internet.com
You are in the: Small Business Computing Channelarrow View Sites +
Small Business Technology
» ECommerce-Guide | Small Business Computing | Webopedia | WinPlanet |  »Close
Webopedia.com
Enter a word for a definition... ...or choose a computer category.
 
 

menu
   Home
   Term of the Day
   New Terms
   Pronunciation
   New Links
   Quick Reference
   Did You Know?
   Categories
   Tech Support
   Webopedia Jobs
   About Us
   Link to Us
   Advertising
  

talk to us
   Submit a URL
   Suggest a Term
   Report an Error

internet.com
Developer
International
Internet Lists
Internet News
Internet Resources
IT
Linux/Open Source
Personal Technology
Small Business
Windows Technology
xSP Resources
Search internet.com
Advertise
Corporate Info
Newsletters
Tech Jobs
E-mail Offers
commerce
  Be a Commerce Partner
 
 
 
 
 
 
 
 
 
 
 
 
 
 

social engineering
Last modified: Wednesday, September 15, 2004 

(sō ´sh&l; en´´j&-nēr´ing) (n.) In the realm of computers, the act of obtaining or attempting to obtain otherwise secure data by conning an individual into revealing secure information. Social engineering is successful because its victims innately want to trust other people and are naturally helpful. The victims of social engineering are tricked into releasing information that they do not realize will be used to attack a computer network. For example, an employee in an enterprise may be tricked into revealing an employee identification number to someone who is pretending to be someone he trusts or representing someone he trusts. While that employee number may not seem valuable to the employee, which makes it easier for him to reveal the information in the first place, the social engineer can use that employee number in conjunction with other information that has been gathered to get closer to finding a way into the enterprise’s network.

Phishing is a type of security attack that relies on social engineering in that it lures the victim into revealing information based on the human tendency to believe in the security of a brand name because they associate the brand name with trustworthiness.

E-mail this definition to a colleague

Sponsored listings

Distance Learning: Classes USA - Learn about Bachelor, MBA and Certificate programs from accredited schools. Get free info on distance learning and online degrees.


For internet.com pages about social engineering . Also check out the following links!

Related Links

People Hacking: The Psychology of Social Engineering
Social engineering can involve a lot of 'groundwork', information gathering and idle chit chat before an attempt at gaining information is ever made. Like hacking, most of the work is in the preparation, rather than the attempt itself.

Social Engineering Fundamentals, Part I: Hacker Tactics
The basic goals of social engineering are the same as hacking in general: to gain unauthorized access to systems or information in order to commit fraud, network intrusion, industrial espionage, identity theft, or simply to disrupt the system or network.

Social Engineering: The Human Side Of Hacking
Hackers, and possibly even corporate competitors, are breeching companies' network security every day. Sometimes all they have to do is call up and ask.

related categories

Ethics

Security

related terms

e-mail spoofing

hacker

phishing

spam

virus


webopedia
Give Us Your
Feedback


Books
social engineering Products


Shop by Top Models:
Blue Gold: A Novel from the Numa Files
5 store offers from $2 - $30

Rose: UN Mundo Sin Sol
5 store offers from $2.95 - $19.95

Skinny Dip
5 store offers from $3 - $48

Belles on Their Toes
5 store offers from $2.95 - $12.95

Oryx and Crake: A Novel
6 store offers from $3 - $52



JupiterWeb networks:

internet.comearthweb.comDevx.com graphics.com

Search JupiterWeb:

Jupitermedia Corporation has two divisions:
Jupiterimages andJupiterWeb


Legal Notices, Licensing, Reprints, & Permissions, Privacy Policy.

Jupitermedia Corporate Info | Newsletters | Tech Jobs | Shopping | E-mail Offers