Results 241 to 250 of about 226,022 (290)
Some of the next articles are maybe not open access.
Counteracting social engineering attacks
Computer Fraud & Security, 2021Social engineers are very successful at exploiting human weaknesses, gathering information, communicating with people and creating creative storylines attacking people's psychological needs and weaknesses. And that is why people, who are among the weakest links in the information security chain, remain susceptible to social engineering attacks.
Affan Yasin +5 more
openaire +1 more source
Strategies for counteracting social engineering attacks
Computer Fraud & Security, 2022As the result of a five-year project investigating social engineering attacks, researchers at Tsinghua University, China have identified a number of strategies that organisations can use to protect themselves. However, they warn that there is no single strategy that works for all forms of attack.
Rubia Fatima +3 more
openaire +1 more source
Social engineering attack framework
2014 Information Security for South Africa, 2014The field of information security is a fast growing discipline. Even though the effectiveness of security measures to protect sensitive information is increasing, people remain susceptible to manipulation and the human element is thus a weak link. A social engineering attack targets this weakness by using various manipulation techniques in order to ...
Francois Mouton +3 more
openaire +1 more source
Advanced social engineering attacks
Journal of Information Security and Applications, 2015Social engineering has emerged as a serious threat in virtual communities and is an effective means to attack information systems. The services used by today's knowledge workers prepare the ground for sophisticated social engineering attacks. The growing trend towards BYOD (bring your own device) policies and the use of online communication and ...
Katharina Krombholz +3 more
openaire +1 more source
Social Engineering Attacks and Countermeasures
2023This book chapter examines the increasing danger of social engineering attacks in cybersecurity. These attacks focus on exploiting human vulnerabilities instead of technical weaknesses and target the human element of organizations. The chapter outlines the various types of social engineering attacks such as phishing, pretexting, baiting, and quid pro ...
Kshyamasagar Mahanta +1 more
openaire +1 more source
Social Engineering for Security Attacks
Proceedings of the The 3rd Multidisciplinary International Social Networks Conference on SocialInformatics 2016, Data Science 2016, 2016Social Engineering is a kind of advance persistent threat (APT) that gains private and sensitive information through social networks or other types of communication. The attackers can use social engineering to obtain access into social network accounts and stays there undetected for a long period of time. The purpose of the attack is to steal sensitive
Jennifer Nelson +4 more
openaire +1 more source
Social engineering: The silent attack
2015 IEEE Thirty Fifth Central American and Panama Convention (CONCAPAN XXXV), 2015The IT security in an organization depends in great measure on the acquisition and proper hardware configuration designed for this purpose, in addition, have a highly qualified staff to perform such tasks safely. However, organizations forget that the weakest link in their infrastructure are users of computer systems and services.
C. E. López Grande, R. S. Guadrón
openaire +1 more source
A literature survey on social engineering attacks: Phishing attack
2016 International Conference on Computing, Communication and Automation (ICCCA), 2016Phishing is a network type attack where the attacker creates the fake of an existing webpage to fool an online user into elicit personal Information. The prime objective of this review is to do literature survey on social engineering attack: Phishing attack and techniques to detect attack. Phishing is the combination of social engineering and technical
Surbhi Gupta +2 more
openaire +1 more source

