Results 1 to 10 of about 318,372 (171)

The Social Engineering Attack Spiral (SEAS) [PDF]

open access: yes2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), 2016
YesCybercrime is on the increase and attacks are becoming ever more sophisticated. Organisations are investing huge sums of money and vast resources in trying to establish effective and timely countermeasures.
Armitage, Lorna, Cullen, Andrea J.
core   +2 more sources

Model of Social Influence in Analysis of Socio-engineering Attacks

open access: yesУправленческое консультирование, 2021
The purpose of this study is to study the modernization of the model of an attacker’s social engineering attack on a user, taking into account a wider range of factors influencing the success of a social engineering attack associated with the principles ...
T. V. Tulupieva   +2 more
doaj   +1 more source

Social Engineering in Cybersecurity: Effect Mechanisms, Human Vulnerabilities and Attack Methods

open access: yesIEEE Access, 2021
Social engineering attacks have posed a serious security threat to cyberspace. However, there is much we have yet to know regarding what and how lead to the success of social engineering attacks.
Zuoguang Wang, Hongsong Zhu, Limin Sun
doaj   +1 more source

Social engineering in cybersecurity: a domain ontology and knowledge graph application examples

open access: yesCybersecurity, 2021
Social engineering has posed a serious threat to cyberspace security. To protect against social engineering attacks, a fundamental work is to know what constitutes social engineering.
Zuoguang Wang   +3 more
doaj   +1 more source

A Study on the Psychology of Social Engineering-Based Cyberattacks and Existing Countermeasures

open access: yesApplied Sciences, 2022
As cybersecurity strategies become more robust and challenging, cybercriminals are mutating cyberattacks to be more evasive. Recent studies have highlighted the use of social engineering by criminals to exploit the human factor in an organization’s ...
Murtaza Ahmed Siddiqi   +2 more
doaj   +1 more source

ANALYSIS OF USERS’ PROTECTION FROM SOCIO-ENGINEERING ATTACKS: SOCIAL GRAPH CREATION BASED ON INFORMATION FROM SOCIAL NETWORK WEBSITES [PDF]

open access: yesНаучно-технический вестник информационных технологий, механики и оптики, 2018
Subject of Research. The paper deals with accounts in social network websites as a source of information about the intensity of communication between employees in the team.
M. V. Abramov   +2 more
doaj   +1 more source

A URL-Based Social Semantic Attacks Detection With Character-Aware Language Model

open access: yesIEEE Access, 2023
Social engineering attacks rely on human errors and behavioral choices. The semantic attack, a subcategory of social engineering attacks, utilizes behavioral or cosmetic deception vectors (e.g., attacker creates a malicious website that looks like and ...
May Almousa, Mohd Anwar
doaj   +1 more source

Aspects of Social Engineering and Its Modalities to Countercharge and Prevent It [PDF]

open access: yesInformatică economică, 2022
In an Information Age that has been subjected to the phenomenon of forced digitalization, human propensity towards false information and the susceptibility to social engineering attacks have become a major concern in the field of information security ...
Valerica GREAVU-SERBAN   +1 more
doaj   +1 more source

Defending against social engineering attacks: A security pattern‐based analysis framework

open access: yesIET Information Security, 2023
Social engineering attacks are a growing threat to modern complex systems. Increasingly, attackers are exploiting people's "vulnerabilities" to carry out social engineering attacks for malicious purposes.
Tong Li, Chuanyong Song, Qinyu Pang
doaj   +1 more source

Applying BERT for Early-Stage Recognition of Persistence in Chat-Based Social Engineering Attacks

open access: yesApplied Sciences, 2022
Chat-based social engineering (CSE) attacks are attracting increasing attention in the Small-Medium Enterprise (SME) environment, given the ease and potential impact of such an attack.
Nikolaos Tsinganos   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy