2020
DOI: 10.1007/978-3-030-39442-4_3
|View full text |Cite
|
Sign up to set email alerts
|

A Taxonomy of Social Engineering Defense Mechanisms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
10
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(12 citation statements)
references
References 17 publications
0
10
0
Order By: Relevance
“…Hence, social engineers aim to exploit the weakest link in a security structure by manipulating individuals and organizations to divulge valuable and sensitive data [1]. Social engineering attacks use many different techniques including, but not limited to, Business Email Compromise (BEC) and phishing in all its variations such as vishing (by voice), smishing (by SMS) and pharming (via malicious code) [2] [3]. According to [4], successful social engineering has an overwhelming negative impact on an organization such as data losses, financial losses, lowered employee morale and decreased customer loyalty.…”
Section: Introductionmentioning
confidence: 99%
See 4 more Smart Citations
“…Hence, social engineers aim to exploit the weakest link in a security structure by manipulating individuals and organizations to divulge valuable and sensitive data [1]. Social engineering attacks use many different techniques including, but not limited to, Business Email Compromise (BEC) and phishing in all its variations such as vishing (by voice), smishing (by SMS) and pharming (via malicious code) [2] [3]. According to [4], successful social engineering has an overwhelming negative impact on an organization such as data losses, financial losses, lowered employee morale and decreased customer loyalty.…”
Section: Introductionmentioning
confidence: 99%
“…To achieve (1) and (2), the authors designed, distributed, and analyzed a survey to investigate the incorporation level of SE-IPs in organizations. Then, considering the survey results as well previous work [2] [10], the paper developed a proposed model of SE-IPs that organizations can adopt.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations