نتایج جستجو برای: social engineering

تعداد نتایج: 861653  

Journal: :Communications in computer and information science 2021

The correct management of information systems security is often overlooked in technological measures and efforts, although there are now many tools to address threats, the human aspect has been neglected. This paper discusses factors that could potentially lead intrusions with social engineering. Social engineering a method used by hackers obtain access manipulating flaws behavior known as ment...

2008
Imed Hammouda Jan Bosch Mehdi Jazayeri Tommi Mikkonen

The First International Workshop on Social Software Engineering and Applications discusses various topics related to the engineering and use of social software. The aim of the workshop is to create a scientific foundation for social software and to form a research community that can focus on the technological and technical aspects of the movement.

2015
Heidi Wilcox Maumita Bhattacharya

The increasing threat of social engineers targeting social media channels to advance their attack effectiveness on company data has seen many organizations introducing initiatives to better understand these vulnerabilities. This paper examines concerns of social engineering through social media within the enterprise and explores countermeasures undertaken to stem ensuing risk. Also included is ...

2006
Ying Wang Partha Dasgupta

As the Internet becomes a popular means of business transactions, online social engineering has been used to commit fraud, identity theft, etc. The current solutions to remote user authentication are vulnerable to Social engineering attacks, because the base of these schemes, the security of the password, is no longer hold. In this paper, we present a new remote authentication scheme using the ...

Increasing usage of Internet and computer networks by individuals and organizations and also attackers’ usage of new methods and tools in an attempt to endanger network security, have led to the emergence of a wide range of threats to networks. A honeypot is one of the basic techniques employed for network security improvement. It is basically designed to be attacked so as to get the attackers’...

2010
Martin Ebner Imed Hammouda Hans-Jörg Happel Walid Maalej Wolfgang Reinhardt

Software is created by people, with people and for people. These people work in varying environments. They have their particular backgrounds and act under different conditions. Thus understanding the human and social aspects of software engineering is crucial to understanding how methods and tools are used, and thereby improving the creation and maintenance of software systems as well as the ma...

2013
Susanne Quiel Dieter Gollmann Sven Übelacker

This thesis shows that social engineering mainly relies on peripheral route persuasion and that consequently, Cialdini’s principles of influence can be used to explain how social engineering attacks work. It is further shown by a comprehensive literature review that individual values of personality traits relate to social engineering susceptibility. Based on these arguments, a framework is prop...

2005
Hans van Vliet

The “engineering” focus in software engineering education leaves instructors vulnerable to several traps. It also misleads students as to SE’s essential human and social dimensions. In this paper we argue that there’s more to SE than engineering. A major challenge is to reconcile the engineering dimension with the human and social dimension.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید