Academic literature on the topic 'Social engineering attacks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Social engineering attacks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Social engineering attacks"

1

Shi, Zheyuan Ryan, Aaron Schlenker, Brian Hay, Daniel Bittleston, Siyu Gao, Emily Peterson, John Trezza, and Fei Fang. "Draining the Water Hole: Mitigating Social Engineering Attacks with CyberTWEAK." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 08 (April 3, 2020): 13363–68. http://dx.doi.org/10.1609/aaai.v34i08.7050.

Full text
Abstract:
Cyber adversaries have increasingly leveraged social engineering attacks to breach large organizations and threaten the well-being of today's online users. One clever technique, the “watering hole” attack, compromises a legitimate website to execute drive-by download attacks by redirecting users to another malicious domain. We introduce a game-theoretic model that captures the salient aspects for an organization protecting itself from a watering hole attack by altering the environment information in web traffic so as to deceive the attackers. Our main contributions are (1) a novel Social Engineering Deception (SED) game model that features a continuous action set for the attacker, (2) an in-depth analysis of the SED model to identify computationally feasible real-world cases, and (3) the CyberTWEAK algorithm which solves for the optimal protection policy. To illustrate the potential use of our framework, we built a browser extension based on our algorithms which is now publicly available online. The CyberTWEAK extension will be vital to the continued development and deployment of countermeasures for social engineering.
APA, Harvard, Vancouver, ISO, and other styles
2

Luo, Xin, Richard Brody, Alessandro Seazzu, and Stephen Burd. "Social Engineering." Information Resources Management Journal 24, no. 3 (July 2011): 1–8. http://dx.doi.org/10.4018/irmj.2011070101.

Full text
Abstract:
Effective information systems security management combines technological measures and managerial efforts. Although various technical means have been employed to cope with security threats, human factors have been comparatively neglected. This article examines human factors that can lead to social engineering intrusions. Social engineering is a technique used by malicious attackers to gain access to desired information by exploiting the flaws in human logic known as cognitive biases. Social engineering is a potential threat to information security and should be considered equally important to its technological counterparts. This article unveils various social engineering attacks and their leading human factors, and discusses several ways to defend against social engineering: education, training, procedure, and policy. The authors further introduce possible countermeasures for social engineering attacks. Future analysis is also presented.
APA, Harvard, Vancouver, ISO, and other styles
3

Salahdine, Fatima, and Naima Kaabouch. "Social Engineering Attacks: A Survey." Future Internet 11, no. 4 (April 2, 2019): 89. http://dx.doi.org/10.3390/fi11040089.

Full text
Abstract:
The advancements in digital communication technology have made communication between humans more accessible and instant. However, personal and sensitive information may be available online through social networks and online services that lack the security measures to protect this information. Communication systems are vulnerable and can easily be penetrated by malicious users through social engineering attacks. These attacks aim at tricking individuals or enterprises into accomplishing actions that benefit attackers or providing them with sensitive data such as social security number, health records, and passwords. Social engineering is one of the biggest challenges facing network security because it exploits the natural human tendency to trust. This paper provides an in-depth survey about the social engineering attacks, their classifications, detection strategies, and prevention procedures.
APA, Harvard, Vancouver, ISO, and other styles
4

Krombholz, Katharina, Heidelinde Hobel, Markus Huber, and Edgar Weippl. "Advanced social engineering attacks." Journal of Information Security and Applications 22 (June 2015): 113–22. http://dx.doi.org/10.1016/j.jisa.2014.09.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ye, Ziwei, Yuanbo Guo, Ankang Ju, Fushan Wei, Ruijie Zhang, and Jun Ma. "A Risk Analysis Framework for Social Engineering Attack Based on User Profiling." Journal of Organizational and End User Computing 32, no. 3 (July 2020): 37–49. http://dx.doi.org/10.4018/joeuc.2020070104.

