2017
DOI: 10.1007/978-3-319-68321-8_45
|View full text |Cite
|
Sign up to set email alerts
|

Approach to Identifying of Employees Profiles in Websites of Social Networks Aimed to Analyze Social Engineering Vulnerabilities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
5
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 2 publications
0
5
0
Order By: Relevance
“…Multiple victims have been targeted by attackers by using different enhanced techniques [29]. Even with increased concern of risk, in this research work on social engineering illustrate the attacks which are possible by reverse social engineering [30], phishing [31], or direct attacks, when users account hacks to theft, confidential private data may be used for other purpose [32], or user profile link with across the multiple social network [33] might be possible of social engineering attacks on their personal or organization data. Social engineering attackers usually trap the victims.…”
Section: ) Social-engineering Attacksmentioning
confidence: 94%
“…Multiple victims have been targeted by attackers by using different enhanced techniques [29]. Even with increased concern of risk, in this research work on social engineering illustrate the attacks which are possible by reverse social engineering [30], phishing [31], or direct attacks, when users account hacks to theft, confidential private data may be used for other purpose [32], or user profile link with across the multiple social network [33] might be possible of social engineering attacks on their personal or organization data. Social engineering attackers usually trap the victims.…”
Section: ) Social-engineering Attacksmentioning
confidence: 94%
“…Cyber attackers aim not only at finding software and technical vulnerabilities but also end user's weaknesses. 6 In the current digital era, social networking sites are becoming a precious source of data about the target user such as his/her likes, dislikes, check-ins, friends etc. 6,29 Thus, this increases the need for awareness and education of the end users.…”
Section: Sentiment Analysis Of Tweets and Need Of Social Engineering mentioning
confidence: 99%
“…The number of cyber-attacks is increasing day by day. 6 Social Engineering may result in severe after effects, in some cases, a victim commits suicide. 7 There is a definite need for employee awareness and corporate training.…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…Through social networking sites (SNSs), social engineers can execute direct attacks, such as social networks phishing [7], and reverse social engineering [8], or indirect attacks, when the victims' social network accounts are hijacked to collect information that facilitates subsequent attacks in other contexts. For example, determining employees' personal information through tracking their online footprints in social networking sites [9], or by linking employees' profiles across multiple SN channels [10] which can facilitate successful social engineering attacks on their company.…”
mentioning
confidence: 99%