2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security) 2019
DOI: 10.1109/cybersecpods.2019.8885085
|View full text |Cite
|
Sign up to set email alerts
|

A Social Engineering Course Project for Undergraduate Students Across Multiple Disciplines

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 8 publications
0
1
0
Order By: Relevance
“…Befriending [2] Direct Approach [22] Distraction Approach [13,22] Dumpster Diving [22-25, 31, 33, 36, 43, 45, 47, 48, 52] Hoaxing [29,30] Quid pro quo [3,23,27,28,30,32,33,[36][37][38] Pretexting / Impersonation [3, 8, 9, 13, 22-25, 27, 28, 30-38, 43, 5, 47, 48, 53] Red Team [8] Reverse Social Engineering [22,23,[33][34][35][36]47] Role-playing [31] Shoulder Surfing [22-25, 27, 28, 31, 33-37, 45, 48] Scamming [21] Support Staff and Technical Expert [29] Tailgating ou Piggybacking [3, 8, 24, 25, 29-38, 48, 51, 53] Whaling [7,24,33,34,37] Here, we can observe that Pretexting / Impersonation, Tailgating / Piggybacking and Shoulder Surfing are the most non-technical techniques that attackers use.…”
Section: Non-technical Se Technique Sourcesmentioning
confidence: 99%
“…Befriending [2] Direct Approach [22] Distraction Approach [13,22] Dumpster Diving [22-25, 31, 33, 36, 43, 45, 47, 48, 52] Hoaxing [29,30] Quid pro quo [3,23,27,28,30,32,33,[36][37][38] Pretexting / Impersonation [3, 8, 9, 13, 22-25, 27, 28, 30-38, 43, 5, 47, 48, 53] Red Team [8] Reverse Social Engineering [22,23,[33][34][35][36]47] Role-playing [31] Shoulder Surfing [22-25, 27, 28, 31, 33-37, 45, 48] Scamming [21] Support Staff and Technical Expert [29] Tailgating ou Piggybacking [3, 8, 24, 25, 29-38, 48, 51, 53] Whaling [7,24,33,34,37] Here, we can observe that Pretexting / Impersonation, Tailgating / Piggybacking and Shoulder Surfing are the most non-technical techniques that attackers use.…”
Section: Non-technical Se Technique Sourcesmentioning
confidence: 99%