Full text
Abstract:
Social engineering attacks are becoming serious threats to cloud service. Social engineering attackers could get Cloud service custom privacy information or attack virtual machine images directly. Existing security analysis instruments are difficult to quantify the social engineering attack risk, resulting in invalid defense guidance for social engineering attacks. In this article, a risk analysis framework for social engineering attack is proposed based on user profiling. The framework provides a pathway to quantitatively calculate the possibility of being compromised by social engineering attack and potential loss, so as to effectively complement current security assessment instruments. The frequency of related operations is used to profile and group users for respective risk calculation, and other features such as security awareness and capability of protection mechanism are also considered. Finally, examples are given to illustrate how to use the framework in actual scenario and apply it to security assessment.
APA, Harvard, Vancouver, ISO, and other styles
6

Beckers, Kristian, Leanid Krautsevich, and Artsiom Yautsiukhin. "Using Attack Graphs to Analyze Social Engineering Threats." International Journal of Secure Software Engineering 6, no. 2 (April 2015): 47–69. http://dx.doi.org/10.4018/ijsse.2015040103.

Full text
Abstract:
The acquisition of information about computer systems by mostly non-technical means is called social engineering. Most critical systems are vulnerable to social threats, even when technical security is high. Social engineering is a technique that: (i) does not require any (advanced) technical tools, (ii) can be used by anyone, (iii) is cheap, (iv) almost impossible to eliminate completely. The integration of social engineering attackers with other attackers, such as software or network ones, is missing so far. Existing research focuses on classifying and analyzing social engineering attacks. The authors' contribution is to consider social engineering exploits together with technical vulnerabilities. The authors introduce a method for the integration of social engineering exploits into attack graphs and propose a simple quantitative analysis of the graphs that helps to develop a comprehensive defensive strategy.
APA, Harvard, Vancouver, ISO, and other styles
7

Alhamad, Amal, Dalal Aldablan, and Raghad Albahlal. "Examination of Assorted Social Engineering Attack by Different Types of Machine Learning Algorithms." International Journal of Computer Science and Mobile Computing 10, no. 7 (July 30, 2021): 56–60. http://dx.doi.org/10.47760/ijcsmc.2021.v10i07.008.

Full text
Abstract:
The most powerful attack on the systems is Social Engineering Attack because of this attack deals with Psychology so that there is no hardware or software can prevent it or even can defend it and hence people need to be trained to defend against it.[1] Social engineering is mostly done by phone or email. In this research, which is based on previous research we have conducted, the aim of it was of it was to highlight the different social engineering attacks and how they can prevent in social network because social engineering is one of the biggest problems in social network, a concern the privacy and security. This project is using a set of data then analysis it uses the Weka tool, to defend against these attacks we have evaluated three decision tree algorithms, RandomForest, REPTree and RandomTree. It was also related to an J48 algorithm, On the contrary, here contains a complete overview of social engineering attacks, also more than one algorithm was searched.
APA, Harvard, Vancouver, ISO, and other styles
8

VLAD, Ionela-Mariana. "Security of Personal Data in Social Networks." International Journal of Information Security and Cybercrime 7, no. 2 (December 29, 2018): 14–24. http://dx.doi.org/10.19107/ijisc.2018.02.02.

Full text
Abstract:
Nowadays, social networks are some of the fastest growing online services. Take for instance the case of Facebook which is considered to be the second most visited site on the Internet and reports growth rates of 3% per week. Social engineering attacks target human weaknesses instead of the technical vulnerabilities of the system. Usually, the attackers are attracted by the large amount of personal data published on the user’s profile. In social networks, the next attacks are specific to reverse social engineering: recommendation-based, visitor tracking-based and demographics-based attacks. In this paper, I will study the risks of using Facebook, the implication of Reverse Social Engineering in social networks and methods of securing a Facebook account.
APA, Harvard, Vancouver, ISO, and other styles
9

Aldawood, Hussain, and Geoffrey Skinner. "An Advanced Taxonomy for Social Engineering Attacks." International Journal of Computer Applications 177, no. 30 (January 16, 2020): 1–11. http://dx.doi.org/10.5120/ijca2020919744.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sarriegi, Jose M., and Jose J. Gonzalez. "Conceptualising social engineering attacks through system archetypes." International Journal of System of Systems Engineering 1, no. 1/2 (2008): 111. http://dx.doi.org/10.1504/ijsse.2008.018134.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Social engineering attacks"

1

Cerovic, Lazar. "Identifying Resilience Against Social Engineering Attacks." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280131.

