Social Engineering in Cybersecurity: Effect Mechanisms, Human Vulnerabilities and Attack Methods
Social engineering attacks have posed a serious security threat to cyberspace. However, there is much we have yet to know regarding what and how lead to the success of social engineering attacks.
Zuoguang Wang, Hongsong Zhu, Limin Sun
doaj +1 more source
Exploiting personality traits in social engineering attacks [PDF]
Phishing attacks have become more sophisticated over time, more than any other forms of social engineering attacks, exploiting the end users’ vulnerabilities and weaknesses.
Irina CRISTESCU +2 more
doaj +1 more source
SOCIAL ENGINEERING AS AN EVOLUTIONARY THREAT TO INFORMATION SECURITY IN HEALTHCARE ORGANIZATIONS
Information security in healthcare settings is overlooked even though it is the most vulnerable for social engineering attacks. The theft of hospital information data is critical to be monitored as they contain patients’ confidential health information ...
Naiya Patel
doaj +1 more source
Factors Influencing Players’ Susceptibility to Social Engineering in Social Gaming Networks
Social gaming networks have become a new phenomenon, especially for young people, who may become addicted to some extent. However, this phenomenon also increases their susceptibility to hacking, cyber-attack, and other types of security breaches. Various
Ahmad Alturki +2 more
doaj +1 more source
Social engineering in the context of ensuring information security [PDF]
The paper presents the main key features of social engineering and a social engineer activity. Emphasis is placed on the study of social engineering techniques in the system of human-machine interaction used to implement the illegal (malicious ...
Mamedova Natalia +4 more
doaj +1 more source
Кибербезопасность в образовательных сетях [PDF]
The paper discusses the possible impact of digital space on a human, as well as human-related directions in cyber-security analysis in the education: levels of cyber-security, social engineering role in cyber-security of education, “cognitive vaccination”
Burov, Oleksandr +7 more
core +1 more source
Model of Social Influence in Analysis of Socio-engineering Attacks
The purpose of this study is to study the modernization of the model of an attacker’s social engineering attack on a user, taking into account a wider range of factors influencing the success of a social engineering attack associated with the principles ...
T. V. Tulupieva +2 more
doaj +1 more source
Experimental Case Studies for Investigating E-Banking Phishing Techniques and Attack Strategies [PDF]
Phishing is a form of electronic identity theft in which a combination of social engineering and web site spoofing techniques are used to trick a user into revealing confidential information with economic value.
Aburrous, Maher +3 more
core +1 more source
Social Engineering Attacks: A Survey
The advancements in digital communication technology have made communication between humans more accessible and instant. However, personal and sensitive information may be available online through social networks and online services that lack the ...
Fatima Salahdine, Naima Kaabouch
doaj +1 more source
Social engineering in cybersecurity: a domain ontology and knowledge graph application examples
Social engineering has posed a serious threat to cyberspace security. To protect against social engineering attacks, a fundamental work is to know what constitutes social engineering.
Zuoguang Wang +3 more
doaj +1 more source

