Social Recruiting: a Next Generation Social Engineering Attack
ABSTRACT
Social engineering attacks initially experienced success due to the lack of understanding of the attack vector and resultant lack of remedial actions. Due to an increase in media coverage corporate bodies have begun to defend their interests from this vector. This has resulted in a new generation of social engineering attacks that have adapted to the industry response. These new forms of attack take into account the increased likelihood that they will be detected; rendering traditional defences against social engineering attacks moot. This paper highlights these attacks and will explain why traditional defences fail to address them as well as suggest new methods of incident response.
AUTHORS
Department of Computer Science, Rhodes University, Grahamstown
South Africa,
Adam Schoeman holds both CISSP-ISSAP and CISA certification. He is a member of the Security and Networks Research Group (SNRG) within the department of Computer Science at Rhodes University, where he is working toward his Masters Degree. His research interests include low interaction detection systems and procedural information security
Department of Computer Science, Rhodes University Grahamstown
South Africa
Barry Irwin is an Associate Professor in the Department of Computer Science at Rhodes University, South Africa. He established and has led the Security and Networks Research Group (SNRG) since its founding in 2003. He holds a PhD from Rhodes University and a CISSP. His current areas of research include network traffic analysis, data visualization and webserver malware.
Published In
Keywords
Journal of Information Warfare
The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.
Quick Links
Archive