Since the creation of computers and the web in the 1960s, the amount of usage and reliance people have on the internet has increased drastically. As people depend more on the internet, cyber and information security becomes a significant area of concern. In recent years, social engineering attack (SEA) has been prevailing and more people fall victims to such scams. This project aims to develop a web application to educate and mitigate potential SEA. The web application is a password manager which safekeeps the user’s passwords. It also has education and evaluation functions in place to measure the user's readiness to defend against SEAs. In conclusion, the projects' goals were met satisfactorily. However, there is still space for further ...
This paper examines the role and value of information security awareness efforts in defending agains...
Social engineering is something that everyone is familiar in one way or another. We are dealing with...
Cyber security has come under the spotlight in recent years as cyber-attacks and threats continue to...
Social engineering has been an extremely serious security threat for several years, and the number o...
Nowadays, cybersecurity has become a hot debate topic because of the rapid development of the Intern...
Cybersecurity is an integral part of the computer systems especially in current time where data is a...
Purpose: E-Government system emerged as a novel public service provision platform that enables gover...
Social engineering denotes, within the realm of security, a type of attack against the human element...
In this day and age, social engineering attacks are among the most dangerous dangers. It is now prev...
In today’s current information security ecosystem, hardware and software securities have made the pr...
Social engineering attacking method is a serious threat that targets the human element of informatio...
The article explores the pervasive threat of social engineering in cybersecurity, emphasizing its su...
The advancements in digital communication technology have made communication between humans more acc...
With the rapid advancement of technologies in the era of Industry 4.0, the inter-connected nature of...
There are many approaches that malicious individuals or hackers apply in the attempt to violate the ...
This paper examines the role and value of information security awareness efforts in defending agains...
Social engineering is something that everyone is familiar in one way or another. We are dealing with...
Cyber security has come under the spotlight in recent years as cyber-attacks and threats continue to...
Social engineering has been an extremely serious security threat for several years, and the number o...
Nowadays, cybersecurity has become a hot debate topic because of the rapid development of the Intern...
Cybersecurity is an integral part of the computer systems especially in current time where data is a...
Purpose: E-Government system emerged as a novel public service provision platform that enables gover...
Social engineering denotes, within the realm of security, a type of attack against the human element...
In this day and age, social engineering attacks are among the most dangerous dangers. It is now prev...
In today’s current information security ecosystem, hardware and software securities have made the pr...
Social engineering attacking method is a serious threat that targets the human element of informatio...
The article explores the pervasive threat of social engineering in cybersecurity, emphasizing its su...
The advancements in digital communication technology have made communication between humans more acc...
With the rapid advancement of technologies in the era of Industry 4.0, the inter-connected nature of...
There are many approaches that malicious individuals or hackers apply in the attempt to violate the ...
This paper examines the role and value of information security awareness efforts in defending agains...
Social engineering is something that everyone is familiar in one way or another. We are dealing with...
Cyber security has come under the spotlight in recent years as cyber-attacks and threats continue to...