we perceive them as being and putting together the responses obtained,
similar or familiar. one can gather enough information to get into
Rarity. This principle says that things tend to an organization's network. If an attacker is
be more interesting when their availability is not able to gather enough information from
limited or when the opportunity to purchase one source, the may contact other individuals
them, under favourable conditions, is low. within the same organization and based on
For example, one could buy something his anterior data he will strengthen his
immediately, if advertised that it is the last credibility. [14]
item or a special offer concerning it will soon
expire. What to expect from a social engineering
Regardless of the principles’ classification, attack?
persuasion remains the most popular form of In order to gather information the attacker
influence. Argument is the method through will have to gain the trust of his future
which a person tries to persuade another victims. Tricks used are multiple, ranging
person or group of persons to believe or to from assuming the identity of another person
act in a certain manner. Persuasion is a (most often an employee of the IT
process of guiding people into adopting department or someone higher in the
ideas, attitudes or actions (rational or less hierarchy) to more intelligent techniques
rational), based on discussions and attractive involving research and more effort. These
presentation of the topic instead of using any methods have appropriate results in most
means of force. cases because people usually are gullible, and
addressed questions are most of the time
5 Methods of Obtaining Information rational and do not rise too much suspicion
Daily attacks on personal or corporate (for which the generally attacker usually has
information may take multiple forms, while well prepared answers). Phishing and
the level of protection adopted by users is spamming are closely related to social
still low most of them surmising that most engineering.
antivirus or firewall solutions will suffice to Examples of social engineers: Kevin

DOI: 10.12948/issn14531305/18.2.2014.01
10 Informatica Economică vol. 18, no. 2/2014

Mitnick, Badir brothers (Ramy, Muzher and year. [17]


Badir Shaddai), Christopher Hadnagy, Steve Reverse social engineering comprises a series
Stasiukonis, Mike Ridpath, Frank Abagnale, of three steps: sabotage, disclosure of the
David Bannon, Peter Foster, Steven Jay problem and assistance. In the first phase, the
Russell and Pappy Boyington. intruder launches an attack on the system,
The main types of attack are: phishing, then announcing subjects of a potential
pharming, phreaking, dumpster diving, problem or flaw in the system then
reverse social engineering, and whaling. pretending to be a security consultant he
The first two types of attacks are directed offers his services. This allows attaining
towards obtaining personal information such access to numerous data on the systems and
as username, password, and data on credit installing specialized programs to record the
card by impersonating an entity which has keys struck on the keyboard (key loggers).
already gained the user’s trusts. As [18]
mechanism for distribution are used the The whaling is launched usually on the staff
messaging system, email or various social management; information about executives
networks. For example, phishing consists in or other persons in charge can be found
sending an email containing a link to a frequently on websites of companies as
website that mimics the original site. As a Curriculum Vitae-s or biography. Attackers
result of the increased training of the may find such information about education
personnel and their responsibility towards or their passions permitting them to assume
phishing another form of bullying in the different roles (peers, teachers, and friends)
online environment has appeared, named and to invite the victims to various false
pharming. This consists in redirecting traffic events, to access various websites that
originally intended to the original page, to a require personal information such as name,
different address, thus compromising the address, phone number, credit card number
system that accesses it, or it’s DNS (Domain for reservations, etc.
Name Server). [15]
Phreaking involves the illegal access of 6 Business Risk
telecommunications infrastructure. Initially The issue of security has become essential,
the purpose of this action was to make long given the fact that organizations tend to
distance calls for free; soon Once Voice over become completely dependent on the optimal
Internet Protocol technology (VoIP) has been functioning of the systems owned. [19] The
implemented, phreaking took on a new needed solution is therefore to invest in
dimension and started to threat to companies adequate security systems. Protection
has grown considerably. A successful action measures can be framed in one of following
offers access not only to the voice categories: prevention, detection and
infrastructure, but also the electronics and by response. (Figure no. 1).
default to the company’s data. [16] Small Business Technology Institute (SBTI)
Dumpster diving can provide important together with Symantec published in July,
information about an organization’s activity, 2005, a report on security incidents
without requiring, in most cases, direct experienced by small businesses. The report
contact with employees. [8] This can provide confirms that systems are increasingly
details about phone numbers, upcoming vulnerable to attacks and recommends
activities, events, source codes, sensitive proactive security measures and vigilance in
information on floppy disks, CDs and hard the management of the organization, plus
drives. Auspicious moments to act are data protection in order to mitigate business
designated to be prior to fusion between risks. [20]
firms, reorganization or beginning of a new

DOI: 10.12948/issn14531305/18.2.2014.01
Informatica Economică vol. 18, no. 2/2014 11

Fig. 1. Safeguards
Source: Meghantan, N., Network and Information Security Principles, Policies, and models,
Jacksson State University, 2011, p 12.