Full text
Abstract:
Social engineering (SE) attacks are one of the most common cyber attacks and frauds, which causes a large economical destruction to individuals, companies and governments alike. The attacks are hard to protect from, since SE-attacks is based on exploiting human weaknesses. The goal of this study is to identify indicators of resilience against SE-attacks from individual computer space data, such as network settings, social media profiles, web browsing behaviour and more. This study is based on qualitative methods to collect information, analyse and evaluate data. Resilience is evaluated with models such as theory of planned behaviour and the big five personality traits, as well as personal and demographic information. Indicators of resilience were found in network settings such as service set identifiers (SSID) and routers, web history, social media use and more. The framework developed in this study could be expanded with more aspect of individual data and different evaluation criteria. Further studies can be done about this subject with tools such as artificial intelligence and machine learning.
Sociala manipulationer är bland de vanligaste cyber attackerna och bedrägerierna som orsakar enorma ekonomiska skador varje år för individer, företag och myndigheter. Dessa attacker är svåra att skydda ifrån då sociala manipulationer utnyttjar mänskliga svagheter som ett medel till att stjäla pengar eller information. Målet med studien är att identifiera indikatorer av motstånd mot sociala manipulationsattacker, vilket ska göras med hjälp av individuell data, som kan bestå av nätverksinställningar, sociala medieprofiler, webbaktivitet bland annat. Denna studie är baserat på kvalitativa metoder för att samla, analysera och utvärdera data. Motstånd mot social manipulation utvärderas med hjälp av relevanta teorier och modeller som har med beteende och personligheter att göra, sedan används även personlig och demografisk information i utvärderingen. De indikatorer som identifierades var bland annat inställningar i routrar, webbhistorik och social medianvändning. Det teoretiska ramverket som utvecklades för att utvärdera motstånd mot sociala manipulationsattacker kan utökas med fler aspekter av individuell data. Viktiga samhällshändelser och sammanhang kan vara en intressant faktor som är relaterat till ämnet. Framtida studier skulle kunna kombinera detta ramverk med tekniker som maskinlärning och artificiell intelligens.
APA, Harvard, Vancouver, ISO, and other styles
2

Jansson, Kenny. "A model for cultivating resistance to social engineering attacks." Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/1588.

Full text
Abstract:
The human being is commonly considered as being the weakest link in information security. Subsequently, as information is one of the most critical assets in an organization today, it is essential that the human element is considered in deployments of information security countermeasures. However, the human element is often neglected in this regard. Consequently, many criminals are now targeting the user directly to obtain sensitive information instead of spending days or even months trying to hack through systems. Some criminals are targeting users by utilizing various social engineering techniques to deceive the user into disclosing information. For this reason, the users of the Internet and ICT-related technologies are nowadays very vulnerable to various social engineering attacks. As a contribution to increase users’ social engineering awareness, a model – called SERUM – was devised. SERUM aims to cultivate social engineering resistance within a community through exposing the users of the community to ‘fake’ social engineering attacks. The users that react incorrectly to these attacks are instantly notified and requested to participate in an online social engineering awareness program. Thus, users are educated on-demand. The model was implemented as a software system and was utilized to conduct a phishing exercise on all the students of the Nelson Mandela Metropolitan University. The aim of the phishing exercise was to determine whether SERUM is effective in cultivating social engineering resistant behaviour within a community. This phishing exercise proved to be successful and positive results emanated. This indicated that a model like SERUM can indeed be used to educate users regarding phishing attacks.
APA, Harvard, Vancouver, ISO, and other styles
3

Rocha, Flores Waldo. "Shaping information security behaviors related to social engineering attacks." Doctoral thesis, KTH, Elkraftteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-186113.

