Social Engineering: I-E based Model of Human Weakness for Attack and Defense Investigations [PDF]
Social engineering is the attack aimed to manipulate dupe to divulge sensitive information or take actions to help the adversary bypass the secure perimeter in front of the information-related resources so that the attacking goals can be completed ...
Fan, Wenjun +2 more
core +2 more sources
Case Study On Social Engineering Techniques for Persuasion [PDF]
There are plenty of security software in market; each claiming the best, still we daily face problem of viruses and other malicious activities. If we know the basic working principal of such malware then we can very easily prevent most of them even ...
Hasan, Mosin +2 more
core +3 more sources
Socioeconomic Challenges of Social Engineering and Ensuring Cybersecurity in Mobile Device Use [PDF]
This study investigates the implications of social engineering attacks on mobile device security in the UAE, situating these threats within broader socioeconomic challenges.
Shankar Subramanian +4 more
doaj +1 more source
An interdisciplinary view of social engineering: A call to action for research
Social engineering is the act of using manipulation and deception to obtain access to confidential information. It is considered one of the leading threats to information security today. The topic is complex and increasing in prevalence among individuals
Amy Hetro Washo
doaj +1 more source
The Role of User Behaviour in Improving Cyber Security Management
Information security has for long time been a field of study in computer science, software engineering, and information communications technology. The term ‘information security’ has recently been replaced with the more generic term cybersecurity.
Ahmed A. Moustafa +4 more
doaj +1 more source
Measuring Awareness of Social Engineering in the Educational Sector in the Kingdom of Saudi Arabia
Social engineering is one of the most inventive methods of gaining unauthorized access to information systems and obtaining sensitive information.
Majid H. Alsulami +7 more
doaj +1 more source
ZETA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology [PDF]
Reliable authentication requires the devices and channels involved in the process to be trustworthy; otherwise authentication secrets can easily be compromised.
Gutmann, Andreas +6 more
core +2 more sources
Behaviors Related to Security and Privacy of Social Network Users: A Study of Threats Based on Social Engineering [PDF]
Purpose: The vast volume of data and information circulating in social networks, combined with their popularity and extensive use, exposes these platforms to numerous security risks.
Khadije Akar +2 more
doaj +1 more source
Mal-Netminer: Malware Classification Approach based on Social Network Analysis of System Call Graph [PDF]
As the security landscape evolves over time, where thousands of species of malicious codes are seen every day, antivirus vendors strive to detect and classify malware families for efficient and effective responses against malware campaigns.
Jang, Jae-wook +4 more
core +3 more sources
In the field of information security, there are several areas of study that are under development. Social engineering is one of them that addresses the multidisciplinary challenges of cyber security.
Patricio Zambrano +6 more
doaj +1 more source

