Educating and raising awareness on cyber security social engineering: A literature review
H Aldawood, G Skinner - 2018 IEEE international conference …, 2018 - ieeexplore.ieee.org
Social engineering, due in part to the increasing popularity and advancements in
information technology and ubiquity of devices, has emerged as one of the most challenging …
information technology and ubiquity of devices, has emerged as one of the most challenging …
A literature survey on social engineering attacks: Phishing attack
Phishing is a network type attack where the attacker creates the fake of an existing webpage
to fool an online user into elicit personal Information. The prime objective of this review is to …
to fool an online user into elicit personal Information. The prime objective of this review is to …
Social engineering in cybersecurity: Effect mechanisms, human vulnerabilities and attack methods
Social engineering attacks have posed a serious security threat to cyberspace. However,
there is much we have yet to know regarding what and how lead to the success of social …
there is much we have yet to know regarding what and how lead to the success of social …
The social engineering personality framework
S Uebelacker, S Quiel - … on Socio-Technical Aspects in Security …, 2014 - ieeexplore.ieee.org
We explore Information and Communication Technology (ICT) security in a socio-technical
world and focus in particular on the susceptibility to social engineering attacks. We pursue …
world and focus in particular on the susceptibility to social engineering attacks. We pursue …
Social engineering attack strategies and defence approaches
I Ghafir, V Prenosil, A Alhejailan… - 2016 IEEE 4th …, 2016 - ieeexplore.ieee.org
This paper examines the role and value of information security awareness efforts in
defending against social engineering attacks. It categories the different social engineering …
defending against social engineering attacks. It categories the different social engineering …
Towards an ontological model defining the social engineering domain
The human is often the weak link in the attainment of Information Security due to their
susceptibility to deception and manipulation. Social Engineering refers to the exploitation of …
susceptibility to deception and manipulation. Social Engineering refers to the exploitation of …
AI's Revolutionary Role in Cyber Defense and Social Engineering
Creative methods of cybersecurity are required due to the growing complexity of cyber
threats, especially those originating from social engineering techniques. The revolutionary …
threats, especially those originating from social engineering techniques. The revolutionary …
Social engineering: IE based model of human weakness for attack and defense investigations
W Fan, L Kevin, R Rong - IJ Computer Network and Information Security, 2017 - oa.upm.es
Social engineering is the attack aimed to manipulate dupe to divulge sensitive information or
take actions to help the adversary bypass the secure perimeter in front of the information …
take actions to help the adversary bypass the secure perimeter in front of the information …
Necessity for ethics in social engineering research
Social engineering is deeply entrenched in the fields of both computer science and social
psychology. Knowledge is required in both these disciplines to perform social engineering …
psychology. Knowledge is required in both these disciplines to perform social engineering …
An effective security alert mechanism for real-time phishing tweet detection on Twitter
SW Liew, NFM Sani, MT Abdullah, R Yaakob… - Computers & …, 2019 - Elsevier
Phishing is a form of social engineering crime uses to deceive victims by directing them to a
fraudulent website where their private and confidential information are collected for further …
fraudulent website where their private and confidential information are collected for further …