OK so I'm doing a reserach proposal. This could very well turn out to be my thesis so this is of great importance to me. This might be something I set out to do with my life.
It's Social Engineering (IS related) and gaining access. A good example is if you know Kevin Mitnick and read his books (Art of Deception, Art of Intrusion). Now, please I ask, don't spam. If you have no idea about this subject, and no input, check the subject from wikipedia or something and come back with input or don't bother
So my area is gaining access (to IS) using Social Engineering. But I need research question, so I have to focus more. The research question is the culmination point of this all because it determines what I actually research if the proposal is good enough, meaning that the exact question will be my thesis and maybe later on, work, or further studies.
So I need to focus more so the framework is realistic. I picked up one technique of it, which is used a lot, and that is identity theft. Identity theft, assuming an identity, or possibly just discarding identity altogether. But most likely stealing an identity (for example within a company, prentending to be someone who is there in real life) or assuming an identity (person that doesn't exist). Using this technique to gain access is the thing I'm after.
But I need to focus even further. This still is A WIDE subject, so I'm looking for things I could focus with this.
Social Engineering:Gaining Access:Identity theft/Assuming identity:?
Remember, this is a research proposal, I'm proposing a research topic. If it works out, I might do this atual research (as my thesis).
So I'd like to have your input and ideas, throw them around, if you have good links and stuff, what ever.
I would truly appreciate your input.
ALSO ASHER, I NEED YOUR HELP. You have been talking about identification methods, and some kind of data-mining related to that, I can't remember exactly but you were after some particular technique. So everyone, please thow some identification methods around. For example voice detection, eye (iris?) detection, photo (picture) detection, all kinds of methods that are used for indentificating people. So these can be exploited when assuming an identity, so I'm going to get into that but I need all kinds of methods to identificate people, especially in business world, government official world, everything that is importnat and has information systems of importance that they restrict from public eye for what ever reasons.
Thank you.
It's Social Engineering (IS related) and gaining access. A good example is if you know Kevin Mitnick and read his books (Art of Deception, Art of Intrusion). Now, please I ask, don't spam. If you have no idea about this subject, and no input, check the subject from wikipedia or something and come back with input or don't bother
So my area is gaining access (to IS) using Social Engineering. But I need research question, so I have to focus more. The research question is the culmination point of this all because it determines what I actually research if the proposal is good enough, meaning that the exact question will be my thesis and maybe later on, work, or further studies.
So I need to focus more so the framework is realistic. I picked up one technique of it, which is used a lot, and that is identity theft. Identity theft, assuming an identity, or possibly just discarding identity altogether. But most likely stealing an identity (for example within a company, prentending to be someone who is there in real life) or assuming an identity (person that doesn't exist). Using this technique to gain access is the thing I'm after.
But I need to focus even further. This still is A WIDE subject, so I'm looking for things I could focus with this.
Social Engineering:Gaining Access:Identity theft/Assuming identity:?
Remember, this is a research proposal, I'm proposing a research topic. If it works out, I might do this atual research (as my thesis).
So I'd like to have your input and ideas, throw them around, if you have good links and stuff, what ever.
I would truly appreciate your input.
ALSO ASHER, I NEED YOUR HELP. You have been talking about identification methods, and some kind of data-mining related to that, I can't remember exactly but you were after some particular technique. So everyone, please thow some identification methods around. For example voice detection, eye (iris?) detection, photo (picture) detection, all kinds of methods that are used for indentificating people. So these can be exploited when assuming an identity, so I'm going to get into that but I need all kinds of methods to identificate people, especially in business world, government official world, everything that is importnat and has information systems of importance that they restrict from public eye for what ever reasons.
Thank you.
Comment