2019
DOI: 10.1007/978-3-030-12072-6_36
|View full text |Cite
|
Sign up to set email alerts
|

An Approach to Estimating of Criticality of Social Engineering Attacks Traces

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 21 publications
0
3
0
Order By: Relevance
“…However, if the damage did not cause, the actions of the social engineer do not violate the law, although it blame for non-compliance with ethics [15]. In a situation where a social engineer obtained (or made an attempt to obtain) access to confidential information, even without using it and not causing damage by his actions, the actions are unlawful due to the impact applied to the object [16]. To illustrate the qualifying attributes of social engineering, a matrix was drawn up by which it can be established in which combinations the actions of the social engineer are unlawful (harmful) in nature (Table 1).…”
Section: Resultsmentioning
confidence: 99%
“…However, if the damage did not cause, the actions of the social engineer do not violate the law, although it blame for non-compliance with ethics [15]. In a situation where a social engineer obtained (or made an attempt to obtain) access to confidential information, even without using it and not causing damage by his actions, the actions are unlawful due to the impact applied to the object [16]. To illustrate the qualifying attributes of social engineering, a matrix was drawn up by which it can be established in which combinations the actions of the social engineer are unlawful (harmful) in nature (Table 1).…”
Section: Resultsmentioning
confidence: 99%
“…Kotenko et al, 22 Aldawood and Skinner, 23 Conteh et al 24 Network security Network security impacts social engineering attacks Aldawood and Skinner, 23 Khlobystova et al, 25 Saleem and Hammoudeh, 5 Fan et al 26 Organizational security policy Organizational security policy impacts social engineering attacks Matyokurehwa et al, 10 Aldawood and Skinner, 23 Airehrour et al 18 Social engineering awareness Social engineering awareness impacts social engineering attacks Lohani, 27 Ghasemi et al, 28 Conteh 24 Human being (Target and Attacker) Human beings impact social engineering attacks Del Pozo Falconí, 19 Alneami, 13 Round 2 listed the factors in alphabetical order that organizations need to consider in mitigating social engineering attacks now and in future from the experts. Round 2 asked the university experts to rank the factors in order of their importance from the most important factor to the least important factor.…”
Section: Author Construct Contributionmentioning
confidence: 99%
“…In recent years, networks have become part of everyday life, and because of this, they became of high interest to researchers. With the development of computer science, large graphs took on essential roles in many scientific areas such as biology [1], chemistry [2], computer science [3], social engineering [4,5], marketing [6,7] or controlling disease spread. Nowadays, the use of graph databases is also becoming more common and popular, since many areas can take advantage of the benefits provided by graph structure and graph databases.…”
Section: Introductionmentioning
confidence: 99%