Defining social engineering in cybersecurity

Z Wang, L Sun, H Zhu - IEEE Access, 2020 - ieeexplore.ieee.org
Social engineering has posed a serious security threat to infrastructure, user, data and
operations of cyberspace. Nevertheless, there are many conceptual deficiencies (such as …

Social engineering defence mechanisms and counteracting training strategies

P Schaab, K Beckers, S Pape - Information & Computer Security, 2017 - emerald.com
Purpose This paper aims to outline strategies for defence against social engineering that are
missing in the current best practices of information technology (IT) security. Reason for the …

Evaluating user susceptibility to phishing attacks

S Das, C Nippert-Eng, LJ Camp - Information & Computer Security, 2022 - emerald.com
Purpose Phishing is a well-known cybersecurity attack that has rapidly increased in recent
years. It poses risks to businesses, government agencies and all users due to sensitive data …

{WebWitness}: Investigating, Categorizing, and Mitigating Malware Download Paths

T Nelms, R Perdisci, M Antonakakis… - 24th USENIX Security …, 2015 - usenix.org
Most modern malware download attacks occur via the browser, typically due to social
engineering and driveby downloads. In this paper, we study the “origin” of malware …

A meta-analysis of field experiments on phishing susceptibility

T Sommestad, H Karlzén - 2019 APWG symposium on …, 2019 - ieeexplore.ieee.org
Phishing is a serious threat to any organization allowing their employees to use messaging
systems and computers connected to the internet. Consequently, researchers have …

Semantic analysis of dialogs to detect social engineering attacks

R Bhakta, IG Harris - Proceedings of the 2015 IEEE 9th …, 2015 - ieeexplore.ieee.org
Cyberattackers often attack the weakest point of system, which is increasingly the people
who use and interact with a computer-based system. A great deal of research has been …

Improving awareness of social engineering attacks

A Smith, M Papadaki, SM Furnell - … Education and Training: 8th IFIP WG …, 2013 - Springer
Social engineering is a method of attack involving the exploitation of human weakness,
gullibility and ignorance. Although related techniques have existed for some time, current …

Securing information assets: understanding, measuring and protecting against social engineering attacks

M Nohlberg - 2008 - diva-portal.org
Social engineering denotes, within the realm of security, a type of attack against the human
element during which the assailant induces the victim to release information or perform …

PROTECT–an easy configurable serious game to train employees against social engineering attacks

L Goeke, A Quintanar, K Beckers, S Pape - International Workshop on …, 2019 - Springer
Social engineering is the clever manipulation of human trust. While most security protection
focuses on technical aspects, organisations remain vulnerable to social engineers …

A taxonomy of social engineering defense mechanisms

DN Alharthi, MM Hammad, AC Regan - … : Proceedings of the 2020 Future of …, 2020 - Springer
Humans have become the weakest point in the information security chain, and social
engineers take advantage of that fact. Social engineers manipulate people psychologically …