The methods that will most effectively minimize the ability of intruders to compromise information security are comprehensive user training and education. Enacting policies and procedures simply won't suffice. Even with oversight the policies and procedures may not be effective: my access to Motorola, Nokia, ATT, Sun depended upon the willingness of people to bypass policies and procedures that were in place for years before I compromised them successfully.
Kevin MitnickSo the ethic I was taught in school resulted in the path I chose in my life following school.
Kevin MitnickI'm still a hacker. I get paid for it now. I never received any monetary gain from the hacking I did before. The main difference in what I do now compared to what I did then is that I now do it with authorization.
Kevin MitnickSocial engineering is using manipulation, influence and deception to get a person, a trusted insider within an organization, to comply with a request, and the request is usually to release information or to perform some sort of action item that benefits that attacker.
Kevin MitnickItโs actually a smarter crime because imagine if you rob a bank, or youโre dealing drugs. If you get caught youโre going to spend a lot of time in custody. But with hacking, itโs much easier to commit the crime and the risk of punishment is slim to none.
Kevin Mitnick