Never Rely On Information Security Systems Social Engineering Attack

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Information Security Technology? Don't Rely on It. A Case Study in Social Engineering

Many companies spend hundreds of thousands of dollars to ensure corporate computer security. The security protects company secrets, assists in compliance with federal laws, and enforces privacy of company clients. Unfortunately, even the best security mechanisms can be bypassed through Social Engineering. Social Engineering uses very low cost and low technology means to overcome impediments pos...

متن کامل

Human children rely more on social information than chimpanzees do.

Human societies are characterized by more cultural diversity than chimpanzee communities. However, it is currently unclear what mechanism might be driving this difference. Because reliance on social information is a pivotal characteristic of culture, we investigated individual and social information reliance in children and chimpanzees. We repeatedly presented subjects with a reward-retrieval t...

متن کامل

Attack Patterns for Security Requirements Engineering

The importance of security concerns at requirements engineering time is increasingly recognized. However, little support is available to help requirements engineers elaborate adequate, consistent, and complete security requirements. The paper presents a reuse-based approach for modeling, specifying, and analyzing application-specific security requirements. The method is based on a goal-oriented...

متن کامل

Social Engineering: The Neglected Human Factor for Information Security Management

Effective information systems security management combines technological measures and managerial efforts. Although various technical means have been employed to cope with security threats, human factors have been comparatively neglected. This article examines human factors that can lead to social engineering intrusions. Social engineering is a technique used by malicious attackers to gain acces...

متن کامل

Shaping Information Security Behaviors Related to Social Engineering Attacks

Today, few companies would manage to continuously stay competitive without the proper utilization of information technology (IT). This has increased companies’ dependency of IT and created new threats that need to be addressed to mitigate risks to daily business operations. A large extent of these IT-related threats includes hackers attempting to gain unauthorized access to internal computer ne...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: JOIV : International Journal on Informatics Visualization

سال: 2019

ISSN: 2549-9904,2549-9610

DOI: 10.30630/joiv.3.1.219