The Social Engineering Attack Spiral (SEAS) [PDF]
YesCybercrime is on the increase and attacks are becoming ever more sophisticated. Organisations are investing huge sums of money and vast resources in trying to establish effective and timely countermeasures.
Armitage, Lorna, Cullen, Andrea J.
core +2 more sources
Model of Social Influence in Analysis of Socio-engineering Attacks
The purpose of this study is to study the modernization of the model of an attacker’s social engineering attack on a user, taking into account a wider range of factors influencing the success of a social engineering attack associated with the principles ...
T. V. Tulupieva +2 more
doaj +1 more source
Social Engineering in Cybersecurity: Effect Mechanisms, Human Vulnerabilities and Attack Methods
Social engineering attacks have posed a serious security threat to cyberspace. However, there is much we have yet to know regarding what and how lead to the success of social engineering attacks.
Zuoguang Wang, Hongsong Zhu, Limin Sun
doaj +1 more source
Social engineering in cybersecurity: a domain ontology and knowledge graph application examples
Social engineering has posed a serious threat to cyberspace security. To protect against social engineering attacks, a fundamental work is to know what constitutes social engineering.
Zuoguang Wang +3 more
doaj +1 more source
A Study on the Psychology of Social Engineering-Based Cyberattacks and Existing Countermeasures
As cybersecurity strategies become more robust and challenging, cybercriminals are mutating cyberattacks to be more evasive. Recent studies have highlighted the use of social engineering by criminals to exploit the human factor in an organization’s ...
Murtaza Ahmed Siddiqi +2 more
doaj +1 more source
ANALYSIS OF USERS’ PROTECTION FROM SOCIO-ENGINEERING ATTACKS: SOCIAL GRAPH CREATION BASED ON INFORMATION FROM SOCIAL NETWORK WEBSITES [PDF]
Subject of Research. The paper deals with accounts in social network websites as a source of information about the intensity of communication between employees in the team.
M. V. Abramov +2 more
doaj +1 more source
A URL-Based Social Semantic Attacks Detection With Character-Aware Language Model
Social engineering attacks rely on human errors and behavioral choices. The semantic attack, a subcategory of social engineering attacks, utilizes behavioral or cosmetic deception vectors (e.g., attacker creates a malicious website that looks like and ...
May Almousa, Mohd Anwar
doaj +1 more source
Aspects of Social Engineering and Its Modalities to Countercharge and Prevent It [PDF]
In an Information Age that has been subjected to the phenomenon of forced digitalization, human propensity towards false information and the susceptibility to social engineering attacks have become a major concern in the field of information security ...
Valerica GREAVU-SERBAN +1 more
doaj +1 more source
Defending against social engineering attacks: A security pattern‐based analysis framework
Social engineering attacks are a growing threat to modern complex systems. Increasingly, attackers are exploiting people's "vulnerabilities" to carry out social engineering attacks for malicious purposes.
Tong Li, Chuanyong Song, Qinyu Pang
doaj +1 more source
Applying BERT for Early-Stage Recognition of Persistence in Chat-Based Social Engineering Attacks
Chat-based social engineering (CSE) attacks are attracting increasing attention in the Small-Medium Enterprise (SME) environment, given the ease and potential impact of such an attack.
Nikolaos Tsinganos +2 more
doaj +1 more source

