2018 26th International Conference on Systems Engineering (ICSEng) 2018
DOI: 10.1109/icseng.2018.8638166
|View full text |Cite
|
Sign up to set email alerts
|

A Critical Appraisal of Contemporary Cyber Security Social Engineering Solutions: Measures, Policies, Tools and Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
21
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 23 publications
(22 citation statements)
references
References 22 publications
0
21
0
1
Order By: Relevance
“…In brief, implementing training and awareness programs is a crucial step towards having a secure cyber environment in which users of all ages can freely use technology to conduct positive and self-developing activities. It is considered the most effective way to deal with social engineering threats as technology development has made humans potential targets of hackers and cyber criminals [4,6,[10][11][12]44,[90][91][92].…”
Section: Strategies For Addressing Social Engineering Education and Amentioning
confidence: 99%
See 2 more Smart Citations
“…In brief, implementing training and awareness programs is a crucial step towards having a secure cyber environment in which users of all ages can freely use technology to conduct positive and self-developing activities. It is considered the most effective way to deal with social engineering threats as technology development has made humans potential targets of hackers and cyber criminals [4,6,[10][11][12]44,[90][91][92].…”
Section: Strategies For Addressing Social Engineering Education and Amentioning
confidence: 99%
“…As employees play the most important role in safeguarding the interest of organizations when it comes to socially engineered attacks, organizations choose to implement information security awareness programs to protect their data. [3,4]. There are some limitations posed in the process of implementing traditional training methods, including financial constraints [5,6].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Social engineering is defined as a non-technical method that relies heavily on human interactions and involves tricking people and manipulating them into breaking normal security procedures [3]. Such threats are challenging as they depend on human behavior and take advantage of vulnerable employees [4]. Thus, businesses today should utilize various strategies to improve employees' awareness of social engineering threats and attacks in order to protect their intellectual properties including information assets.…”
Section: Introductionmentioning
confidence: 99%
“…This factor represents the most important behavioral outcome in the domain of social engineering as it represents the technical and psychological loophole that can be exploited by social engineers to attack organizations. Therefore, organizations should invest in enhancing employees' security practices by educating them about best security practices [22].…”
Section: Introductionmentioning
confidence: 99%