0% found this document useful (0 votes)
225 views2 pages

Social Engineering PDF

Firewalls, intrusion detection, and anti-viruses can be bypassed through social engineering which manipulates human vulnerabilities. The CSIR has developed a model to perform early detection of social engineering attacks using psychologically-based principles and trust models. Attackers harvest and analyze data from social networking sites to create profiles of targets and better understand how to socially engineer them into performing attacks like opening malicious files containing malware.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
225 views2 pages

Social Engineering PDF

Firewalls, intrusion detection, and anti-viruses can be bypassed through social engineering which manipulates human vulnerabilities. The CSIR has developed a model to perform early detection of social engineering attacks using psychologically-based principles and trust models. Attackers harvest and analyze data from social networking sites to create profiles of targets and better understand how to socially engineer them into performing attacks like opening malicious files containing malware.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Focus on

CSIR services in
Cyber Defence: Social Engineering

Firewalls, intrusion detection and anti-viruses are


the most common defence mechanisms for network
systems. However, these can be bypassed by
manipulating the human vulnerabilities. This is the
process of Social Engineering.
Focus on CSIR services in Cyber Defence: Social Engineering

Contact details

Defence Peace Safety and Security


Social Engineering Attack Detection
Francois Mouton
The CSIR has developed a model which is used to perform early detection of social
engineering attacks. This model utilises both psychologically-based principles as well as [email protected]
trust models. 012 841 2242

Data Harvesting and Profiling


Aubrey Labuschagne
Many users utilise social networking sites with the purpose to connect with people, share [email protected]
information and create content. Users unknowingly share information that could be used
012 841 4536
for nefarious purposes against them. A social engineering attack requires data to assist
cyber criminals to create a profile to understand the target. The analysis of this data
[email protected]
by the attackers is used to get a better understanding of the methods to use to lure the
target into performing an attack - for example opening a malicious file that contains
embedded malware.

You might also like