2018
DOI: 10.1016/j.cose.2017.10.008
|View full text |Cite
|
Sign up to set email alerts
|

Social engineering in cybersecurity: The evolution of a concept

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
56
0
2

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 88 publications
(58 citation statements)
references
References 74 publications
0
56
0
2
Order By: Relevance
“…Baiting 1,4,8,13,15,21 In Baiting, attacker instead of using electronic medium uses a physical medium to attack. For example, delivering the infected USB drive in organizational surroundings once opened by the employee will infect the device Shoulder surfing 4,10,14,16,21,24 As the name suggests, attacker gathers information by seeing from the shoulder of a victim.…”
Section: Social Engineering Attacks References Explanationmentioning
confidence: 99%
See 3 more Smart Citations
“…Baiting 1,4,8,13,15,21 In Baiting, attacker instead of using electronic medium uses a physical medium to attack. For example, delivering the infected USB drive in organizational surroundings once opened by the employee will infect the device Shoulder surfing 4,10,14,16,21,24 As the name suggests, attacker gathers information by seeing from the shoulder of a victim.…”
Section: Social Engineering Attacks References Explanationmentioning
confidence: 99%
“…An attacker tries to gather information from victims device using shoulder surfing Dumpster diving 4,10,14,16,21,25 In this type of attack, an attacker collects information from the dustbin or waste bins of an organization. Usually, in an organization, the employees and higher management dispose of important documents without using a shredder.…”
Section: Social Engineering Attacks References Explanationmentioning
confidence: 99%
See 2 more Smart Citations
“…Recently it has entered the field of computer and information security as an umbrella term for a variety of techniques that are used to manipulate people into divulging confidential information (e.g., deception by phone) or compromise people's security and privacy in cyberspace (e.g., phishing emails) [34][35][36]. Social engineering in this sense is clearly relevant here since robots can be hacked for criminal or malicious purposes.…”
Section: Should Roboethics Be An Instrument Of (Political) Social Engmentioning
confidence: 99%