Impacts of Social Engineering on Information Security
Keywords:
attacker; data; impact; leak; vulnerability.Abstract
Currently, there are several types of methods of obtaining data, which can be from people, equipment or even companies. This data can be used in different ways, ranging from a simple purchase suggestion to a customer, to the exploitation of system vulnerabilities to obtain sensitive data from an organization.
One of the most worrying methods for information security is what they call social engineering, as they do not require technical knowledge, but rather persuasion power to get important information from the people themselves or simply a search on social networks and obtain data there, which to the person, they may mean nothing, but to an attacker, it could be the beginning of discovering a vulnerability.
This article addresses the issues that social engineering causes for personal and business security, how these issues can be addressed, and what can be done to mitigate the issues caused by these data leak.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 Portugues
![Creative Commons License](http://i.creativecommons.org/l/by-nc/4.0/88x31.png)
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
A Revista Brasileira em Tecnologia da Informação utiliza a licença do Creative Commons (CC), preservando assim, a integridade dos artigos em ambiente de acesso aberto.