Thus, switching to sophisticated architectures and they could always store important files
of information systems, automated processes on them. Moreover, 25 % of companies said
within the company involves an increased that along with the departure of employees,
risk exposure of information. When sensitive they had experienced significant losses of
information about the activity of the entity sensitive information. [22]
or its employees are compromised as a result Considering all these aspects, it is essential
of viruses or other persons entering the that companies protect their data, by using
system, it appears a delay in the production both classical methods: antivirus, firewall,
cycle and economic losses, affecting the anti-malware, etc. and customized solutions
company's ability to operate. that fully meet the users’ requirements.
The same study, conducted by Symantec Above all, the most effective method of
showed that often the companies, although combating social engineering remains staff’s
they are aware of the importance of training.
information’s security, they are not willing to
invest in projects that could protect them. 7 Case Study
Thus, the research revealed that 20 % of the In order to support the facts stated in the
systems administered mail boxes of present paper, we applied an anonymous
employees but they were not secured questionnaire (used for research purposes
properly, and 60 % of their wireless networks only) containing 20 questions on 131
were unreliable. Additionally, most small students of the Faculty of Economics and
businesses (75 %) did not take any action in Business Administration distributed during
order to secure their systems. [20] an exam.
Security breaches together with the fines Some of the main objectives of this survey
received for non-compliance with were:
international standards, result in loss of • To identify the frequency of use of social
competitiveness, investor confidence and networks and e-mail platforms;
even their support. [21] • If the subjects use the same passwords
However, it must be considered that and same user-name in multiple accounts;
unrealized gains and loss of customer • To determine the subjects’ willingness to
databases, theft or loss of capital prototype reveal their passwords and their
image and the time needed to regain significance;
customer confidence, market position, • To determine whether students have
implementing security solutions can also be provided passwords to others;
considered as being negative aspects of • To determine students’ readiness to offer
social engineering. their passwords for various benefits
In Romania, 90 % of IT managers are (exam promotion, money);
unaware that their systems may store • To identify whether the subjects were
confidential data, while 75 % of them stated resistant to disclose they credentials
that employees have portable storage devices under teachers’ pressure;

DOI: 10.12948/issn14531305/18.2.2014.01
12 Informatica Economică vol. 18, no. 2/2014

• Network administrators’ influence on other personal data.


students; To check confidentiality of passwords used
• To reveal the size and reasons for which the following question was asked: “Have you
users are willing to allow other people ever given your e-mail or portal password to
use them accounts. someone" A significant proportion, 47 %,
Centralising the answers received from the admitted that they did not respect the
subjects resulted that they frequently use the confidentiality of their passwords and have
email services and are quite active on social shared information about them with other
networking sites. To the first two questions people. This shows that some of the
(“Do you use frequently e–mail services”, respondents are aware of the secrecy of these
“Do you use social networking? “) 82%, 83% forms of identification. The same number of
of respondents answered yes. This shows that individuals confirmed that their account has
they might be victims of social engineering been compromised at a particular point in
attacks, especially phishing attacks and/or time. Moreover, 50 % of respondents said
pharming. that they have written passwords on sheets of
The third question was whether they use the paper, notebooks, post -it or student cards.
same username and password to different e- Regarding the conditions in which people
mail accounts; 69 % of respondents stated surveyed would disclose passwords, 27% of
that they use the same username and them said they would disclose the password
password to different email accounts. This in exchange to 100 euros, while 35 % would
answer, correlated with the following disclose it in exchange to 200+ euros.
question ("Do you Use the same password on Regarding the pressure exerted by a teacher
e-mail accounts and social network on a student, promising to pass him, 44 % of
accounts?") on which 62 % answered that individuals said they would provide
they do not, we can deduce that the information concerning their e- mail
respondents are aware of the importance of accounts.
using different passwords and usernames for The study shows that most respondents know
each service they access. their network administrators, but only 42 %
Question number four was addressed in order are willing to provide them the password
to identify the availability of respondents to used to logging on to the portal. Also 12/20
disclose anonymously, their most commonly students think that the password can be
used passwords. Thus 83 % of respondents changed without their consent and that it is
revealed their most frequently used already known by administrators, but only 7
password. Analysing we found out that are think that this is impossible.
passwords of 52 % of the respondents had a Questions number eighteen and nineteen
low complexity, mostly consisting in names were asked in order to identify the
and other personal data. Also, 25 % of them availability of those questioned tallow
have a special meaning passwords (question another person to use their account and under
number six “What is the meaning of this what reasons. Thus 53 % responded that they
password? " ). are willing to let other people to use their e -
The goal on the seventh question was to mail. The main reasons stated were: that a
identify individuals who have information harmless email could not compromise their
about usernames or passwords of other account’s safety (16%) or that want to help a
people ("You happen to know the password person in a difficult situation (21%), they
from various e- mail systems, social network would allow them under close supervision
or portal of other people or colleagues?” ”If because nothing can happen (20% ), 6% of
yes, what is the most common password you respondents are willing to offer their help in
have heard?"). 42 % of respondents said they case of an emergency , the same percentage
know the other people’ passwords, and, most say they do not trust others so they will not
of the times they set as passwords, names or allow access. 23% of respondents , however,

