Proceedings. 25th Annual 1991 IEEE International Carnahan Conference on Security Technology
DOI: 10.1109/ccst.1991.202213
|View full text |Cite
|
Sign up to set email alerts
|

In search of the cuckoo's nest (computer security)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…posing as a telecommunications employee to gain more knowledge and insight into the different phone network systems. Kluepfel [32] described social engineering as an exploitation towards employees in telephone industry through fraudulent impersonation of other employees or vendors. Social engineering was also regarded as bullshitting [33], trickery and deceit [34] to obtain information.…”
Section: B Social Engineering In the Phrack Phasementioning
confidence: 99%
“…posing as a telecommunications employee to gain more knowledge and insight into the different phone network systems. Kluepfel [32] described social engineering as an exploitation towards employees in telephone industry through fraudulent impersonation of other employees or vendors. Social engineering was also regarded as bullshitting [33], trickery and deceit [34] to obtain information.…”
Section: B Social Engineering In the Phrack Phasementioning
confidence: 99%
“…According to these authors SE, whilst still in its infancy, is seen as "an attempt to exploit the help desks and other related support services normally associated with computer systems" [4]. SE was later described as "trickery and deceit, also known as Social Engineering", according to Kluepfel (1989) [5,6]. Even in one of the most prominent hacker magazines, the 2600: The Hacker Quarterly 1 , the term Social Engineering was not widely used.…”
Section: Defining Social Engineeringmentioning
confidence: 99%