Published May 25, 2025
| Version v1
Book chapter
Open
Social engineering and Vulnerability with Human Mind
Authors/Creators
Files
Chapter 11.pdf
Files
(629.2 kB)
| Name | Size | Download all |
|---|---|---|
|
md5:f5063d42a65c7636ad1b806fc57ceefd
|
629.2 kB | Preview Download |
Additional details
Dates
- Accepted
-
2025-05-20
References
- Hinson, M. (2008). Social engineering techniques, risks, and controls. The EDP Audit, Control, and Security Newsletter archive 37: 32-46.
- Thomas, K., Li, F., Zand, A., Barrett, J., Ranieri, J., Invernizzi, L., ... & Bursztein, E. (2017, October). Data breaches, phishing, or malware? Understanding the risks of stolen credentials. In Proceedings of the 2017 ACM SIGSAC conference on computer and communications security (pp. 1421-1434).
- Garfinkel, S. (2002). The FBI's cybercrime crackdown. TECHNOLOGY REVIEWMANCHESTER NH-, 105(9), 66-75.
- Alsulami, M. H., Alharbi, F. D., Almutairi, H. M., Almutairi, B. S., Alotaibi, M. M., Alanzi, M. E., ... & Alharthi, S. S. (2021). Measuring Awareness of Social Engineering in the Educational Sector in the Kingdom of Saudi Arabia. Information, 12(5), 208.
- Ferreira, A., Coventry, L., & Lenzini, G. (2015, August). Principles of persuasion in social engineering and their use in phishing. In International Conference on Human Aspects of Information Security, Privacy, and Trust (pp. 36-47). Springer, Cham.
- Mouton, F., Malan, M. M., Leenen, L., & Venter, H. S. (2014, August). Social engineering attack framework. In 2014 Information Security for South Africa (pp. 1-9). IEEE.
- Alexei, L. A., & Alexei, A. (2021). Cyber security threat analysis in higher education institutions as a result of distance learning. International Journal of Scientific and Technology Research, (3), 128-133.
- Tweneboah-Kodua, S., Atsu, F., & Buchanan, W. (2018). Impact of cyberattacks on stock performance: a comparative study. Information & Computer Security.
- Chetioui, K., Bah, B., Alami, A. O., & Bahnasse, A. (2022). Overview of Social Engineering Attacks on Social Networks. Procedia Computer Science, 198, 656-661.
- Ometov, A., Bezzateev, S., Mäkitalo, N., Andreev, S., Mikkonen, T., & Koucheryavy, Y. (2018). Multi-factor authentication: A survey. Cryptography, 2(1), 1.