2007
DOI: 10.1080/10658980701788165
|View full text |Cite
|
Sign up to set email alerts
|

Gaining Access with Social Engineering: An Empirical Study of the Threat

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
53
0

Year Published

2009
2009
2023
2023

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 111 publications
(53 citation statements)
references
References 77 publications
0
53
0
Order By: Relevance
“…''for quality assurance purposes"), along with increasing use of global positioning satellite systems (GPS) and radio frequency identification (RFID) for tracking mobile workers (Aiello, 1993;Workman, 2008b).…”
Section: Monitoring: the Unblinking Eyementioning
confidence: 99%
“…''for quality assurance purposes"), along with increasing use of global positioning satellite systems (GPS) and radio frequency identification (RFID) for tracking mobile workers (Aiello, 1993;Workman, 2008b).…”
Section: Monitoring: the Unblinking Eyementioning
confidence: 99%
“…Researchers and organizations recognize that the employees are the weakest link in the organization [20,21,22]. Since the logs from the laptop thefts were insufficient to provide us with this information, we orchestrated a set of penetration tests where we used social engineering as a means to obtain a laptop.…”
Section: ) Limitation Of the Logsmentioning
confidence: 99%
“…Moreover, risk management techniques, risk, uncertainty, and mistakes can potentially be acknowledged and immediately be dealt with rather than ignore it and hid. Workman (2007), demonstrated that there are many threats to the integrity, confidentiality, and availability of information maintained by organizational systems. Key issues related to internal threats have for information security: nature and honesty in corporate and cultural factors, social and economic changes considered and stating that the security risk for legal access to facilities, information, knowledge organization and location of assets, should be considered to reduce the threats, therefor methods of -965-Journal of Industrial Engineering and Management -http://dx.doi.org/10.3926/jiem.2032 prevention are better from methods of reactive.…”
Section: Introduction and Literature Reviewmentioning
confidence: 99%