Results 251 to 260 of about 226,022 (290)
Some of the next articles are maybe not open access.
SECURITY AND PRIVACY, 2022
AbstractThe purpose of this paper was to develop and validate an enhanced social engineering framework to mitigate against social engineering attacks. The study formulated a theoretical framework which was informed by the strengths and weaknesses of existing social engineering frameworks, the framework was also guided by the Dhillon's balanced control ...
Kanos Matyokurehwa +3 more
openaire +1 more source
AbstractThe purpose of this paper was to develop and validate an enhanced social engineering framework to mitigate against social engineering attacks. The study formulated a theoretical framework which was informed by the strengths and weaknesses of existing social engineering frameworks, the framework was also guided by the Dhillon's balanced control ...
Kanos Matyokurehwa +3 more
openaire +1 more source
ENVIRONMENTAL FACTORS AFFECT SOCIAL ENGINEERING ATTACKS
2021Social engineering attacks can have serious consequences when it comes to information security. A social engineering attack aims at sensitive personal information by using personality weaknesses and using manipulation techniques. Because the user is often seen as the weakest link, techniques like phishing, baiting, and vishing, and deception are used ...
openaire +1 more source
Social Engineering Attack Detection Model: SEADMv2
2015 International Conference on Cyberworlds (CW), 2015Information security is a fast-growing discipline, and therefore the effectiveness of security measures to protect sensitive information needs to be increased. Since people are generally susceptible to manipulation, humans often prove to be the weak link in the security chain.
Francois Mouton +2 more
openaire +1 more source
Protection Against Semantic Social Engineering Attacks
2018Phishing, drive-by downloads, file and multimedia masquerading, domain typosquatting, malvertising and other semantic social engineering attacks aim to deceive the user rather than exploit a technical flaw to breach a system’s security. We start with a chronological overview to illustrate the growing prevalence of such attacks from their early ...
Ryan Heartfield, George Loukas
openaire +1 more source
CLASSIFICATION OF SOCIAL ENGINEERING METHODS AND TYPES OF SOCIAL ENGINEERING ATTACKS
Relações Internacionais no Mundo Atual, 2023Background: Social engineering is an acute threat to modern enterprises. In large companies, dynamic information flows and changes in management processes increase the number of attack points for social engineers, which entails possible unwanted information outflows.
Bersei, Diana +4 more
openaire +1 more source
Social Engineering Attacks: How to Prevent
Journal of Digital ScienceWe present the pervasive threat of social engineering attacks in cyber security. The article explores interdisciplinary perspectives, such as psychology and information technology discipline, the social engineering attack types, sequence and traits. Through an in-depth analysis of social engineering attacks, this paper aims to raise awareness about the
Lilit Manukyan, Mariam Gevorgyan
openaire +1 more source
Social Engineering Attacks Detection Approach
2023 13th International Conference on Dependable Systems, Services and Technologies (DESSERT), 2023Sergii Lysenko +5 more
openaire +1 more source
Guarding Corporate Data from Social Engineering Attacks
2009The threat of social engineering attacks is prevalent in today’s society. Even with the pervasiveness of mass media’s coverage of hackers and security intrusions, the general population is not aware of the possible damage that could occur should they be subjected to a social engineering attack.
Christopher M. Botelho, Joseph A. Cazier
openaire +1 more source
Social determinants of health and US cancer screening interventions: A systematic review
Ca-A Cancer Journal for Clinicians, 2023Ariella R Korn
exaly

