Computer Science &Amp; Information Technology (CS &Amp; IT) 2021
DOI: 10.5121/csit.2021.110104
|View full text |Cite
|
Sign up to set email alerts
|

Social Engineering Infosec Policies (SE-IPS)

Abstract: The sudden increase in employees working primarily or even exclusively at home has generated unique societal and economic circumstances which makes the protection of information assets a major problem for organizations. The application of security policies is essential for mitigating the risk of social engineering attacks. However, incorporating and enforcing successful security policies in an organization is not a straightforward task. To that end, this paper develops a model of Social Engineering InfoSec Pol… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 26 publications
(37 reference statements)
0
2
0
Order By: Relevance
“…Other than that, many authors discuss the categories of security attacks in [117][118][119], which are fake accounts, fake websites, SQL injections, database servers crashing. In taxonomy diagram Figure 2 represents the overview of social networking security [120][121][122][123], and then shows the security threats during Covid-19 pandemic in all sector (education, business, healthcare, smart technology, organizations and many more) like phishing [124][125][126], intrusion detection [127][128][129], DDoS attacks [130][131][132], SQL injection [133,134], and PC Viruses [135,136].…”
Section: Spam Emailsmentioning
confidence: 99%
“…Other than that, many authors discuss the categories of security attacks in [117][118][119], which are fake accounts, fake websites, SQL injections, database servers crashing. In taxonomy diagram Figure 2 represents the overview of social networking security [120][121][122][123], and then shows the security threats during Covid-19 pandemic in all sector (education, business, healthcare, smart technology, organizations and many more) like phishing [124][125][126], intrusion detection [127][128][129], DDoS attacks [130][131][132], SQL injection [133,134], and PC Viruses [135,136].…”
Section: Spam Emailsmentioning
confidence: 99%
“…Tailored training concepts should be applied to the job activities and tasks of the employees [22] [23] [24]. Therefore, our project also deals with job profiles [48] and is based on a search through descriptions of the job advertisements on various job platforms [49] [50] [51] [52] [53] [54]. The goal is to define the main job profiles and task areas common to all SMEs, including the generally used applications and systems.…”
Section: Job Security and Competence Profilesmentioning
confidence: 99%