As the world grows ever more reliant on information technology, the potential risks of this complex infrastructure also increase. Criminal entities and organizations continue to seek advanced methods of deceit and fraud even as forms of information exchange evolve and change.
As a result, anyone who wants to confront the future of tech-based crimes will benefit from a deep understanding of cybercrime. The online Master of Arts (MA) in Criminology program from St. Thomas University (STU) provides exactly this type of foundational knowledge of criminal behavior and activity.
Students will leave the program equipped for various leadership roles in their chosen field with courses like Cybercrime and Its Control and Advanced Criminological Theory. Professionals trained in such essential skills will become increasingly vital to all types of organizations. As CYE, a cybersecurity firm, states: “In an increasingly digital world, organizations face a growing threat: cyber incidents involving the theft of money through a combination of cyberattacks and social engineering. This exploits both technical vulnerabilities and human psychology, making it a challenge for businesses to defend against.”
Technological Advances Driving Growth of Social Engineering
It is vital to understand the role of social engineering in cybercrime. The first and most important fact about cybersecurity is that humans are always the biggest weakness of any system. Social engineering is a strategy that exploits this weakness: “In a social engineering threat, an attacker uses human emotion (usually fear and urgency) to trick the target into performing an action, such as sending the attacker money, divulging sensitive customer information, or disclosing authentication credentials,” according to Proofpoint.
More specifically, social engineering in the context of cybercrime employs specific tactics to breach an organization’s security systems. Proofpoint notes that social engineering relies on persuasion, exploitation and psychological manipulation to trick its targets into making mistakes and divulging critical information. “Social engineering attacks rely on human interaction and often involve conning victims into breaking normal security procedures,” states Proofpoint. “For instance, social engineering attacks can be highly effective because they’re based on the human tendency to trust others or explore one’s curiosity about new offers or information acting as bait.”
How Cybercriminals Exploit Human Behavior
Those studying the threat posed by cybercrime would do well to understand the specific elements of social engineering attacks. For example, the insurance brokerage firm Horton categorizes several well-known social engineering tactics as the “ishings.” These include phishing, a common strategy that involves cybercriminals sending fake emails that attempt to trick the recipient into believing they are legitimate.
“These emails might ask you to click on a link, download an attachment, or even send money,” Horton notes. “One particularly sneaky tactic is CEO fraud, where criminals impersonate a company executive and ask an employee to make an urgent payment or transfer.” Similar scams include voice phishing, which attempts to fool people over the phone, and quishing, which uses malicious QR codes to direct users to fake websites, according to Horton.
The Role of Artificial Intelligence in Social Manipulation and Fraud
While many businesses are incorporating artificial intelligence into their day-to-day activities, scammers and cybercriminals use the same tools for their own ends. As AI technology improves, cybercrime can occur at volumes not previously possible. As Black Hat points out: “With advancements in AI tech, targeted social engineering attacks are becoming easier to execute, on a larger scale, and with lower costs for criminal groups.”
These attacks are enhanced because AI enables those who engage in social engineering to create automated mass phishing campaigns, allowing them to target many more victims than previously possible. In addition, the email or audio messages created by AI can also be “tailored to an individual target’s vulnerabilities, preferences, social network, or interests — increasing the chances that a large-scale attack will successfully deceive victims,” according to Black Hat.
The world of cybercrime and social engineering can seem scary and ominous. However, an advanced degree in criminology is one way that future leaders in cybersecurity can prepare themselves to understand and combat it. By delving into the underlying factors that contribute to criminal behavior, a research-based opportunity like STU’s online MA Criminology program provides graduates with the insights necessary to succeed.
Learn more about STU’s online MA Criminology program.