This paper examines the social in information security. We argue that there is always a social aspect in technical information security attacks. By using Erving Goffman’s sociological concept of “frame”, we analyse the social in different illustrative contexts, in which technical attacks are compared with social engineering attacks. Through examining the concept of normality, we found that social engineering attacks and technical attacks can resemble each other. In both attack forms, the intruders can hide their actions in the flow of normality. Thus, we question the fertility of information security’s bifurcation into the two separate branches (technical/social). Instead of thinking the technical as separated and free of the social, we arg...
Part 3: Peace, War, Cyber-Security and ICTInternational audienceThe human is often the weak link in ...
The advancements in digital communication technology have made communication between humans more acc...
Social engineering, in terms of information security, refers to manipulation of people into performi...
This thesis is about grounding an increasingly common practice in an established theory where no exp...
Abstract: Growth of technologies, interconnected systems and digitalization, securing data becomes a...
Social engineering denotes, within the realm of security, a type of attack against the human element...
Information security importance is rising. Information security awareness' is spreading, and this gi...
Social engineering, as an art of deception, is very present in the era of globalization and it inter...
This theses concerns with social engineering and defense against it. Social engineering attacks repr...
Social engineering attacks can be severe and difficult to detect before considerable damage is done....
This paper examines the role and value of information security awareness efforts in defending agains...
The correct management of information systems security is often over looked in technological measure...
Cybersecurity is an integral part of the computer systems especially in current time where data is a...
Social engineering is something that everyone is familiar in one way or another. We are dealing with...
The purpose of this paper is to establish a terminological framework in order to explain social engi...
Part 3: Peace, War, Cyber-Security and ICTInternational audienceThe human is often the weak link in ...
The advancements in digital communication technology have made communication between humans more acc...
Social engineering, in terms of information security, refers to manipulation of people into performi...
This thesis is about grounding an increasingly common practice in an established theory where no exp...
Abstract: Growth of technologies, interconnected systems and digitalization, securing data becomes a...
Social engineering denotes, within the realm of security, a type of attack against the human element...
Information security importance is rising. Information security awareness' is spreading, and this gi...
Social engineering, as an art of deception, is very present in the era of globalization and it inter...
This theses concerns with social engineering and defense against it. Social engineering attacks repr...
Social engineering attacks can be severe and difficult to detect before considerable damage is done....
This paper examines the role and value of information security awareness efforts in defending agains...
The correct management of information systems security is often over looked in technological measure...
Cybersecurity is an integral part of the computer systems especially in current time where data is a...
Social engineering is something that everyone is familiar in one way or another. We are dealing with...
The purpose of this paper is to establish a terminological framework in order to explain social engi...
Part 3: Peace, War, Cyber-Security and ICTInternational audienceThe human is often the weak link in ...
The advancements in digital communication technology have made communication between humans more acc...
Social engineering, in terms of information security, refers to manipulation of people into performi...