Results 11 to 20 of about 801,622 (296)

Social Engineering in Cybersecurity: Effect Mechanisms, Human Vulnerabilities and Attack Methods

open access: yesIEEE Access, 2021
Social engineering attacks have posed a serious security threat to cyberspace. However, there is much we have yet to know regarding what and how lead to the success of social engineering attacks.
Zuoguang Wang, Hongsong Zhu, Limin Sun
doaj   +1 more source

Exploiting personality traits in social engineering attacks [PDF]

open access: yesRevista Română de Informatică și Automatică, 2022
Phishing attacks have become more sophisticated over time, more than any other forms of social engineering attacks, exploiting the end users’ vulnerabilities and weaknesses.
Irina CRISTESCU   +2 more
doaj   +1 more source

SOCIAL ENGINEERING AS AN EVOLUTIONARY THREAT TO INFORMATION SECURITY IN HEALTHCARE ORGANIZATIONS

open access: yesJurnal Administrasi Kesehatan Indonesia, 2020
Information security in healthcare settings is overlooked even though it is the most vulnerable for social engineering attacks. The theft of hospital information data is critical to be monitored as they contain patients’ confidential health information ...
Naiya Patel
doaj   +1 more source

Factors Influencing Players’ Susceptibility to Social Engineering in Social Gaming Networks

open access: yesIEEE Access, 2020
Social gaming networks have become a new phenomenon, especially for young people, who may become addicted to some extent. However, this phenomenon also increases their susceptibility to hacking, cyber-attack, and other types of security breaches. Various
Ahmad Alturki   +2 more
doaj   +1 more source

Social engineering in the context of ensuring information security [PDF]

open access: yesSHS Web of Conferences, 2019
The paper presents the main key features of social engineering and a social engineer activity. Emphasis is placed on the study of social engineering techniques in the system of human-machine interaction used to implement the illegal (malicious ...
Mamedova Natalia   +4 more
doaj   +1 more source

Кибербезопасность в образовательных сетях [PDF]

open access: yes, 2020
The paper discusses the possible impact of digital space on a human, as well as human-related directions in cyber-security analysis in the education: levels of cyber-security, social engineering role in cyber-security of education, “cognitive vaccination”
Burov, Oleksandr   +7 more
core   +1 more source

Model of Social Influence in Analysis of Socio-engineering Attacks

open access: yesУправленческое консультирование, 2021
The purpose of this study is to study the modernization of the model of an attacker’s social engineering attack on a user, taking into account a wider range of factors influencing the success of a social engineering attack associated with the principles ...
T. V. Tulupieva   +2 more
doaj   +1 more source

Experimental Case Studies for Investigating E-Banking Phishing Techniques and Attack Strategies [PDF]

open access: yes, 2010
Phishing is a form of electronic identity theft in which a combination of social engineering and web site spoofing techniques are used to trick a user into revealing confidential information with economic value.
Aburrous, Maher   +3 more
core   +1 more source

Social Engineering Attacks: A Survey

open access: yesFuture Internet, 2019
The advancements in digital communication technology have made communication between humans more accessible and instant. However, personal and sensitive information may be available online through social networks and online services that lack the ...
Fatima Salahdine, Naima Kaabouch
doaj   +1 more source

Social engineering in cybersecurity: a domain ontology and knowledge graph application examples

open access: yesCybersecurity, 2021
Social engineering has posed a serious threat to cyberspace security. To protect against social engineering attacks, a fundamental work is to know what constitutes social engineering.
Zuoguang Wang   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy