The Art of Deception: Unmasking the Tools and Psychological Principles Behind Social Engineering

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Abstract

    Social engineering, which is often underestimated in the cybersecurity community, actually plays a pivotal role in today’s complex world. In this chapter, we explore the techniques and principles employed in the art of social engineering and draw insights from real-world examples. We aim to provide a comprehensive understanding of malicious actors and their methods. Our discussion examines the vulnerabilities inherent in human nature that become exploitable in the realm of deception, which is the essence of social engineering. In addition to examining various social engineering techniques, we explore the psychological aspects of social engineering, where the most critical components are found. Furthermore, we introduce the Social Engineering Toolkit (SET), a standard tool for conducting social engineering penetration testing that is renowned for its versatile capabilities within the Kali Linux toolkit. A fundamental aspect of social engineering lies in an attacker’s ability to comprehend, assess, and leverage the emotional vulnerabilities of individuals, a skill that can only be mastered through an understanding of psychological principles.

    Original languageEnglish
    Title of host publicationSocial Engineering in Cybersecurity
    Subtitle of host publicationThreats and Defenses
    PublisherCRC Press
    Pages119-140
    Number of pages22
    ISBN (Electronic)9781040018644
    ISBN (Print)9781032524405
    DOIs
    Publication statusPublished - 01-01-2024

    All Science Journal Classification (ASJC) codes

    • General Economics,Econometrics and Finance
    • General Business,Management and Accounting
    • General Computer Science

    Fingerprint

    Dive into the research topics of 'The Art of Deception: Unmasking the Tools and Psychological Principles Behind Social Engineering'. Together they form a unique fingerprint.

    Cite this