Full text
Abstract:
Today, few companies would manage to continuously stay competitive without the proper utilization of information technology (IT). This has increased companies’ dependency of IT and created new threats that need to be addressed to mitigate risks to daily business operations. A large extent of these IT-related threats includes hackers attempting to gain unauthorized access to internal computer networks by exploiting vulnerabilities in the behaviors of employees. A common way to exploit human vulnerabilities is to deceive and manipulate employees through the use of social engineering. Although researchers have attempted to understand social engineering, there is a lack of empirical research capturing multilevel factors explaining what drives employees’ existing behaviors and how these behaviors can be improved. This is addressed in this thesis. The contribution of this thesis includes (i) an instrument to measure security behaviors and its multilevel determinants, (ii) identification of multilevel variables that significantly influence employees’ intent for behavior change, (iii) identification of what behavioral governance factors that lay the foundation for behavior change, (iv) identification that national culture has a significant effect on how organizations cope with behavioral information security threats, and (v) a strategy to ensure adequate information security behaviors throughout an organization. This thesis is a composite thesis of eight papers. Paper 1 describes the instrument measuring multilevel determinants. Paper 2 and 3 describes how security knowledge is established in organizations, and the effect on employee information security awareness. In Paper 4 the root cause of employees’ intention to change their behaviors and resist social engineering is described. Paper 5 and 8 describes how the instrument to measure social engineering security behaviors was developed and validated through scenario-based surveys and phishing experiments. Paper 6 and 7 describes experiments performed to understand reason to why employees fall for social engineering. Finally, paper 2, 5 and 6 examines the moderating effect of national culture.

QC 20160503

APA, Harvard, Vancouver, ISO, and other styles
4

Nohlberg, Marcus. "Securing Information Assets : Understanding, Measuring and Protecting against Social Engineering Attacks." Doctoral thesis, Kista : Department of Computer and Systems Sciences (together with KTH), Stockholm University, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-8379.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Carlander-Reuterfelt, Gallo Matias. "Estimating human resilience to social engineering attacks through computer configuration data : A literature study on the state of social engineering vulnerabilities." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-277921.

