2016 SAI Computing Conference (SAI) 2016
DOI: 10.1109/sai.2016.7556108
|View full text |Cite
|
Sign up to set email alerts
|

A layered defense mechanism for a social engineering aware perimeter

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
1
0

Year Published

2019
2019
2025
2025

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 1 publication
0
1
0
Order By: Relevance
“…Some security organizations encourage companies to adopt the defense in depth strategy to monitor their network and prepared themselves for possible attacks while neglecting the human aspect. In [46], the authors proposed to identify the requirements of an anti-social engineering attacks framework capable of analyzing and mitigating attack risks. They developed a new layered defense technique named Social Engineering Centered Risk Assessment (SERA).…”
Section: Prevention Techniquesmentioning
confidence: 99%
“…Some security organizations encourage companies to adopt the defense in depth strategy to monitor their network and prepared themselves for possible attacks while neglecting the human aspect. In [46], the authors proposed to identify the requirements of an anti-social engineering attacks framework capable of analyzing and mitigating attack risks. They developed a new layered defense technique named Social Engineering Centered Risk Assessment (SERA).…”
Section: Prevention Techniquesmentioning
confidence: 99%
“…Befriending [2] Direct Approach [22] Distraction Approach [13,22] Dumpster Diving [22-25, 31, 33, 36, 43, 45, 47, 48, 52] Hoaxing [29,30] Quid pro quo [3,23,27,28,30,32,33,[36][37][38] Pretexting / Impersonation [3, 8, 9, 13, 22-25, 27, 28, 30-38, 43, 5, 47, 48, 53] Red Team [8] Reverse Social Engineering [22,23,[33][34][35][36]47] Role-playing [31] Shoulder Surfing [22-25, 27, 28, 31, 33-37, 45, 48] Scamming [21] Support Staff and Technical Expert [29] Tailgating ou Piggybacking [3, 8, 24, 25, 29-38, 48, 51, 53] Whaling [7,24,33,34,37] Here, we can observe that Pretexting / Impersonation, Tailgating / Piggybacking and Shoulder Surfing are the most non-technical techniques that attackers use.…”
Section: Non-technical Se Technique Sourcesmentioning
confidence: 99%
“…This method of psychological manipulation is used by social engineers to surreptitiously gather information. [8,55] Persuasion A successful relationship with the victim allows the attacker to employ a variety of persuasion techniques. [8,13,55] Authority Having been successfully created, it is the "Holy Grail" for a social engineer because the victim receives multiple orders.…”
Section: Brief Description Sourcesmentioning
confidence: 99%
See 2 more Smart Citations