Results 21 to 30 of about 318,491 (290)

An Intelligent Penetration Test Simulation Environment Construction Method Incorporating Social Engineering Factors

open access: yesApplied Sciences, 2022
The penetration test has many repetitive operations and requires advanced expert knowledge, therefore, the manual penetration test is inefficient. With the development of reinforcement learning, the intelligent penetration test has been a research ...
Yang Li   +4 more
doaj   +1 more source

Experimental Case Studies for Investigating E-Banking Phishing Techniques and Attack Strategies [PDF]

open access: yes, 2010
Phishing is a form of electronic identity theft in which a combination of social engineering and web site spoofing techniques are used to trick a user into revealing confidential information with economic value.
Aburrous, Maher   +3 more
core   +1 more source

A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks [PDF]

open access: yes, 2015
Social engineering is used as an umbrella term for a broad spectrum of computer exploitations that employ a variety of attack vectors and strategies to psychologically manipulate a user.
Heartfield, Ryan, Loukas, George
core   +2 more sources

Psychological Aspects of the Organization’s Information Security in the Context of Socio-engineering Attacks

open access: yesУправленческое консультирование, 2022
The purpose of this review article is to determine approaches to solving existing problems in taking into account the psychological aspects of an organization’s information security in the context of socio-engineering attacks based on the analysis and ...
T. V. Tulupieva
doaj   +1 more source

Social Engineering Attack Strategies and Defence Approaches [PDF]

open access: yes2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud), 2016
This paper examines the role and value of information security awareness efforts in defending against social engineering attacks. It categories the different social engineering threats and tactics used in targeting employees and the approaches to defend against such attacks.
Ghafir, I   +3 more
openaire   +2 more sources

Social Engineering Attacks and Countermeasures in the New Zealand Banking System: Advancing a User-Reflective Mitigation Model

open access: yesInformation, 2018
Social engineering attacks are possibly one of the most dangerous forms of security and privacy attacks since they are technically oriented to psychological manipulation and have been growing in frequency with no end in sight.
David Airehrour   +2 more
doaj   +1 more source

SEADer++: social engineering attack detection in online environments using machine learning

open access: yesJournal of Information and Telecommunication, 2020
Social engineering attacks are one of the most well-known and easiest to apply attacks in the cybersecurity domain. Research has shown that the majority of attacks against computer systems was based on the use of social engineering methods.
Merton Lansley   +3 more
doaj   +1 more source

Case Study On Social Engineering Techniques for Persuasion [PDF]

open access: yes, 2010
There are plenty of security software in market; each claiming the best, still we daily face problem of viruses and other malicious activities. If we know the basic working principal of such malware then we can very easily prevent most of them even ...
Hasan, Mosin   +2 more
core   +3 more sources

Social Engineering Attacks During the COVID-19 Pandemic [PDF]

open access: yesSN Computer Science, 2021
The prevailing conditions surrounding the COVID-19 pandemic has shifted a variety of everyday activities onto platforms on the Internet. This has led to an increase in the number of people present on these platforms and also led to jump in the time spent by existing participants online.
Venkatesha, Sushruth   +2 more
openaire   +2 more sources

Markov Decision Process for Modeling Social Engineering Attacks and Finding Optimal Attack Strategies

open access: yesIEEE Access, 2022
It is important to comprehend the attacker’s behavior and capacity in order to build a stronger fortress and thus be able to protect valuable assets more effectively.
Faranak Abri   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy