Proceedings of the International Multiconference on Computer Science and Information Technology 2010
DOI: 10.1109/imcsit.2010.5680026
|View full text |Cite
|
Sign up to set email alerts
|

Social engineering-based attacks: Model and new zealand perspective

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 21 publications
(24 citation statements)
references
References 2 publications
0
24
0
Order By: Relevance
“…The SE is able to obtain sensitive information from the help-desk staff by bypassing any checks that require authorisation to be granted [23].…”
Section: Bidirectional Communication -Templatementioning
confidence: 99%
See 1 more Smart Citation
“…The SE is able to obtain sensitive information from the help-desk staff by bypassing any checks that require authorisation to be granted [23].…”
Section: Bidirectional Communication -Templatementioning
confidence: 99%
“…The cleaner grants the social engineer access to the building. This allows the social engineer to gain physical access to the computerised terminals on the management floor [23,24].…”
Section: Bidirectional Communication Scenariomentioning
confidence: 99%
“…There have been a number of works that focus on analysing SEA attacks. Janczewski & Fu (2010) provided a conceptual model in order to understand SEAs impacts on individuals and businesses and present a defensive approach to mitigate these risks [17]. The study focused on IT departments and a more abstract view of SEAs without considering SEAs concepts related to critical human factors and their relationships to the concept of SI.…”
Section: Social Engineering Attacks Taxonomymentioning
confidence: 99%
“…It is clear that lack of security awareness contributed to a successful F o r P e e r R e v i e w 17 planned SEA. The absent of adequate authentication process in regards to communication has also assisted the attacker to establish a false communication channel.…”
Section: Activity 1: Organisational Analysismentioning
confidence: 99%
See 1 more Smart Citation