Results 251 to 260 of about 801,622 (296)
Some of the next articles are maybe not open access.

Social Engineering for Security Attacks

Proceedings of the The 3rd Multidisciplinary International Social Networks Conference on SocialInformatics 2016, Data Science 2016, 2016
Social Engineering is a kind of advance persistent threat (APT) that gains private and sensitive information through social networks or other types of communication. The attackers can use social engineering to obtain access into social network accounts and stays there undetected for a long period of time. The purpose of the attack is to steal sensitive
Jennifer Nelson   +4 more
openaire   +1 more source

Research on Social Engineering in Network Security

Advanced Materials Research, 2014
The social engineering techniques such as flattery, persuade, induce, disguise, threat, obedience and infiltration was summarized. The main methods and steps of social engineering research and the main six aspects contents such as social engineering technology analysis, social engineering case survey were also put forward.
Gang Chen, Jun Yang, Jun Ping Cai
openaire   +1 more source

Social Engineering Techniques and Password Security

International Journal of Cyber Warfare and Terrorism, 2013
Due to the Internet and applications that can access the Internet, healthcare employees can benefit from the ability to view patient data almost anywhere and at any time. Data and information is also being shared among third party vendors, partners and supplies.
openaire   +1 more source

Cyber Security Social Engineers An Extensible Teaching Tool for Social Engineering Education and Awareness

2019 IEEE Frontiers in Education Conference (FIE), 2019
This Work in Progress in the Research to Practice Category paper will discuss the design and implementation of an extensible teaching tool for social engineering education and awareness. With the bulk of recent research within the field of computer and information security being focused squarely on the implementation or theory of security controls and ...
Jin-Ning Tioh   +2 more
openaire   +1 more source

Investigations into social engineering evidence for security research

2023
When technical protection mechanisms are too inflexible and security decisions are passed to users, users become part of the attack surface of a socio-technical system. This thesis contributes to the science of security regarding Social Engineering (SE), where users are the core enabler of successful attacks. Various sources were consulted to identify,
openaire   +2 more sources

Social Engineering: Application of Psychology to Information Security

2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), 2018
Psychology and computer science are two scientific disciplines that focus on identifying the specific characteristics of information processing. The first analyzes human behavior, while the latter focuses on the construction of a technical tool that seeks to emulate the brain: the computer.
Ivan Del Pozo   +2 more
openaire   +1 more source

Social Engineering for Diagnostic the Information Security Culture

2019 IEEE 39th Central America and Panama Convention (CONCAPAN XXXIX), 2019
In the process of diagnosing the culture of information security in an organization, it is considered two methods, the first one is the application of an ISCA (Information Security Culture Assessment) survey questionnaire and the second one based on social engineering techniques such as phishing, answering the question, How can a diagnosis be made ...
William-Rogelio Marchand-Niño   +1 more
openaire   +1 more source

Social Engineering through Social Media: An Investigation on Enterprise Security

2014
Social engineering attacks the weakest organizational security link – the human. The influx of employees using social media throughout the working environment has presented information security professionals with an extensive array of challenges facing people, process and technology.
Heidi Wilcox   +2 more
openaire   +1 more source

Cyber Security and Social Engineering

2021 25th International Conference on Circuits, Systems, Communications and Computers (CSCC), 2021
Barbora Kotkova, Martin Hromada
openaire   +1 more source

SOCIAL ENGINEERING AND CYBER SECURITY

Gurukul International Multidisciplinary Research Journal
Abstract As the digital era matures, cyber security evolves and software vulnerabilities diminish, people however, as individuals, are more exposed today than ever before. Presently, one of the most practiced and effective penetration attacks are social rather than technical, so efficient in fact, that these exploits play a crucial role to support the
openaire   +1 more source

Home - About - Disclaimer - Privacy