DOI: 10.12948/issn14531305/18.2.2014.01
Informatica Economică vol. 18, no. 2/2014 13

stated that it is not normal for people to use argument/making_argument/three_persua


others’ e- mail in order to send messages. de.htm>. [Accessed 03 12 2012].
The questionnaire was applied to a total of [12] R. Cialdini, “Influence: The Psychology
131 people, aged between 19 and 20 years, of Persuasion”, USA: William Morow
enrolled in the first year at Economics, in the and Co., 2006.
presence of a teacher. [13] Regulamentului privind managementul
The questionnaire shows that the people situaţiilor de urgenţă specifice tipurilor de
surveyed do not manage their accounts and riscuri din domeniul de competenţă al
their passwords properly and could always be Ministerului comunicaţiilor şi tehnologiei
victims to a social engineering attack. I informaţiei. Vol. cap. I. Art. 3.
believe that the presence of a teacher and that [14] us-cert.gov., “Cyber security tips,”
the survey was done anonymously greatly [Online]. Available: <http://www.us-
influenced the responses of people cert.gov/cas/tips/ST04-014.html>.
interviewed. [Accessed 03 12 2012].
[15] M. Cristea, “Atacuri DOS. Taxonomie,
References prevenţie, consecinţe şi atacuri mixte”,
[1] D. Irani, “Reverse Social Engineering Timisoara, 2011, p. 32.
Attacks in OnLine Social Networks”, [16] “Phreaking” [Online]. Available:
2011. http://www.princeton.edu/~achaney/tmve
[2] Federal Communications Commission, /wiki100k/docs/Phreaking.html.
“Computer Security Notice: Social [Accessed 15 11 2012].
Engineering,” Computer Security Week, [17] “Dumpster Diving,” [Online].
p. 2, 2002. Available:http://iss.net/security_center/ad
[3] Enterprise Risk Management, “Social vice/Underground/Hacking/Methods/Wet
engineering: People Hacking,” 2009. Ware/ Dumpster_Diving/default.htm.
[4] S. Tzu, “The art of war”, Oxford: Oxford [Accessed 19.12 2012].
University Press, 1990, p. 66. [18] A. Whitaker, “Top 10 Social
[5] J. Goodchild, “Social Engineering: The Engineering Tactics,” [Online].
Basics.,” 05.12.2012. [Online]. Available:<http://www.informit.com/arti
Available:<http://www.csoonline.com/art cles/ article.aspx?p=1 350956&seqNum.
icle/514063/social-engineering-the- [Accessed 19 12 2012].
basics?page=3#psychology>. [Accessed [19] I. Pascaru, “Incidentele de securitate-
05 12 2012]. cum abordam aceasta problemă?,”
[6] H. Harley, “Re-Floating the Titanic: [Online]. Available:
Dealing with Social Engineering http://www.security.ase.md/publ/ro/pubro
Attacks”, London: EICAR, 1998, p. 13. 22.html. [Accessed 03 12 2012].
[7] N. J. Golstein, S. J. Martin, R. Cialdini, [20] “Small business security risk is high,”
50 de secrete ale artei persuasiunii, Iaşi: [Online].Available:www.allbusiness.com
Polirom, 2009, pp. 59-61. /operations/3872586-1.html. [Accessed
[8] ISACA, “Social engineering,” no. 7, june 01 03 2013].
2002. [21] ISACA Whitepapers, Top 5 Social
[9] D. Lakhani, “Persuasiunea, arta de a media risks for business, 2010.
obtine ceea ce vrei”, Bucureşti: Almatea, [22] “Pierderea sau furtul datelor
2009. confidenţiale costă companiile,” [Online].
[10] K. F. Dutton, The Art of Split-Second Available: http://www.securitatea-
Persuasion, Essex: Arrow Boks, 2011, informatica.ro/ securitatea-
pp. 23-45. informatica/pierderea-sau-furtul-datelor-
[11] “Three ways to persuade: confidentiale-costa-companiile.
Changingminds,” [Online]. Available: [Accessed 15 12 2012].
<http://changingminds.org/disciplines/

DOI: 10.12948/issn14531305/18.2.2014.01
14 Informatica Economică vol. 18, no. 2/2014

Valerică GREAVU-ŞERBAN has graduated the Faculty of Economics and


Business Administration in 1998. He holds a PhD diploma in Cybernetics
from 1999 and he had gone through all didactic positions since 2006 when he
joined the staff of the Alexandru Ioan Cuza University of Iaşi, teaching
assistant in 2006 and senior lecturer in 2009.

Oana ŞERBAN has graduated the Faculty of Economics and Business


Administration in 2013 and actually is student at Master Level, specialisation
Business Information Systems in Alexandru Ioan Cuza University of Iaşi. In
2013 was finalist in Economics Olympiad hosted in Timişoara.

DOI: 10.12948/issn14531305/18.2.2014.01

View publication stats

You might also like