Personalised social engineering

June 5, 2018 by David Bradley, Inderscience

Anybody can become the victim of a confidence trick, in the modern parlance they might succumb to social engineering. Through such illicit tools, a third party might gain access to the contents of one's hard drive, one's bank account, or even steal one's identity for nefarious purposes. Human behaviour and deception cut to the core of the modern hacker's approach to breaching so-called cyber security.

A snippet of information, a date of birth, a mother's unmarried name, a home address leaked by the gullible or deceived can be added to information gleaned from social media sites such as Facebook and Twitter where users commonly share their innermost secrets with no regard for privacy or ultimately their personal online . Researchers have previously demonstrated that human can influence the susceptibility of an individual to manipulation related to social engineering deception attacks and exploits. By creating a cognitive dissonance, a trickster might obtain useful information, such as login details, by simple of sophisticated deception. The end result will always be the same – a third party having access to an account, information, and data to which they have no legitimate claim.

Now, James Stewart of Keiser University, in Fort Lauderdale, Florida, and Maurice Dawson of the Illinois Institute of Technology, in Chicago, USA, have undertaken a quantitative and non-experimental study to investigate what specific factors lead to gullibility in an individual faced with social engineering threats based on personality traits. The team points out that security professionals are yet to address completely the human factors involved in data breaches and other hacking and cracking efforts. Nobody has yet found a viable strategy for investigating these nor has conventional training in security whether homeland security or business security squared up to the risks in a satisfying manner. "However, the human element has the greatest potential to compromise the embedded technology," Keiser and Dawson assert.

It has previously been observed that behaviour patterns and indicators, such as threat vulnerability, threat severity, trust, commitment, fear, and obedience to authority can often be manipulated by confidence tricksters of all kinds. The presence of such personality traits is commonly a strong indicator of susceptibility. The team has also looked for correlates with age, education level, country and other factors, such as ethnicity.

"The principle of influence independent variables were reactance, affective commitment and continuance commitment. The dependent susceptibility variable was a scored grouping of the principle of influence factors that included trust, vulnerability and threat and obedience," the team concludes.

Explore further: Study of fruit flies shows sex composition of group alters disease transmission

More information: James Stewart et al. How the modification of personality traits leave one vulnerable to manipulation in social engineering, International Journal of Information Privacy, Security and Integrity (2018). DOI: 10.1504/IJIPSI.2018.092057

Related Stories

Bring your own (security) disaster

December 14, 2016

Bring your own device (BYOD) to work is common practice these days. Almost everyone has a smart or a tablet and in many office and other jobs, using the device makes workers more effective and more efficient in their work ...

US reviewing better tech identifiers after hacks: Trump aide

October 3, 2017

US officials are studying ways to end the use of social security numbers for identification following a series of data breaches compromising the data for millions of Americans, a Trump administration official said Tuesday.

Recommended for you

Meteorite source in asteroid belt not a single debris field

February 17, 2019

A new study published online in Meteoritics and Planetary Science finds that our most common meteorites, those known as L chondrites, come from at least two different debris fields in the asteroid belt. The belt contains ...

Diagnosing 'art acne' in Georgia O'Keeffe's paintings

February 17, 2019

Even Georgia O'Keeffe noticed the pin-sized blisters bubbling on the surface of her paintings. For decades, conservationists and scholars assumed these tiny protrusions were grains of sand, kicked up from the New Mexico desert ...

Archaeologists discover Incan tomb in Peru

February 16, 2019

Peruvian archaeologists discovered an Incan tomb in the north of the country where an elite member of the pre-Columbian empire was buried, one of the investigators announced Friday.

Where is the universe hiding its missing mass?

February 15, 2019

Astronomers have spent decades looking for something that sounds like it would be hard to miss: about a third of the "normal" matter in the Universe. New results from NASA's Chandra X-ray Observatory may have helped them ...

What rising seas mean for local economies

February 15, 2019

Impacts from climate change are not always easy to see. But for many local businesses in coastal communities across the United States, the evidence is right outside their doors—or in their parking lots.


Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.