Results 31 to 40 of about 226,022 (290)

A Session and Dialogue-Based Social Engineering Framework

open access: yesIEEE Access, 2019
Social engineering has been increasingly used during the past few years. Social engineering attacks have resulted in great financial losses. Research on social engineering models and frameworks is still in its elementary stage.
Kangfeng Zheng   +4 more
doaj   +1 more source

Model of Social Influence in Analysis of Socio-engineering Attacks

open access: yesУправленческое консультирование, 2021
The purpose of this study is to study the modernization of the model of an attacker’s social engineering attack on a user, taking into account a wider range of factors influencing the success of a social engineering attack associated with the principles ...
T. V. Tulupieva   +2 more
doaj   +1 more source

Кибербезопасность в образовательных сетях [PDF]

open access: yes, 2020
The paper discusses the possible impact of digital space on a human, as well as human-related directions in cyber-security analysis in the education: levels of cyber-security, social engineering role in cyber-security of education, “cognitive vaccination”
Burov, Oleksandr   +7 more
core   +1 more source

Identification of user accounts by image comparison: the pHash-based approach [PDF]

open access: yesНаучно-технический вестник информационных технологий, механики и оптики, 2021
The study presents a new approach to the identification of various online social networks’ users that allows for matching of accounts belonging to the same person. To achieve this goal, images extracted from digital footprints of users are used.
Valerii D. Oliseenko   +2 more
doaj   +1 more source

IoT Security Vulnerabilities and Predictive Signal Jamming Attack Analysis in LoRaWAN [PDF]

open access: yes, 2020
Internet of Things (IoT) gains popularity in recent times due to its flexibility, usability, diverse applicability and ease of deployment. However, the issues related to security is less explored. The IoT devices are light weight in nature and have low
Bhowmik, Deepayan   +2 more
core   +3 more sources

Refining the PoinTER “human firewall” pentesting framework [PDF]

open access: yes, 2019
PurposePenetration tests have become a valuable tool in the cyber security defence strategy, in terms of detecting vulnerabilities. Although penetration testing has traditionally focused on technical aspects, the field has started to realise the ...
Archibald, Jacqueline M., Renaud, Karen
core   +3 more sources

Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review

open access: yesSensors, 2021
Background: Cybersecurity is increasingly becoming a prominent concern among healthcare providers in adopting digital technologies for improving the quality of care delivered to patients.
Sokratis Nifakos   +6 more
doaj   +1 more source

Case Study On Social Engineering Techniques for Persuasion [PDF]

open access: yes, 2010
There are plenty of security software in market; each claiming the best, still we daily face problem of viruses and other malicious activities. If we know the basic working principal of such malware then we can very easily prevent most of them even ...
Hasan, Mosin   +2 more
core   +3 more sources

Defining Social Engineering in Cybersecurity

open access: yesIEEE Access, 2020
Social engineering has posed a serious security threat to infrastructure, user, data and operations of cyberspace. Nevertheless, there are many conceptual deficiencies (such as inconsistent conceptual intensions, a vague conceptual boundary, confusing ...
Zuoguang Wang, Limin Sun, Hongsong Zhu
doaj   +1 more source

Considerations on Preventing Social Engineering over the Internet [PDF]

open access: yesMemoirs of the Scientific Sections of the Romanian Academy, 2017
The decrease of personal interactions, caused by the development of modern communication instruments (e-mail, Facebook, Twitter, Skype, Dropbox, LinkedIn, Lync etc.) has allowed the evolution of new methods of social engineering attacks, which, under ...
Mironela Pîrnău
doaj  

Home - About - Disclaimer - Privacy