نتایج جستجو برای: social engineering
تعداد نتایج: 861653 فیلتر نتایج به سال:
The correct management of information systems security is often overlooked in technological measures and efforts, although there are now many tools to address threats, the human aspect has been neglected. This paper discusses factors that could potentially lead intrusions with social engineering. Social engineering a method used by hackers obtain access manipulating flaws behavior known as ment...
The First International Workshop on Social Software Engineering and Applications discusses various topics related to the engineering and use of social software. The aim of the workshop is to create a scientific foundation for social software and to form a research community that can focus on the technological and technical aspects of the movement.
The increasing threat of social engineers targeting social media channels to advance their attack effectiveness on company data has seen many organizations introducing initiatives to better understand these vulnerabilities. This paper examines concerns of social engineering through social media within the enterprise and explores countermeasures undertaken to stem ensuing risk. Also included is ...
As the Internet becomes a popular means of business transactions, online social engineering has been used to commit fraud, identity theft, etc. The current solutions to remote user authentication are vulnerable to Social engineering attacks, because the base of these schemes, the security of the password, is no longer hold. In this paper, we present a new remote authentication scheme using the ...
Increasing usage of Internet and computer networks by individuals and organizations and also attackers’ usage of new methods and tools in an attempt to endanger network security, have led to the emergence of a wide range of threats to networks. A honeypot is one of the basic techniques employed for network security improvement. It is basically designed to be attacked so as to get the attackers’...
Software is created by people, with people and for people. These people work in varying environments. They have their particular backgrounds and act under different conditions. Thus understanding the human and social aspects of software engineering is crucial to understanding how methods and tools are used, and thereby improving the creation and maintenance of software systems as well as the ma...
This thesis shows that social engineering mainly relies on peripheral route persuasion and that consequently, Cialdini’s principles of influence can be used to explain how social engineering attacks work. It is further shown by a comprehensive literature review that individual values of personality traits relate to social engineering susceptibility. Based on these arguments, a framework is prop...
The “engineering” focus in software engineering education leaves instructors vulnerable to several traps. It also misleads students as to SE’s essential human and social dimensions. In this paper we argue that there’s more to SE than engineering. A major challenge is to reconcile the engineering dimension with the human and social dimension.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید