Social engineering attacks: A survey

F Salahdine, N Kaabouch - Future internet, 2019 - mdpi.com
The advancements in digital communication technology have made communication
between humans more accessible and instant. However, personal and sensitive information …

A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks

R Heartfield, G Loukas - ACM Computing Surveys (CSUR), 2015 - dl.acm.org
Social engineering is used as an umbrella term for a broad spectrum of computer
exploitations that employ a variety of attack vectors and strategies to psychologically …

Advanced social engineering attacks

K Krombholz, H Hobel, M Huber, E Weippl - Journal of Information Security …, 2015 - Elsevier
Social engineering has emerged as a serious threat in virtual communities and is an
effective means to attack information systems. The services used by today's knowledge …

Social engineering attack examples, templates and scenarios

F Mouton, L Leenen, HS Venter - Computers & Security, 2016 - Elsevier
The field of information security is a fast-growing discipline. Even though the effectiveness of
security measures to protect sensitive information is increasing, people remain susceptible …

Defining social engineering in cybersecurity

Z Wang, L Sun, H Zhu - IEEE Access, 2020 - ieeexplore.ieee.org
Social engineering has posed a serious security threat to infrastructure, user, data and
operations of cyberspace. Nevertheless, there are many conceptual deficiencies (such as …

User characteristics that influence judgment of social engineering attacks in social networks

SM Albladi, GRS Weir - Human-centric Computing and Information …, 2018 - Springer
Social engineering is a growing source of information security concern. Exploits appear to
evolve, with increasing levels of sophistication, in order to target multiple victims. Despite …

Social engineering attack framework

F Mouton, MM Malan, L Leenen… - … Information Security for …, 2014 - ieeexplore.ieee.org
The field of information security is a fast growing discipline. Even though the effectiveness of
security measures to protect sensitive information is increasing, people remain susceptible …

Social engineering in cybersecurity: a domain ontology and knowledge graph application examples

Z Wang, H Zhu, P Liu, L Sun - Cybersecurity, 2021 - Springer
Social engineering has posed a serious threat to cyberspace security. To protect against
social engineering attacks, a fundamental work is to know what constitutes social …

Towards an ontological model defining the social engineering domain

F Mouton, L Leenen, MM Malan, HS Venter - ICT and Society: 11th IFIP TC …, 2014 - Springer
The human is often the weak link in the attainment of Information Security due to their
susceptibility to deception and manipulation. Social Engineering refers to the exploitation of …

Taxonomy of mobile users' security awareness

R Bitton, A Finkelshtein, L Sidi, R Puzis, L Rokach… - Computers & …, 2018 - Elsevier
The popularity of smartphones, coupled with the amount of valuable and private information
they hold, make them attractive to attackers interested in exploiting the devices to harvest …