Purpose: E-Government system emerged as a novel public service provision platform that enables governance in an efficient and transparent manner globally. However, despite the success recorded so far by the increase in the use of information and communication technology (ICT) and E-government for public service provision. Social engineering attack (SEA) is one of the challenging information security attacks that prove to be difficult to tackle. This is because the attackers leverage on peoples’ weakness to exploit the system instead of technical vulnerabilities. Design/Methodology/Approach: This paper uses PESTLE (political, economic, social, technology, legal and environment) analysis to critically evaluate the external factors affecting S...
Social engineering attacks can be severe and difficult to detect before considerable damage is done....
Social Engineering is a kind of advance persistent threat (APT) that gains private and sensitive inf...
Social engineering attacks pose an escalating threat to organizations. This thesis conducted a semi-...
Purpose: E-Government system emerged as a novel public service provision platform that enables gover...
Social engineering attacking method is a serious threat that targets the human element of informatio...
Abstract: Growth of technologies, interconnected systems and digitalization, securing data becomes a...
Social engineering is as old as human beings and has been used for a thousand years in some way such...
Social engineering penetration testing is a complex but necessary tool to test the security of infor...
The advancements in digital communication technology have made communication between humans more acc...
Social engineering denotes, within the realm of security, a type of attack against the human element...
Now-a-days, social engineering is considered to be one of the most overwhelming threats in the field...
The article explores the pervasive threat of social engineering in cybersecurity, emphasizing its su...
This research will analyze phishing emails and how they relate to cyber security in the modern world...
Since the creation of computers and the web in the 1960s, the amount of usage and reliance people ha...
Social Engineering (ES) is now considered the great security threat to people and organizations. Eve...
Social engineering attacks can be severe and difficult to detect before considerable damage is done....
Social Engineering is a kind of advance persistent threat (APT) that gains private and sensitive inf...
Social engineering attacks pose an escalating threat to organizations. This thesis conducted a semi-...
Purpose: E-Government system emerged as a novel public service provision platform that enables gover...
Social engineering attacking method is a serious threat that targets the human element of informatio...
Abstract: Growth of technologies, interconnected systems and digitalization, securing data becomes a...
Social engineering is as old as human beings and has been used for a thousand years in some way such...
Social engineering penetration testing is a complex but necessary tool to test the security of infor...
The advancements in digital communication technology have made communication between humans more acc...
Social engineering denotes, within the realm of security, a type of attack against the human element...
Now-a-days, social engineering is considered to be one of the most overwhelming threats in the field...
The article explores the pervasive threat of social engineering in cybersecurity, emphasizing its su...
This research will analyze phishing emails and how they relate to cyber security in the modern world...
Since the creation of computers and the web in the 1960s, the amount of usage and reliance people ha...
Social Engineering (ES) is now considered the great security threat to people and organizations. Eve...
Social engineering attacks can be severe and difficult to detect before considerable damage is done....
Social Engineering is a kind of advance persistent threat (APT) that gains private and sensitive inf...
Social engineering attacks pose an escalating threat to organizations. This thesis conducted a semi-...