User Awareness Measurement Through Social Engineering

نویسندگان

  • Tolga Mataracioglu
  • Sevgi Özkan
چکیده

TUBITAK National Research Institute of Electronics and Cryptology (UEKAE) Department of Information Systems Security makes social engineering attacks to Turkish public agencies within the frame of “Information Security Tests” [19]. This paper will make an analysis of the social engineering tests that have been carried out in several Turkish public agencies. The tests include phone calling to sample employees by the social engineer and trying to seize employees’ sensitive information by exploiting their good faith. The aim of this research is to figure that the employees in Turkish public agencies have a lack of information security awareness and they compromise the information security principles which should be necessarily applied for any public agencies. Social engineering, both with its low cost and ability to take advantage of low technology, has taken its place in the information security literature as a very effective form of attack [8].

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Identifying Potential Social Impact of Collaborative Systems at Design Time

This paper presents Manas, a Semiotic Engineering epistemic tool for the design of collaborative systems (CoSys) whose aim is to expand the designers’ knowledge and awareness of their influence on groups and group dynamics. Manas has been developed to help designers represent their conception of computer-mediated communication and reflect upon some of its potential social effects, springing fro...

متن کامل

Towards a Security Lifecycle Model against Social Engineering Attacks: SLM-SEA

This research considers the impact of social engineering security attacks which are noted as taking opportunities for critically exploiting user awareness and behavior. The research proposes in this respect a ‘managerial’ method in an attempt to enhance or even ensure protection. The aim of this study is to construct a security lifecycle model against these eventualities and to analyze the test...

متن کامل

Similarity measurement for describe user images in social media

Online social networks like Instagram are places for communication. Also, these media produce rich metadata which are useful for further analysis in many fields including health and cognitive science. Many researchers are using these metadata like hashtags, images, etc. to detect patterns of user activities. However, there are several serious ambiguities like how much reliable are these informa...

متن کامل

Enabling End-User Tailoring and Development of Mobile Information Systems

The research planned for this PhD is concerned with resolving novel challenges of mobile information systems through adapting and tailoring requirements engineering techniques and assembling a thorough design pattern space. Both the requirements engineering techniques and the patterns will be concerned with the importance of non-functional requirements and focus on the idiosyncrasies of mobile ...

متن کامل

Students ' Approach to User Needs

Various methods exist to help engineers and designers determine user needs as part of the user-oriented design process. Many of these methods are taught in engineering design classes throughout the country. By following the progress of 18 groups of student teams in a product design project-based class at MIT, it is found that students' awareness of these user-needs methods is critical, as stude...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1108.2149  شماره 

صفحات  -

تاریخ انتشار 2010