Background: Social engineering is an acute threat to modern enterprises. In large companies, dynamic information flows and changes in management processes increase the number of attack points for social engineers, which entails possible unwanted information outflows. Objective: The study aims to analyze social engineering attacks, identify their complexity, and compare them with the types of attacks. The primary objective is to determine the key mechanisms to counter social engineering. Methods: The paper analyzes the current body of scientific literature concerning the legal regulation of social engineering methods and the study of criminalized social engineering. The methodological foundation of the study is a combination of scientific re...
Abstract: Growth of technologies, interconnected systems and digitalization, securing data becomes a...
Social engineering is a type of attack that allows unauthorized access to a system to achieve specif...
Social Engineering attacks are generating concern in organizations, because this type of attack viol...
Background: Social engineering is an acute threat to modern enterprises. In large companies, dynamic...
Social engineering is a method of attack aimed at the state, organization, or individual. It focuses...
Trabalho apresentado em WorldCist'22 - 10th World Conference on Information Systems and Technologies...
As the technology to secure information improves, hackers will employ less technical means to get ac...
The correct management of information systems security is often over looked in technological measure...
Social engineering denotes, within the realm of security, a type of attack against the human element...
This paper examines the role and value of information security awareness efforts in defending agains...
Social engineering is hacking and manipulating people's minds to obtain access to networks and syste...
Social engineering, as an art of deception, is very present in the era of globalization and it inter...
Social Engineering can be defined as those strategies and techniques used to obtain information from...
Social engineering is something that everyone is familiar in one way or another. We are dealing with...
The paper shows an investigation utilizing assaults, for example, a phony passage and a phishing pag...
Abstract: Growth of technologies, interconnected systems and digitalization, securing data becomes a...
Social engineering is a type of attack that allows unauthorized access to a system to achieve specif...
Social Engineering attacks are generating concern in organizations, because this type of attack viol...
Background: Social engineering is an acute threat to modern enterprises. In large companies, dynamic...
Social engineering is a method of attack aimed at the state, organization, or individual. It focuses...
Trabalho apresentado em WorldCist'22 - 10th World Conference on Information Systems and Technologies...
As the technology to secure information improves, hackers will employ less technical means to get ac...
The correct management of information systems security is often over looked in technological measure...
Social engineering denotes, within the realm of security, a type of attack against the human element...
This paper examines the role and value of information security awareness efforts in defending agains...
Social engineering is hacking and manipulating people's minds to obtain access to networks and syste...
Social engineering, as an art of deception, is very present in the era of globalization and it inter...
Social Engineering can be defined as those strategies and techniques used to obtain information from...
Social engineering is something that everyone is familiar in one way or another. We are dealing with...
The paper shows an investigation utilizing assaults, for example, a phony passage and a phishing pag...
Abstract: Growth of technologies, interconnected systems and digitalization, securing data becomes a...
Social engineering is a type of attack that allows unauthorized access to a system to achieve specif...
Social Engineering attacks are generating concern in organizations, because this type of attack viol...