Defining social engineering in cybersecurity

Z Wang, L Sun, H Zhu - IEEE Access, 2020 - ieeexplore.ieee.org
Social engineering has posed a serious security threat to infrastructure, user, data and
operations of cyberspace. Nevertheless, there are many conceptual deficiencies (such as …

A taxonomy of social engineering defense mechanisms

DN Alharthi, MM Hammad, AC Regan - … : Proceedings of the 2020 Future of …, 2020 - Springer
Humans have become the weakest point in the information security chain, and social
engineers take advantage of that fact. Social engineers manipulate people psychologically …

[图书][B] A risk-reduction-based incentivization model for human-centered multi-factor authentication

S Das - 2020 - search.proquest.com
Online user presence has increased rapidly over the last few years, broadening the user
base. With the rise in digital usage, we have also witnessed a rise in digital crimes, which …

Social engineering defense mechanisms: A taxonomy and a survey of employees' awareness level

DN Alharthi, AC Regan - Intelligent Computing: Proceedings of the 2020 …, 2020 - Springer
In the information security chain, humans have become the weakest point, and social
engineers take advantage of that fact by psychologically manipulating people to persuade …

Active defense against social engineering: The case for human language technology

A Dalton, E Aghaei, E Al-Shaer, A Bhatia… - Proceedings for the …, 2020 - aclanthology.org
We describe a system that supports natural language processing (NLP) components for
active defenses against social engineering attacks. We deploy a pipeline of human …

Impact of human factors in cloud data breach

M Ahmed, HR Kambam, Y Liu, MN Uddin - Advances in Intelligent …, 2020 - Springer
In this paper, we present a study on the impact of human factors in Cloud data breach. Data
breaches in Cloud platforms result in major concerns and thus the underlying reasons for …

Detecting asks in social engineering attacks: Impact of linguistic and structural knowledge

B Dorr, A Bhatia, A Dalton, B Mather… - Proceedings of the AAAI …, 2020 - aaai.org
Social engineers attempt to manipulate users into undertaking actions such as downloading
malware by clicking links or providing access to money or sensitive information. Natural …

The panacea threat intelligence and active defense platform

A Dalton, E Aghaei, E Al-Shaer, A Bhatia… - arXiv preprint arXiv …, 2020 - arxiv.org
We describe Panacea, a system that supports natural language processing (NLP)
components for active defenses against social engineering attacks. We deploy a pipeline of …

A Study of Targeted Telephone Scams Involving Live Attackers

IG Harris, A Derakhshan, M Carlsson - International Workshop on Socio …, 2020 - Springer
We present the results of a research study in which participants were subjected to social
engineering attacks via telephone, telephone scams, in order to determine the features of …

Detecting asks in se attacks: Impact of linguistic and structural knowledge

BJ Dorr, A Bhatia, A Dalton, B Mather… - arXiv preprint arXiv …, 2020 - arxiv.org
Social engineers attempt to manipulate users into undertaking actions such as downloading
malware by clicking links or providing access to money or sensitive information. Natural …