2014 Information Security for South Africa 2014
DOI: 10.1109/issa.2014.6950510
|View full text |Cite
|
Sign up to set email alerts
|

Social engineering attack framework

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
45
0
2

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 61 publications
(47 citation statements)
references
References 3 publications
0
45
0
2
Order By: Relevance
“…There are many models and taxonomies for social engineering attacks [1,13,16,17,18,19,20]. The most commonly known model is Kevin Mitnick's social engineering attack cycle as described in his book, The art of deception: controlling the human element of security [8].…”
Section: Defining Social Engineering Attacksmentioning
confidence: 99%
See 4 more Smart Citations
“…There are many models and taxonomies for social engineering attacks [1,13,16,17,18,19,20]. The most commonly known model is Kevin Mitnick's social engineering attack cycle as described in his book, The art of deception: controlling the human element of security [8].…”
Section: Defining Social Engineering Attacksmentioning
confidence: 99%
“…Due to this shortcoming, the authors developed a social engineering attack framework that expands on Kevin Mitnick's social engineering attack cycle [8,13]. The social engineering attack framework depicts the logical flow of a social engineering attack [13].…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations