• No results found

social engineering attack

Panning for gold:automatically analysing online social engineering attack surfaces

Panning for gold:automatically analysing online social engineering attack surfaces

... of social engineering targets people rather than IT ...on social networks. Though existing research has demonstrated the social engineering risks posed by such open source intelligence, ...

17

Social Engineering: Attack, Prevention and Framework

Social Engineering: Attack, Prevention and Framework

... from social engineering ...to attack on them through mail to different ...have attack on near about 20 users out of which 14 users does not respond ...a social engineering ...

11

Vulnerability to social engineering in social networks : a proposed user-centric framework

Vulnerability to social engineering in social networks : a proposed user-centric framework

... in social networking sites can be classified into two types: medium trust and members trust ...the social networking site as well as trusting the members of that site leads to greater information sharing ...

6

Social Engineering

Social Engineering

... Social engineering is not a new technique of acquiring data; it has been around for ...years. Social engineering may take place on a physical, social, and electronic ...Common ...

6

An Advanced Taxonomy for Social Engineering Attacks

An Advanced Taxonomy for Social Engineering Attacks

... Social engineering attacks involves usage of different techniques in order to extract sensitive information from the ...the attack remains the same. The attack process involves 4 stages ...

11

Reverse Social Engineering Attacks in Online Social Networks

Reverse Social Engineering Attacks in Online Social Networks

... Reverse Social Engineering (RSE) is a form of social engineering attack that has not yet been reported widely in an online ...The attack, in a first step, relies on some form of ...

20

Social Engineering Threat and Defense: A Literature Survey

Social Engineering Threat and Defense: A Literature Survey

... individual. Social engineering attacks are interested in gaining information that may be used to carry out actions such as identity theft, stealing password or gaining information for another type of ...of ...

8

Understanding malware behaviour in online social networks and predicting cyber attack

Understanding malware behaviour in online social networks and predicting cyber attack

... Yan et al [225] analysed user activity patterns and OSN structure to narrow down the char- acteristics of malware propagation in OSNs. For their experiments they used real-world locations based on OSN data and conducted ...

261

Social engineering in the context of ensuring information security

Social engineering in the context of ensuring information security

... the social engineer actions ...a social engineer, who is using social engineering techniques for his own benefit consciously and with understanding of the wrongfulness of his actions? After ...

5

Popper’s Piecemeal Engineering and Social Reform in Africa

Popper’s Piecemeal Engineering and Social Reform in Africa

... scale social planning as a consequence of historicis m, and he rejected it, instead advocated piece meal social engineering as a model for social ...piecemeal social engineering ...

7

From social machines to social protocols:Software engineering foundations for sociotechnical systems

From social machines to social protocols:Software engineering foundations for sociotechnical systems

... Capturing social machine requirements as protocols is cru- cial in avoiding implementation ...a social machine’s protocol, then that is motivation to reformulate the pro- tocol to reduce such ...

12

Ranking Information in a Secured Social Network for Social Responsibility and Protect Data from Stealing Attack

Ranking Information in a Secured Social Network for Social Responsibility and Protect Data from Stealing Attack

... A social-networking is created to facilitate the physically impaired and chronicle ...The social website maintain its privacy and it is also efficient and time saving, where patient records are secured and ...

7

User characteristics that influence judgment of social engineering attacks in social networks

User characteristics that influence judgment of social engineering attacks in social networks

... The present study adopted expert reviews as a mixed method approach to validate the proposed framework with an objective to confirm or modify the proposed UCF. This approach is important as a means to evaluate the ...

24

TLP WHITE. An introduction to social engineering 1.

TLP WHITE. An introduction to social engineering 1.

... A determined attacker may adopt a multi-layered approach along with additional techniques to increase their target’s trust, or confusion, in order to maximise the chance of success. Whilst somewhat indiscriminate, an ...

10

The (R)Evolution of Social Media in Software Engineering

The (R)Evolution of Social Media in Software Engineering

... Communities of practice are prevalent in software engineering, and we can see them forming to share ideas about software architecture, testing, requirements and around specific technologies. They have been the ...

17

A Taxonomy for Social Engineering Attacks via Personal Devices

A Taxonomy for Social Engineering Attacks via Personal Devices

... of attack on mobile devices include luring victims through malicious applications that look like their legitimate ...by social engineers to conduct denial of service attacks or even hold important documents ...

8

A semi-automated security advisory system to resist cyber-attack in social networks

A semi-automated security advisory system to resist cyber-attack in social networks

... to social networks users who want to register and benefit from the advisory system; Completing assessment ...phishing attack in the scenario-based experiment, users may be grouped into at least three ...

12

SYBIL SECURITY: AN EFFICIENT SYBIL ATTACK DETECTION TECHNIQUE IN ONLINE SOCIAL NETWORK

SYBIL SECURITY: AN EFFICIENT SYBIL ATTACK DETECTION TECHNIQUE IN ONLINE SOCIAL NETWORK

... outcome social based network for the defending next to the Sybil ...of social chart, it sure that they will dependent upon the dissimilar kind assumption and also provide some dissimilar concern guaranty: ...

6

Are social network sites the future of engineering design education?

Are social network sites the future of engineering design education?

... other social networks have overcome this problem (ambiguity in silence), by allowing you to see if the person has seen your message with an indicator next to the ...were social in nature and not related to ...

6

A Comprehensive Study of Social Engineering   The Art of Mind Hacking

A Comprehensive Study of Social Engineering The Art of Mind Hacking

... Social Engineering in Social Networking Sites: Social networking sites (SNSs), with their large numbers of users and large information base, seem to be perfect breeding grounds for exploiting ...

6

Show all 10000 documents...

Related subjects