2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW) 2018
DOI: 10.1109/w-ficloud.2018.00023
|View full text |Cite
|
Sign up to set email alerts
|

Social Engineering: Application of Psychology to Information Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…Bridging the gap between psychology and information security, investigations by Del Pozo et al (2018) and Chayal and Patel (2021) have illuminated the psychological underpinnings crucial to fortifying cyber defenses. Suryapranata et al (2017) studied the activities of a user forum to identify the variables that can be used to predict the likelihood of a user being involved in cybercrime.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Bridging the gap between psychology and information security, investigations by Del Pozo et al (2018) and Chayal and Patel (2021) have illuminated the psychological underpinnings crucial to fortifying cyber defenses. Suryapranata et al (2017) studied the activities of a user forum to identify the variables that can be used to predict the likelihood of a user being involved in cybercrime.…”
Section: Literature Reviewmentioning
confidence: 99%
“…All people share specific influence patterns (Del Pozo et al, 2018). Social engineering is based on both security and psychological terms to take advantage of people's naivety.…”
Section: User's Behavior In Cybersecuritymentioning
confidence: 99%
“…This is the use of deception, persuasion, and misdirection to engineer a false perception of the situation in the victim's mind and insinuate that the hacker as a reliable person or organization. The main goal of manipulating unsuspecting users is to fool them into breaking standard security procedures, either to gain access to the system or to obtain sensitive information (Del Pozo et al, 2018). For instance, personalized spear-phishing, tax, and bank scams, misplaced flash drives, phishing campaigns, etc.…”
Section: Social Engineering and Manipulationmentioning
confidence: 99%
“…S OCIAL engineering is a multifaceted technique that manifests both in real-life and digital environments. It is related to a manipulative form of communication that exploits human personality traits either in a mass personal or interpersonal way [1], [2]. From "fake news" to psychographic advertisements and from cognitive hacking to spear-phishing, there is a plethora of different types of social engineering attacks [3], [4], [5] .…”
Section: Introductionmentioning
confidence: 99%