Deception of Phishing: Studying the Techniques of Social Engineering by Analyzing Modern-day Phishing Attacks on Universities.
Metadata Field | Value | Language |
---|---|---|
dc.contributor.advisor | Weaver, Greg | en_US |
dc.contributor.author | Walker, Lauren Elizabeth | en_US |
dc.date.accessioned | 2016-05-05T20:16:13Z | |
dc.date.available | 2016-05-05T20:16:13Z | |
dc.date.issued | 2016-05-05 | |
dc.identifier.uri | http://hdl.handle.net/10415/5175 | |
dc.description.abstract | Techniques applying manipulation, persuasion, and influence have been used for centuries to conduct malicious acts of crime against others. Social engineering is the act of using various manipulation techniques to get other individuals to give private or confidential information they would not otherwise divulge. In today’s technologically connected society, social engineers have begun to focus and apply their skills onto the cyber realm in hopes of gaining access to unauthorized or private information. A sample of phishing emails attempts on an American university is utilized to analyze patterns of influence and persuasion techniques of social engineers. By understanding the patterns of the phishing emails hitting college campuses, a generic profile can be developed of what campus officials should prepare for both proactively and reactively to secure their institutions | en_US |
dc.rights | EMBARGO_NOT_AUBURN | en_US |
dc.subject | Sociology | en_US |
dc.title | Deception of Phishing: Studying the Techniques of Social Engineering by Analyzing Modern-day Phishing Attacks on Universities. | en_US |
dc.type | Master's Thesis | en_US |
dc.embargo.length | MONTHS_WITHHELD:13 | en_US |
dc.embargo.status | EMBARGOED | en_US |
dc.embargo.enddate | 2017-05-07 | en_US |
dc.contributor.committee | Furr, Allen | en_US |
dc.contributor.committee | Norton, Robert | en_US |