Social engineering, a practical example

Authors

DOI:

https://doi.org/10.35290/ro.v2n3.2021.493

Keywords:

Social Engineering, Computer Attack, Computer Security, Social Hacking, Cyber Security

Abstract

Nowadays, companies have adopted digital storage spaces, where it collects one of its most valuable assets, the information, the same that can constitute data such as financial statements, customer portfolio, data that represents monetary value, etc., this can be coveted by malicious entities such as competing companies, former employees or also computer criminals, which can use this data as an object of sale to competitors, extortion, manipulation, among other crimes. Computer criminals have begun to steal and leak information through a set of methods and techniques, which is called social engineering, which focuses on attacks on employees of an entity. It is for this reason that it is necessary to carry out awareness campaigns to all the staff of a company, since it is one of the most exploited computer risk vectors in the history of cybersecurity. This research work proposes a methodology for the generation and execution of social engineering campaigns, which will result in a vulnerability assessment at the level of the personnel of a given company, and will conclude a degree of risk for it.

Downloads

Download data is not yet available.

References

Alonso, R. (10 de diciembre de 2020). Timo del CEO: el ciberataque con el que se roban millones haciendo una sola llamada. ABC Redes https://www.abc.es/tecnologia/redes/abci-timo-ciberataque-roban-millones-haciendo-sola-llamada-202012090135_noticia.html

Cannoles, B., & Ghafarian, A. (2017). Hacking Experiment by Using USB Rubber Ducky Scripting. Journal of Systemics, 15(2), 6671. http://www.iiisci.org/journal/sci/FullText.asp?var=&id=ZA340MX17

Casas, P. (19 noviembre de 2015). El triángulo de la seguridad. Universidad Nacional Autónoma de México. http://blogs.acatlan.unam.mx/lasc/2015/11/19/el-triangulo-de-la-seguridad/

Cordero, W. (2018). Implementación de técnicas de ingeniería social en la Institución Técnica de Panqueba. [Tesis de especialización, Universidad Nacional Abierta y a Distancia] Repositorio UNAD. https://repository.unad.edu.co/handle/10596/22690

Gophish. (s.f). Open-Source Phishing Framework. https://getgophish.com/

INCIBE. (05 de septiembre de 2019). Ingeniería social: técnicas utilizadas por los ciberdelincuentes y cómo protegerse. Instituto Nacional de Ciberseguridad. https://www.incibe.es/protege-tu-empresa/blog/ingenieria-social-tecnicas-utilizadas-los-ciberdelincuentes-y-protegerse

Jagatic, T. N., Johnson, N. A., Jakobsson, M., & Menczer, F. (2007). Social phishing. Communications of the ACM, 50(10), 94-100. https://doi.org/10.1145/1290958.1290968

Jones, K. S., Armstrong, M. E., Tornblad, M. K., & Namin, A. S. (2020). How social engineers use persuasion principles during vishing attacks. Information & Computer Security. https://www.emerald.com/insight/content/doi/10.1108/ICS-07-2020-0113/full/html

Lisa Institute. (08 de mayo de 2020). Guía Práctica contra la Ingeniería Social. https://www.lisainstitute.com/blogs/blog/guia-practica-ingenieria-social

Navarrete, J. (14 de septiembre de 2020). ECUADOR EN RIESGO – CIBERATAQUES. BDO Ecuador. https://www.bdo.ec/es-ec/noticias/2020/ecuador-en-riesgo-ciberataques

Paredes, A. R. Z., Quevedo, I. M. S., & Chalacán, L. J. M. (2020). Seguridad informática en las PyMES de la ciudad de Quevedo. Journal of business and entrepreneurial studie, 4(2). https://doi.org/10.37956/jbes.v4i2.97

SGSI. (01 de febrero de 2018). Los tres pilares de la seguridad de la información: confidencialidad, integridad y disponibilidad. Blog especializado en Sistemas de Gestión de Seguridad de la Información. https://www.pmg-ssi.com/2018/02/confidencialidad-integridad-y-disponibilidad/

welivesecurity. (21 de mayo de 2014). Las técnicas de Ingeniería Social evolucionaron, ¡presta atención!. https://www.welivesecurity.com/la-es/2014/05/21/tecnicas-ingenieria-social-evolucionaron-presta-atencion/

Published

2021-10-10

How to Cite

Prado Díaz, J. P. (2021). Social engineering, a practical example. ODIGOS JOURNAL, 2(3), 47–76. https://doi.org/10.35290/ro.v2n3.2021.493