Securing information assets: understanding, measuring and protecting against social engineering attacks

M Nohlberg - 2008 - diva-portal.org
Social engineering denotes, within the realm of security, a type of attack against the human
element during which the assailant induces the victim to release information or perform …

The cycle of deception: a model of social engineering attacks, defenses and victims

M Nohlberg, S Kowalski - 2008 - diva-portal.org
Social engineering denotes, within the realm of security, a type of attack against the human
element during which the assailant induces the victim to release information or perform …

Social engineering audits using anonymous surveys: Conning the users in order to know if they can be conned

M Nohlberg - 2005 - diva-portal.org
Social engineering denotes, within the realm of security, a type of attack against the human
element during which the assailant induces the victim to release information or perform …

[HTML][HTML] Social engineering threat and defense: a literature survey

IAM Abass - Journal of Information Security, 2018 - scirp.org
This article surveys the literature on social engineering. There are lots of security application
and hardware in market; still there are several methods that can be used to breach the …

A structured comparison of social engineering intelligence gathering tools

K Beckers, D Schosser, S Pape, P Schaab - Trust, Privacy and Security in …, 2017 - Springer
Social engineering is the clever manipulation of the human tendency to trust to acquire
information assets. While technical security of most critical systems is high, the systems …

[PDF][PDF] The threat of social engineering and your defense against it

R Gulati - SANS Reading Room, 2003 - Citeseer
There are several methods that the malicious individual can use to try to breach the
information security defenses of an organization. The human approach, often termed Social …

Social engineering: Towards a holistic solution

K Jansson, R Von Solms - Proceedings of the South African …, 2011 - books.google.com
As most employees are information-workers nowadays, they are very vulnerable to various
malicious attacks. However, some threat sources have realized that it is far easier to obtain …

[PDF][PDF] An advanced taxonomy for social engineering attacks

H Aldawood, G Skinner - International Journal of Computer …, 2020 - researchgate.net
Rapid technological advancement has not only resulted in a change in the pace of
economic development, but also led to increase in cyber-threats. A social engineering attack …

Social engineering: the art of attacks

N Duarte, N Coelho, T Guarda - … 2021, La Libertad, Ecuador, November 25 …, 2021 - Springer
The correct management of information systems security is often overlooked in technological
measures and management efforts, and although there are now many tools to address …

Managing Social Engineering Attacks-Considering Human Factors and Security Investment.

R Alavi, S Islam, H Mouratidis, S Lee - HAISA, 2015 - books.google.com
Soliciting and managing the protection of information assets has become a objective of
paramount importance in an organizational context. Information Security Management …