29.07.2016 Views

Cyber Primer

AEWhbF

AEWhbF

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Cyber</strong> threats<br />

Case study 8 – Social engineering for the<br />

purpose of espionage<br />

These actions frequently take the form of phishing attacks or identity<br />

theft and are often aimed at social engineering, fraud or embarrassing the<br />

individual.<br />

US Admiral James Stavridis and his Facebook profile webpage<br />

© Shutterstock<br />

Social media application Facebook<br />

Social engineering attack, reportedly originating from China, harvested the<br />

details of those who accepted requests from a fake account.<br />

48<br />

<strong>Cyber</strong> <strong>Primer</strong> (2nd Edition)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!