Social engineering

Authors

  • José Hernando López Torres Fundación Universitaria San Mateo
  • Jasson Esteban Torres Buitrago Fundación Universitaria San Mateo

DOI:

https://doi.org/10.21803/ingecana.3.3.740

Keywords:

Encompasses, Leverage, Data, Challenge, Deceive, Scammers, Information

Abstract

Social engineering is a technique which is used to deceive and manipulate people in order to have confidential information, it is based on taking advantage of human psychology and all possible social interaction to achieve the objectives, which is why through Through this manipulation, those who perform social engineering infiltrate different types of systems and organizations. Social engineering in the information security environment represents a great challenge since society must take measures to educate itself about all the risks that this encompasses, promoting security awareness and establishing certain criteria to guarantee the protection of information.

Downloads

Download data is not yet available.

References

Ymant Servicios Informáticos, "Ymant Servicios Informáticos," Dec. 13, 2022. [Online]. Available: https://www.ymant.com/blog/ingenieria-social/. [Accessed: Jun. 12, 2023].

S. Pagnotta, "WeliveSecurity," Dec. 01, 2015. [Online]. Available: https://www.welivesecurity.com/la-es/2015/12/01/historias-de-ingenieria-social-ridiculas/. [Accessed: Jun. 12, 2023].

INCIBE, "INCIBE - Instituto Nacional de Ciberseguridad," Sep. 05, 2019. [Online]. Available: https://www.incibe.es/empresas/blog/ingenieria-social-tecnicas-utilizadas-los-ciberdelincuentes-y-protegerse. [Accessed: Jun. 13, 2023].

L. Lubeck, "Welivesecurity," Jan. 07, 2021. [Online]. Available: https://www.welivesecurity.com/la-es/2021/01/07/2020-duplico-detecciones-ataques-ingenieria-social/. [Accessed: Jun. 13, 2023].

J. M. Mesia, "Agenda tecnologia web," Feb. 27, 2021. [Online]. Available: https://agendatecnologicaweb.com/marsh-y-microsoft-ingenieria-social-o-phishing-es-el-ciberataque-que-mas-aumento-en-peru-a-raiz-de-la-pandemia/. [Accessed: Jun. 13, 2023].

M. Jimenez, "Pirani Risk," Oct. 12, 2022. [Online]. Available: https://www.piranirisk.com/es/blog/ingenieria-social-ciberataques-y-prevencion?hs_amp=true&utm_term=&utm_campaign=Matriz+de+Riesgos+-+General+-+Julio+2022&utm_source=adwords&utm_medium=ppc&hsa_acc=9508207643&hsa_cam=17802451156&hsa_grp=138377008319&hsa_ad. [Accessed: Jun. 13, 2023].

N. Cardeño Portela, E. J. Cardeño Portela, y E. Bonilla Blanchar, «TIC y transformación académica en las universidades», Región Científica, vol. 2, n.º 2, p. 202370, jul. 2023.

M. Ripoll Rivaldo, «El emprendimiento social universitario como estrategia de desarrollo en personas, comunidades y territorios», Región Científica, vol. 2, n.º 2, p. 202379, jul. 2023.

F. Machuca-Contreras, C. Canova-Barrios, y M. F. Castro, «Una aproximación a los conceptos de innovación radical, incremental y disruptiva en las organizaciones», Región Científica, vol. 2, n.º 1, p. 202324, ene. 2023.

Downloads

Published

2024-04-01 — Updated on 2024-04-01

Issue

Section

Articles

How to Cite

[1]
J. H. López Torres and J. E. . Torres Buitrago, “Social engineering”, iname, vol. 3, no. 3, p. e-740, Apr. 2024, doi: 10.21803/ingecana.3.3.740.