2023
DOI: 10.54941/ahfe1003721
|View full text |Cite
|
Sign up to set email alerts
|

Social Engineering Penetration Testing within the OODCA Cycle – Approaches to Detect and Remediate Human Vulnerabilities and Risks in Information Security

Abstract: In more than 95% of all successfully conducted cyberattacks, the human factor is exploited as a vulnerability point. The following principle applies. Whenever a hacker uses external attack vectors and thus does not directly use the Internet as a medium, employees become the target of the attack. As a result, the current technical and intelligent defense mechanisms can only contribute to a limited extent to the increase the resilience of IT systems, as these technological approaches do not fully account for the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…Incorporating human elements into the security chain is crucial, as it aids in the detection and prevention of issues. It should instead be viewed as the strongest link in Information Security in this situation, not a weak one [72]. Human error is now the main factor that makes SE attacks viable.…”
Section: -Discussion Of the Resultsmentioning
confidence: 99%
“…Incorporating human elements into the security chain is crucial, as it aids in the detection and prevention of issues. It should instead be viewed as the strongest link in Information Security in this situation, not a weak one [72]. Human error is now the main factor that makes SE attacks viable.…”
Section: -Discussion Of the Resultsmentioning
confidence: 99%