M Edwards, R Larson, B Green,
A Rashid - Computers & Security, 2013 - cyberleninka.org
The process of social engineering targets people rather than IT infrastructure. Attackers use
deceptive ploys to create compelling behavioural and cosmetic hooks, which in turn lead a …