Dark Mode
Capec-417 Detail
Influence Perception
Standard Social Engineering Likelihood: High Typical Severity: Low
Parents: 416
Children: 418 420 421 422 423 424
The adversary uses social engineering to exploit the target's perception of the relationship between the adversary and themselves. This goal is to persuade the target to unknowingly perform an action or divulge information that is advantageous to the adversary.
Not present
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-417 | capec | https://capec.mitre.org/data/definitions/417.html | |
| REF-348 | reference_from_CAPEC | http://www.social-engineer.org | The Official Social Engineering Portal, Social-Engineer.org, Tick Tock Computers, LLC |
| REF-360 | reference_from_CAPEC | Social Engineering: The Art of Human Hacking, 2010, Wiley |
Not present
- The adversary must have the means and knowledge of how to communicate with the target in some manner.
- There are no necessary resources required for this attack.
| Low |
|---|
| The adversary requires strong inter-personal and communication skills. |
| Integrity | Availability | Confidentiality |
|---|---|---|
| Other (Attacks that influence the perception of the target can result in a wide variety of consequences and negatively affect potentially the confidentiality, availability, and/or integrity of an application or system.) | Other (Attacks that influence the perception of the target can result in a wide variety of consequences and negatively affect potentially the confidentiality, availability, and/or integrity of an application or system.) | Other (Attacks that influence the perception of the target can result in a wide variety of consequences and negatively affect potentially the confidentiality, availability, and/or integrity of an application or system.) |
Not present