2017 CHILEAN Conference on Electrical, Electronics Engineering, Information and Communication Technologies (CHILECON) 2017
DOI: 10.1109/chilecon.2017.8229528
|View full text |Cite
|
Sign up to set email alerts
|

Social engineering as an attack vector for ransomware

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 35 publications
(20 citation statements)
references
References 7 publications
0
11
0
Order By: Relevance
“…In the paly phase, the attacker influences the victim emotionally to provide sensitive information or perform security mistakes. In the out phase, the attacker quits without leaving any proof [13].…”
Section: Social Engineering Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…In the paly phase, the attacker influences the victim emotionally to provide sensitive information or perform security mistakes. In the out phase, the attacker quits without leaving any proof [13].…”
Section: Social Engineering Attacksmentioning
confidence: 99%
“…Social engineering attacks may combine the different aspects previously discussed, namely: human, computer, technical, social, and physical-based. Examples of social engineering attacks include phishing, impersonation on help desk calls, shoulder surfing, dumpster diving, stealing important documents, diversion theft, fake software, baiting, quid pro quo, pretexting, tailgating, Pop-Up windows, Robocalls, ransomware, online social engineering, reverse social engineering, and phone social engineering [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18]. Figure 4 illustrates the classification of these attacks.…”
Section: Attacks Classificationmentioning
confidence: 99%
“…To make them safe from these type of attacks, we need to spread awareness among students and other vulnerable groups regarding possible social engineering attacks. 19,20 Social engineering attacks generally deal with the nontechnical means, that is, manipulation techniques to undermine human in the loop. It is, then, essential to understand the combination of social engineering and technical attacks and their effect on the information systems.…”
Section: F I G U R E 1 Research Protocolmentioning
confidence: 99%
“…• End users need to be aware of social engineering as it is a common attack vector for many malicious actors [65]. • All end users must be trained on phishing and how it must be countered.…”
Section: A Prevention Techniquesmentioning
confidence: 99%