Educating and raising awareness on cyber security social engineering: A literature review

H Aldawood, G Skinner - 2018 IEEE international conference …, 2018 - ieeexplore.ieee.org
Social engineering, due in part to the increasing popularity and advancements in
information technology and ubiquity of devices, has emerged as one of the most challenging …

A literature survey on social engineering attacks: Phishing attack

S Gupta, A Singhal, A Kapoor - 2016 international conference …, 2016 - ieeexplore.ieee.org
Phishing is a network type attack where the attacker creates the fake of an existing webpage
to fool an online user into elicit personal Information. The prime objective of this review is to …

Social engineering in cybersecurity: Effect mechanisms, human vulnerabilities and attack methods

Z Wang, H Zhu, L Sun - Ieee Access, 2021 - ieeexplore.ieee.org
Social engineering attacks have posed a serious security threat to cyberspace. However,
there is much we have yet to know regarding what and how lead to the success of social …

The social engineering personality framework

S Uebelacker, S Quiel - … on Socio-Technical Aspects in Security …, 2014 - ieeexplore.ieee.org
We explore Information and Communication Technology (ICT) security in a socio-technical
world and focus in particular on the susceptibility to social engineering attacks. We pursue …

Social engineering attack strategies and defence approaches

I Ghafir, V Prenosil, A Alhejailan… - 2016 IEEE 4th …, 2016 - ieeexplore.ieee.org
This paper examines the role and value of information security awareness efforts in
defending against social engineering attacks. It categories the different social engineering …

Towards an ontological model defining the social engineering domain

F Mouton, L Leenen, MM Malan, HS Venter - ICT and Society: 11th IFIP TC …, 2014 - Springer
The human is often the weak link in the attainment of Information Security due to their
susceptibility to deception and manipulation. Social Engineering refers to the exploitation of …

AI's Revolutionary Role in Cyber Defense and Social Engineering

MI Khan, A Arif, ARA Khan - International Journal of …, 2024 - jurnal.itscience.org
Creative methods of cybersecurity are required due to the growing complexity of cyber
threats, especially those originating from social engineering techniques. The revolutionary …

Social engineering: IE based model of human weakness for attack and defense investigations

W Fan, L Kevin, R Rong - IJ Computer Network and Information Security, 2017 - oa.upm.es
Social engineering is the attack aimed to manipulate dupe to divulge sensitive information or
take actions to help the adversary bypass the secure perimeter in front of the information …

Necessity for ethics in social engineering research

F Mouton, MM Malan, KK Kimppa, HS Venter - Computers & Security, 2015 - Elsevier
Social engineering is deeply entrenched in the fields of both computer science and social
psychology. Knowledge is required in both these disciplines to perform social engineering …

An effective security alert mechanism for real-time phishing tweet detection on Twitter

SW Liew, NFM Sani, MT Abdullah, R Yaakob… - Computers & …, 2019 - Elsevier
Phishing is a form of social engineering crime uses to deceive victims by directing them to a
fraudulent website where their private and confidential information are collected for further …