The purpose of this paper is to establish a terminological framework in order to explain social engineering and analyze it from phenomenological and security aspect. From phenomenological point of view, the paper explains the phenomenon of social engineering as a contemporary, specific and sophisticated manner of manipulating people. Social engineering is characterized by attacker’s innovative method of selecting and approaching the victim and, when needed, an unlimited number of attack cycles, depending on the goal set by the attacker. Attacks are based on the use of various tools and techniques. From the aspect of security, social engineering holds a very important place in planning and executing cyber-attacks. This paper analyzes perpetr...
Cybersecurity is an integral part of the computer systems especially in current time where data is a...
Social engineering uses human behavior instead of technical measures for exploring systems, differen...
Security is one of the most important aspect in information technology era. Many service providers h...
Abstract — Social engineering is the art of getting people to comply with your wishes. It takes adva...
Social engineering is something that everyone is familiar in one way or another. We are dealing with...
Social engineering, as an art of deception, is very present in the era of globalization and it inter...
The aim of this study was to explore the extent to which persuasion principles are used in successfu...
Part 3: Peace, War, Cyber-Security and ICTInternational audienceThe human is often the weak link in ...
Social engineering is considered to be a taboo subject in nowadays society. It involves the use of s...
Social engineering denotes, within the realm of security, a type of attack against the human element...
Abstract: Growth of technologies, interconnected systems and digitalization, securing data becomes a...
The correct management of information systems security is often over looked in technological measure...
This paper highlights methods of syntactic and semantic social engineering attacks (human-based and ...
During the past few years, social engineering has rapidly evolved and has become a mainstream techni...
Social engineering is type of attack, usable against an organization or individual. It focuses on we...
Cybersecurity is an integral part of the computer systems especially in current time where data is a...
Social engineering uses human behavior instead of technical measures for exploring systems, differen...
Security is one of the most important aspect in information technology era. Many service providers h...
Abstract — Social engineering is the art of getting people to comply with your wishes. It takes adva...
Social engineering is something that everyone is familiar in one way or another. We are dealing with...
Social engineering, as an art of deception, is very present in the era of globalization and it inter...
The aim of this study was to explore the extent to which persuasion principles are used in successfu...
Part 3: Peace, War, Cyber-Security and ICTInternational audienceThe human is often the weak link in ...
Social engineering is considered to be a taboo subject in nowadays society. It involves the use of s...
Social engineering denotes, within the realm of security, a type of attack against the human element...
Abstract: Growth of technologies, interconnected systems and digitalization, securing data becomes a...
The correct management of information systems security is often over looked in technological measure...
This paper highlights methods of syntactic and semantic social engineering attacks (human-based and ...
During the past few years, social engineering has rapidly evolved and has become a mainstream techni...
Social engineering is type of attack, usable against an organization or individual. It focuses on we...
Cybersecurity is an integral part of the computer systems especially in current time where data is a...
Social engineering uses human behavior instead of technical measures for exploring systems, differen...
Security is one of the most important aspect in information technology era. Many service providers h...