Social Engineering Penetration Testing 2014
DOI: 10.1016/b978-0-12-420124-8.00022-3
|View full text |Cite
|
Sign up to set email alerts
|

About the Authors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…Such attacks are extremely difficult to detect, unless the attacker triggers the suspicious activity monitoring systems, or the phished user reports the event. While continuous training and cyber education is considered as the best preventative measure [4], it is easy to fall for extremely well disguised social engineering attacks [5][6][7][8]. Hence, cybersecurity focus needs to be placed on the network, and on 'employee education, training, and awareness' [9].…”
Section: Types Of Cyber Attacksmentioning
confidence: 99%
“…Such attacks are extremely difficult to detect, unless the attacker triggers the suspicious activity monitoring systems, or the phished user reports the event. While continuous training and cyber education is considered as the best preventative measure [4], it is easy to fall for extremely well disguised social engineering attacks [5][6][7][8]. Hence, cybersecurity focus needs to be placed on the network, and on 'employee education, training, and awareness' [9].…”
Section: Types Of Cyber Attacksmentioning
confidence: 99%
“…It may involve obtaining information, access, or an activity. "According to Watson, Mason, and Ackroyd [2], social engineering involves various ways of manipulating an individual to obtain certain information or perform an activity. These manipulations, therefore, focus on the often weakest link in the information system, which is a person.…”
Section: Introductionmentioning
confidence: 99%
“…People who are manipulated are not aware of this and therefore there is a high risk of providing sensitive information. Therefore, for the purposes of this work, the definition of social engineering according to Watson, Mason, and Ackroyd [2] as various ways of manipulating an individual in order to obtain certain information or perform certain activity is decisive.…”
Section: Introductionmentioning
confidence: 99%