Results 251 to 260 of about 801,622 (296)
Some of the next articles are maybe not open access.
Social Engineering for Security Attacks
Proceedings of the The 3rd Multidisciplinary International Social Networks Conference on SocialInformatics 2016, Data Science 2016, 2016Social Engineering is a kind of advance persistent threat (APT) that gains private and sensitive information through social networks or other types of communication. The attackers can use social engineering to obtain access into social network accounts and stays there undetected for a long period of time. The purpose of the attack is to steal sensitive
Jennifer Nelson +4 more
openaire +1 more source
Research on Social Engineering in Network Security
Advanced Materials Research, 2014The social engineering techniques such as flattery, persuade, induce, disguise, threat, obedience and infiltration was summarized. The main methods and steps of social engineering research and the main six aspects contents such as social engineering technology analysis, social engineering case survey were also put forward.
Gang Chen, Jun Yang, Jun Ping Cai
openaire +1 more source
Social Engineering Techniques and Password Security
International Journal of Cyber Warfare and Terrorism, 2013Due to the Internet and applications that can access the Internet, healthcare employees can benefit from the ability to view patient data almost anywhere and at any time. Data and information is also being shared among third party vendors, partners and supplies.
openaire +1 more source
2019 IEEE Frontiers in Education Conference (FIE), 2019
This Work in Progress in the Research to Practice Category paper will discuss the design and implementation of an extensible teaching tool for social engineering education and awareness. With the bulk of recent research within the field of computer and information security being focused squarely on the implementation or theory of security controls and ...
Jin-Ning Tioh +2 more
openaire +1 more source
This Work in Progress in the Research to Practice Category paper will discuss the design and implementation of an extensible teaching tool for social engineering education and awareness. With the bulk of recent research within the field of computer and information security being focused squarely on the implementation or theory of security controls and ...
Jin-Ning Tioh +2 more
openaire +1 more source
Investigations into social engineering evidence for security research
2023When technical protection mechanisms are too inflexible and security decisions are passed to users, users become part of the attack surface of a socio-technical system. This thesis contributes to the science of security regarding Social Engineering (SE), where users are the core enabler of successful attacks. Various sources were consulted to identify,
openaire +2 more sources
Social Engineering: Application of Psychology to Information Security
2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), 2018Psychology and computer science are two scientific disciplines that focus on identifying the specific characteristics of information processing. The first analyzes human behavior, while the latter focuses on the construction of a technical tool that seeks to emulate the brain: the computer.
Ivan Del Pozo +2 more
openaire +1 more source
Social Engineering for Diagnostic the Information Security Culture
2019 IEEE 39th Central America and Panama Convention (CONCAPAN XXXIX), 2019In the process of diagnosing the culture of information security in an organization, it is considered two methods, the first one is the application of an ISCA (Information Security Culture Assessment) survey questionnaire and the second one based on social engineering techniques such as phishing, answering the question, How can a diagnosis be made ...
William-Rogelio Marchand-Niño +1 more
openaire +1 more source
Social Engineering through Social Media: An Investigation on Enterprise Security
2014Social engineering attacks the weakest organizational security link – the human. The influx of employees using social media throughout the working environment has presented information security professionals with an extensive array of challenges facing people, process and technology.
Heidi Wilcox +2 more
openaire +1 more source
Cyber Security and Social Engineering
2021 25th International Conference on Circuits, Systems, Communications and Computers (CSCC), 2021Barbora Kotkova, Martin Hromada
openaire +1 more source
SOCIAL ENGINEERING AND CYBER SECURITY
Gurukul International Multidisciplinary Research JournalAbstract As the digital era matures, cyber security evolves and software vulnerabilities diminish, people however, as individuals, are more exposed today than ever before. Presently, one of the most practiced and effective penetration attacks are social rather than technical, so efficient in fact, that these exploits play a crucial role to support the
openaire +1 more source

