Results 1 to 10 of about 225,903 (171)

Social Engineering Attacks: A Survey [PDF]

open access: yesFuture Internet, 2019
The advancements in digital communication technology have made communication between humans more accessible and instant. However, personal and sensitive information may be available online through social networks and online services that lack the ...
Fatima Salahdine, Naima Kaabouch
doaj   +2 more sources

The Social Engineering Attack Spiral (SEAS) [PDF]

open access: yes2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), 2016
YesCybercrime is on the increase and attacks are becoming ever more sophisticated. Organisations are investing huge sums of money and vast resources in trying to establish effective and timely countermeasures.
Armitage, Lorna, Cullen, Andrea J.
core   +2 more sources

Social Engineering Attacks During the COVID-19 Pandemic. [PDF]

open access: yesSN Comput Sci, 2021
The prevailing conditions surrounding the COVID-19 pandemic has shifted a variety of everyday activities onto platforms on the Internet. This has led to an increase in the number of people present on these platforms and also led to jump in the time spent by existing participants online.
Venkatesha S, Reddy KR, Chandavarkar BR.
europepmc   +4 more sources

Exploiting personality traits in social engineering attacks [PDF]

open access: yesRevista Română de Informatică și Automatică, 2022
Phishing attacks have become more sophisticated over time, more than any other forms of social engineering attacks, exploiting the end users’ vulnerabilities and weaknesses.
Irina CRISTESCU   +2 more
doaj   +1 more source

Social Engineering Attacks Prevention: A Systematic Literature Review

open access: yesIEEE Access, 2022
Social engineering is an attack on information security for accessing systems or networks. Social engineering attacks occur when victims do not recognize methods, models, and frameworks to prevent them.
Wenni Syafitri   +4 more
doaj   +1 more source

Social Engineering in Cybersecurity: Effect Mechanisms, Human Vulnerabilities and Attack Methods

open access: yesIEEE Access, 2021
Social engineering attacks have posed a serious security threat to cyberspace. However, there is much we have yet to know regarding what and how lead to the success of social engineering attacks.
Zuoguang Wang, Hongsong Zhu, Limin Sun
doaj   +1 more source

Defending against social engineering attacks: A security pattern‐based analysis framework

open access: yesIET Information Security, 2023
Social engineering attacks are a growing threat to modern complex systems. Increasingly, attackers are exploiting people's "vulnerabilities" to carry out social engineering attacks for malicious purposes.
Tong Li, Chuanyong Song, Qinyu Pang
doaj   +1 more source

Aspects of Social Engineering and Its Modalities to Countercharge and Prevent It [PDF]

open access: yesInformatică economică, 2022
In an Information Age that has been subjected to the phenomenon of forced digitalization, human propensity towards false information and the susceptibility to social engineering attacks have become a major concern in the field of information security ...
Valerica GREAVU-SERBAN   +1 more
doaj   +1 more source

SOCIAL ENGINEERING AS AN EVOLUTIONARY THREAT TO INFORMATION SECURITY IN HEALTHCARE ORGANIZATIONS

open access: yesJurnal Administrasi Kesehatan Indonesia, 2020
Information security in healthcare settings is overlooked even though it is the most vulnerable for social engineering attacks. The theft of hospital information data is critical to be monitored as they contain patients’ confidential health information ...
Naiya Patel
doaj   +1 more source

Review OSINT tool for social engineering

open access: yesFrontiers in Big Data, 2023
In recent years, we observed an increase in cyber threats, especially social engineering attacks. By social engineering, we mean a set of techniques and tools to collect information about a person or target to extort sensitive information.
Martina Nobili
doaj   +1 more source

Home - About - Disclaimer - Privacy