Results 21 to 30 of about 801,622 (296)

Social Engineering: I-E based Model of Human Weakness for Attack and Defense Investigations [PDF]

open access: yes, 2017
Social engineering is the attack aimed to manipulate dupe to divulge sensitive information or take actions to help the adversary bypass the secure perimeter in front of the information-related resources so that the attacking goals can be completed ...
Fan, Wenjun   +2 more
core   +2 more sources

Case Study On Social Engineering Techniques for Persuasion [PDF]

open access: yes, 2010
There are plenty of security software in market; each claiming the best, still we daily face problem of viruses and other malicious activities. If we know the basic working principal of such malware then we can very easily prevent most of them even ...
Hasan, Mosin   +2 more
core   +3 more sources

Socioeconomic Challenges of Social Engineering and Ensuring Cybersecurity in Mobile Device Use [PDF]

open access: yesSocioEconomic Challenges
This study investigates the implications of social engineering attacks on mobile device security in the UAE, situating these threats within broader socioeconomic challenges.
Shankar Subramanian   +4 more
doaj   +1 more source

An interdisciplinary view of social engineering: A call to action for research

open access: yesComputers in Human Behavior Reports, 2021
Social engineering is the act of using manipulation and deception to obtain access to confidential information. It is considered one of the leading threats to information security today. The topic is complex and increasing in prevalence among individuals
Amy Hetro Washo
doaj   +1 more source

The Role of User Behaviour in Improving Cyber Security Management

open access: yesFrontiers in Psychology, 2021
Information security has for long time been a field of study in computer science, software engineering, and information communications technology. The term ‘information security’ has recently been replaced with the more generic term cybersecurity.
Ahmed A. Moustafa   +4 more
doaj   +1 more source

Measuring Awareness of Social Engineering in the Educational Sector in the Kingdom of Saudi Arabia

open access: yesInformation, 2021
Social engineering is one of the most inventive methods of gaining unauthorized access to information systems and obtaining sensitive information.
Majid H. Alsulami   +7 more
doaj   +1 more source

ZETA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology [PDF]

open access: yes, 2016
Reliable authentication requires the devices and channels involved in the process to be trustworthy; otherwise authentication secrets can easily be compromised.
Gutmann, Andreas   +6 more
core   +2 more sources

Behaviors Related to Security and Privacy of Social Network Users: A Study of Threats Based on Social Engineering [PDF]

open access: yesنشریه مطالعات دانش‌پژوهی
Purpose: The vast volume of data and information circulating in social networks, combined with their popularity and extensive use, exposes these platforms to numerous security risks.
Khadije Akar   +2 more
doaj   +1 more source

Mal-Netminer: Malware Classification Approach based on Social Network Analysis of System Call Graph [PDF]

open access: yes, 2015
As the security landscape evolves over time, where thousands of species of malicious codes are seen every day, antivirus vendors strive to detect and classify malware families for efficient and effective responses against malware campaigns.
Jang, Jae-wook   +4 more
core   +3 more sources

Technical Mapping of the Grooming Anatomy Using Machine Learning Paradigms: An Information Security Approach

open access: yesIEEE Access, 2019
In the field of information security, there are several areas of study that are under development. Social engineering is one of them that addresses the multidisciplinary challenges of cyber security.
Patricio Zambrano   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy