Reference Hub47
Social Engineering: The Neglected Human Factor for Information Security Management

Social Engineering: The Neglected Human Factor for Information Security Management

Xin Luo, Richard Brody, Alessandro Seazzu, Stephen Burd
Copyright: © 2011 |Volume: 24 |Issue: 3 |Pages: 8
ISSN: 1040-1628|EISSN: 1533-7979|EISBN13: 9781613505250|DOI: 10.4018/irmj.2011070101
Cite Article Cite Article

MLA

Luo, Xin, et al. "Social Engineering: The Neglected Human Factor for Information Security Management." IRMJ vol.24, no.3 2011: pp.1-8. http://doi.org/10.4018/irmj.2011070101

APA

Luo, X., Brody, R., Seazzu, A., & Burd, S. (2011). Social Engineering: The Neglected Human Factor for Information Security Management. Information Resources Management Journal (IRMJ), 24(3), 1-8. http://doi.org/10.4018/irmj.2011070101

Chicago

Luo, Xin, et al. "Social Engineering: The Neglected Human Factor for Information Security Management," Information Resources Management Journal (IRMJ) 24, no.3: 1-8. http://doi.org/10.4018/irmj.2011070101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Effective information systems security management combines technological measures and managerial efforts. Although various technical means have been employed to cope with security threats, human factors have been comparatively neglected. This article examines human factors that can lead to social engineering intrusions. Social engineering is a technique used by malicious attackers to gain access to desired information by exploiting the flaws in human logic known as cognitive biases. Social engineering is a potential threat to information security and should be considered equally important to its technological counterparts. This article unveils various social engineering attacks and their leading human factors, and discusses several ways to defend against social engineering: education, training, procedure, and policy. The authors further introduce possible countermeasures for social engineering attacks. Future analysis is also presented.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.