Academic literature on the topic 'Pretexting'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Pretexting.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Pretexting"

1

Mikhaleva, U. A. "Pretexting and means to counter it." Herald of Dagestan State Technical University. Technical Sciences 50, no. 2 (2023): 109–16. http://dx.doi.org/10.21822/2073-6185-2023-50-2-109-116.

Full text
Abstract:
Objective. Currently, fraud is one of the most pressing problems in modern society. The number of victims of scammers using social engineering methods is growing day by day. Because fraud is a type of crime that is very difficult to prove. The aim of the study is to find a method to counteract pretexting as an increase in the information security of the population.Method. This article uses the following methods: description, analysis, deduction.Result. The analysis of the description of social engineering methods made it possible to classify them according to the way they influence a person. A
APA, Harvard, Vancouver, ISO, and other styles
2

Khamdamova, L. K. "PROTECTION AGAINST PRETEXTING-TYPE SOCIAL ENGINEERING ATTACKS BY MEANS OF A SPEECH PATTERN DETECTION SYSTEM." DYNAMICS OF SYSTEMS, MECHANISMS AND MACHINES 11, no. 4 (2023): 128–32. http://dx.doi.org/10.25206/2310-9793-2023-11-4-128-132.

Full text
Abstract:
Social engineering is one of the main threats to information security, since it is aimed at human consciousness. In order to protect against pretexting-type social engineering attacks, this article discusses a system for detecting speech patterns through contextual analysis. The scope of application of the developed program can be government organizations, as well as small and medium-sized businesses.
APA, Harvard, Vancouver, ISO, and other styles
3

Potthas, Christine, Patrick Berry, and Hamad Al-Naimi. "Social engineering." Advances in Engineering Innovation 2, no. 1 (2023): 22–25. http://dx.doi.org/10.54254/2977-3903/2/2023016.

Full text
Abstract:
The realm of cybersecurity is replete with challenges, not least among them being the art of social engineering. This form of attack leverages human tendencies such as trust, leading to potential breaches. Though more covert than brute force or technical hacks, social engineering can be insidiously effective. Within this exposition, we probe various manifestations of social engineering: from phishing to pretexting, baiting to tailgating, and the subtle act of shoulder surfing, concluding with mitigation strategies.
APA, Harvard, Vancouver, ISO, and other styles
4

Freeman, Edward H. "Pretexting, Data Mining and Personal Privacy: The Gramm—Leach—Bliley Act." Information Systems Security 11, no. 2 (2002): 4–8. http://dx.doi.org/10.1201/1086/43320.11.2.20020501/36763.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jin, Yan, and Christopher J. Kelsay. "Typology and dimensionality of litigation public relations strategies: The Hewlett-Packard board pretexting scandal case." Public Relations Review 34, no. 1 (2008): 66–69. http://dx.doi.org/10.1016/j.pubrev.2007.11.009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Naz, Anam, Madiha Sarwar, Muhammad Kaleem, Muhammad Azhar Mushtaq, and Salman Rashid. "A comprehensive survey on social engineering-based attacks on social networks." International Journal of ADVANCED AND APPLIED SCIENCES 11, no. 4 (2024): 139–54. http://dx.doi.org/10.21833/ijaas.2024.04.016.

Full text
Abstract:
Threats based on social engineering in social networks are becoming a more common problem. Social engineering is a type of attack that relies on trickery and exploiting human psychology to gain access to confidential information or resources. It involves deceptive techniques like phishing, pretexting, and baiting, tricking individuals into revealing sensitive information or performing specific actions. These tactics can lead to unauthorized access to user accounts, identity theft, or the distribution of harmful content. This study offers a detailed review of threats related to social engineeri
APA, Harvard, Vancouver, ISO, and other styles
7

Olaniyi, Oluwaseun Oladeji, Christopher Uzoma Asonze, Samson Abidemi Ajayi, Samuel Oladiipo Olabanji, and Chinasa Susan Adigwe. "A Regressional Study on the Impact of Organizational Security Culture and Transformational Leadership on Social Engineering Awareness among Bank Employees: The Interplay of Security Education and Behavioral Change." Asian Journal of Economics, Business and Accounting 23, no. 23 (2023): 128–43. http://dx.doi.org/10.9734/ajeba/2023/v23i231176.

Full text
Abstract:
Organizations across various sectors are increasingly vulnerable to cybersecurity breaches in an era characterized by unprecedented technological advancements and a rapidly evolving threat landscape. Among the myriad methods employed by malicious actors, social engineering stands out as a particularly insidious and effective means of infiltrating secure systems and obtaining sensitive information. To effectively address these issues, organizations must establish and sustain a principled security process; this process goes beyond installing the latest security technologies. It encompasses the c
APA, Harvard, Vancouver, ISO, and other styles
8

Kondo, Toshiaki, Sanami Nagao, Takashi Yanagishita, and Hideki Masuda. "Communication—Formation of Porous Anodic TiO2with Square Nanoholes by Pretexturing Process." Journal of The Electrochemical Society 163, no. 7 (2016): E206—E207. http://dx.doi.org/10.1149/2.1241607jes.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Masuda, Hideki, Minoru Tajima, and Kazuyuki Nishio. "Site Control of Tunnel Etching of Al for Electrolytic Capacitors Using Pretexturing by Mold." Chemistry Letters 31, no. 11 (2002): 1150–51. http://dx.doi.org/10.1246/cl.2002.1150.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

"ANTHROPOLOGY OF PHONE FRAUD USING PRETEXTING: A CRIMINOLOGICAL STUDY." Monitoring of Law Enforcement, no. 2 (2023). http://dx.doi.org/10.21681/2226-0692-2023-2-32-38.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!