SoutheastCon 2018 2018
DOI: 10.1109/secon.2018.8478938
|View full text |Cite
|
Sign up to set email alerts
|

Survey of Non-malicious User Actions that Introduce Network and System Vulnerabilities and Exploits

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…Furthermore, research studies have shown that these abilities are essential for SE and an attempt to minimize possible cyber-attacks. 15,16 It is an increasingly recognized fact that academics and enterprises are facing severe threats from SE attacks. It is now necessary that organizations train and educate the end-consumers so that the SE threat can be minimized.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, research studies have shown that these abilities are essential for SE and an attempt to minimize possible cyber-attacks. 15,16 It is an increasingly recognized fact that academics and enterprises are facing severe threats from SE attacks. It is now necessary that organizations train and educate the end-consumers so that the SE threat can be minimized.…”
Section: Literature Reviewmentioning
confidence: 99%
“…17 In order to counter SE attacks, it will be helpful If one can reproduce the attacker's actions in a controlled environment; it not only constructs an environment where a participant can experiment and learn without the fear of any loss but also enable him/her to identify any threats early, eventually mitigating the chances of successful cyber attacks. 4,11,16 Researchers discussed that individuals and organizations are vulnerable to SE attacks. 4,12,18,19 We believe that there is a particular need for in-depth scenario gathering and analyzing of real life SE attacks.…”
Section: Literature Reviewmentioning
confidence: 99%
“…To date, research has focused on the structure of SE attacks scenarios [13], the emotional experience of SE victims [14], the behavior of victims of SE attacks [15], education and awareness of SE attack scenarios [16], and performance of automatic detection of spams on social networks [9] and focusing on a specific platform. Additionally, studies have shown that training people on new attacking methods than only focusing on technical and sophisticated security mechanisms can minimize possibilities of SE attacks [17,18]. Thus, the degree of awareness varies between organizations and professions.…”
Section: Introductionmentioning
confidence: 99%