Trabalho apresentado em WorldCist'22 - 10th World Conference on Information Systems and Technologies, 12-14 abril 2022, Budva, MontenegroDue to the value and diversity of data that organizations use and pro duce in their activity, it is extremely important to protect this asset. Security flaws can arise due to several factors and whenever it is difficult to access the desired information because of technological barriers. In this case, attacks are redirected to the exploitation of human beings vulnerabilities through various techniques. The objective of this work focuses on literature review, studying the underlying theme of Social Engineering, as it uses human trust, convincing someone of something fake, using various interacti...
Soliciting and managing the protection of information assets has become a objective of paramount imp...
Social engineering is hacking and manipulating people's minds to obtain access to networks and syste...
Information security in healthcare settings is overlooked even though it is the most vulnerable for ...
In corporate and social environments the increasing use of information is important for different pu...
Background: Social engineering is an acute threat to modern enterprises. In large companies, dynamic...
The correct management of information systems security is often over looked in technological measure...
Social engineering is a method of attack aimed at the state, organization, or individual. It focuses...
Social engineering denotes, within the realm of security, a type of attack against the human element...
From the article: This paper describes the external IT security analysis of an international corpora...
Social engineering attacks can be severe and difficult to detect before considerable damage is done....
Assuming that information is currently one of the most valuable assets for an organization, this pap...
Social engineering, as an art of deception, is very present in the era of globalization and it inter...
This paper examines the role and value of information security awareness efforts in defending agains...
Social engineering attacks can be severe and hard to detect. Therefore, to prevent such attacks, org...
In our technology-based society, there has been a clear focus on technical weaknesses to information...
Soliciting and managing the protection of information assets has become a objective of paramount imp...
Social engineering is hacking and manipulating people's minds to obtain access to networks and syste...
Information security in healthcare settings is overlooked even though it is the most vulnerable for ...
In corporate and social environments the increasing use of information is important for different pu...
Background: Social engineering is an acute threat to modern enterprises. In large companies, dynamic...
The correct management of information systems security is often over looked in technological measure...
Social engineering is a method of attack aimed at the state, organization, or individual. It focuses...
Social engineering denotes, within the realm of security, a type of attack against the human element...
From the article: This paper describes the external IT security analysis of an international corpora...
Social engineering attacks can be severe and difficult to detect before considerable damage is done....
Assuming that information is currently one of the most valuable assets for an organization, this pap...
Social engineering, as an art of deception, is very present in the era of globalization and it inter...
This paper examines the role and value of information security awareness efforts in defending agains...
Social engineering attacks can be severe and hard to detect. Therefore, to prevent such attacks, org...
In our technology-based society, there has been a clear focus on technical weaknesses to information...
Soliciting and managing the protection of information assets has become a objective of paramount imp...
Social engineering is hacking and manipulating people's minds to obtain access to networks and syste...
Information security in healthcare settings is overlooked even though it is the most vulnerable for ...