CAPEC-422: Influence Perception of Commitment and Consistency |
Description An adversary uses social engineering to convince the target to do minor tasks as opposed to larger actions. After complying with a request, individuals are more likely to agree to subsequent requests that are similar in type and required effort. Likelihood Of Attack Typical Severity Prerequisites
| The adversary must have the means and knowledge of how to communicate with the target in some manner. |
Skills Required
[Level: Low] The adversary requires strong inter-personal and communication skills. |
Resources Required
| None: No specialized resources are required to execute this type of attack. |
Consequences This table specifies different individual consequences associated with the attack pattern. The Scope identifies the security property that is violated, while the Impact describes the negative technical impact that arises if an adversary succeeds in their attack. The Likelihood provides information about how likely the specific consequence is expected to be seen relative to the other consequences in the list. For example, there may be high likelihood that a pattern will be used to achieve a certain impact, but a low likelihood that it will be exploited to achieve a different impact.| Scope | Impact | Likelihood |
|---|
Confidentiality Integrity Availability | Other | |
Mitigations
| An organization should provide regular, robust cybersecurity training to its employees to prevent social engineering attacks. |
| Individuals should avoid complying with suspicious requests. |
References Content History | Submissions |
|---|
| Submission Date | Submitter | Organization |
|---|
| 2014-06-23 (Version 2.6) | CAPEC Content Team | The MITRE Corporation | | | Modifications |
|---|
| Modification Date | Modifier | Organization |
|---|
| 2017-08-04 (Version 2.11) | CAPEC Content Team | The MITRE Corporation | | Updated Attack_Motivation-Consequences, Attack_Prerequisites, Attacker_Skills_or_Knowledge_Required, Description Summary, Methods_of_Attack, References, Related_Attack_Patterns, Resources_Required, Solutions_and_Mitigations, Typical_Likelihood_of_Exploit | | 2020-12-17 (Version 3.4) | CAPEC Content Team | The MITRE Corporation | | Updated Mitigations | | Previous Entry Names |
|---|
| Change Date | Previous Entry Name |
|---|
| 2017-08-04 (Version 2.11) | Target Influence via Perception of Commitment and Consistency | |
More information is available — Please select a different filter.
|