Full text
Abstract:
Social engineering as a method of attack is increasingly becoming a problem for both corporations and individuals. From identity theft to enormous financial losses, this form of attack is notorious for affecting complex structures, yet often being very simple in its form. Whereas for other forms of cyber- attack, tools like antivirus and antimalware are now industry standard, have proven to be reliable ways to keep safe private and confidential data, there is no such equivalent for social engineering attacks. There is not, as of this day, a trustworthy and precise way of estimating resilience to these attacks, while still keeping the private data private. The purpose of this report is to compile the different aspects of a users computer data that have been proven to significantly indicative of their susceptibility to these kinds of attacks, and with them, devise a system that can, with some degree of precision, estimate the resilience to social engineering of the user. This report is a literature study on the topic of social engineering and how it relates to computer program data, configuration and personality. The different phases of research each led to a more comprehensive way of linking the different pieces of data together and devising a rudimentary way of estimating human resilience to social engineering through the observation of a few configuration aspects. For the purposes of this report, the data had to be reasonably accessible, respecting privacy, and being something that can be easily extrapolated from one user to another. Based on findings, ranging from psychological data and behavioral patterns, to network configurations, we conclude that, even though there is data that supports the possibility of estimating resilience, there is, as of this day, no empirically proven way of doing so in a precise manner. An estimation model is provided by the end of the report, but the limitations of this project did not allow for an experiment to prove its validity beyond the theories it is based upon.
Social Manipulering som attackmetod har blivit ett ökande problem både för företag och individer. Från identitetsstöld till enorma ekonomiska förluster, är denna form av attack känd för att kunna påverka komplexa system, men är ofta i sig mycket enkel i sin form. Medans andra typer av cyberattacker kan skyddas med verktyg som antivirus och antimalware och tillförlitligt hålla privat och konfidentiell information säker så finns det inga motsvarande verktyg för att skydda sig mot Social Manipulering attacker. Det finns alltså inte idag ett pålitligt och säkert sätt att motstå Social Manipulering attacker och skydda personliga uppgifter och privat data. Syftet med denna rapport är att visa olika aspekterna hur datoranvändares data är sårbarhet för dessa typer av attacker, och med dessa utforma ett system som med viss mån av precision kan mäta resiliens mot Social Manipulering. Rapporten är ett resultat av studier av litteratur inom ämnet Social Manipulering och hur den relaterar sig till datorns data, konfiguration och personuppgifter. De olika delarna av utredningen leder var och en till ett mer omfattande sätt att koppla samman de olika uppgifterna och utforma ett rudimentärt sätt att uppskatta en persons resiliens mot Social Manipulering, detta genom att observera olika aspekter av datorns konfiguration. För syftet av rapporten så har uppgifterna varit rimligt tillgängliga, har respekterat integriteten och varit något som lätt kan anpassas från en användare till en annan. Baserat på observationerna av psykologiska data, beteendemönster och nätverkskonfigurationer, så kan vi dra slutsatsen att även om det finns data som stöder möjligheten att uppskatta resiliens, finns det idag inget empiriskt bevisat sätt att göra det på ett exakt sätt. En exempel av modell för att uppskatta resiliens finns i slutet av rapporten. Ramen för detta projekt gjorde det inte möjligt att göra ett praktiskt experiment för att validera teorierna.
APA, Harvard, Vancouver, ISO, and other styles
6

Persson, Anders. "Exploring Phishing Attacks and Countermeasures." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3620.

Full text
Abstract:
Online banking and e-commerce applications have good protection against attacks directed direct towards their computer systems. This, the attacker has considered and instead use “social engineering” attacks, such as phishing to gain access to the information inside [1] [15] [21]. Phishing is a growing problem that many different companies are trying to develop a working protection against. The number of new phishing-sites per month increased by 1363 % between January 2005 and October 2006, from 2560 to 37 444 attacks [3] [2]. Today there are several different antiphishing applications as well as implemented methods to prevent attacks, but it’s not certain they giving enough protection. In this paper we plan to investigate the concept of phishing to better understand the threat it provides. We will analyse 252 different phishing attacks and examine a number of existing antiphishing applications to see if there are possibilities to improve the different protection methods to improve the accuracy of such tools.
APA, Harvard, Vancouver, ISO, and other styles
7

Nordgren, Daniella. "Phishing attacks targeting hospitals : A study over phishing knowledge at Blekingesjukhuset." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-16681.

Full text
Abstract:
Context. Phishing emails is a type of computer attack targeting users and tries to trick them into giving out personal information, follow shady links or download malicious attachments. Phishing is often closely linked to ransomware, which is a type of attack that locks a users computer and asks for a ransom in order to give access back. Ransomware viruses often contaminate a computer through a phishing email. Hospitals are a growing target for these types of attacks because of their need of being able to access their system at all times. Objectives. This study intends to research the phishing knowledge among employees at Blekingesjukhuset and whether Blekingesjukhuset is at a risk of falling victim to a ransomware attack through a phishing email opened by an employee. Methods. This is researched by reading relevant literature and a survey sent out to employees at Blekingesjukhuset regarding their phishing knowledge. Results. The results show that the participants of the survey where overall unsure on how to detect phishing emails and thought that knowledge about the subject is necessary. Conclusions. The conclusion was made that the employees did not know what to look for in order to determine whether an email is a phishing email or not. Based on this information the conclusion can be made that it does exist a risk of Blekingesjukhuset falling victim to a ransomware attack through a phishing email unintentionally opened by an employee.
APA, Harvard, Vancouver, ISO, and other styles
8

Yelne, Samir. "Measures of User Interactions, Conversations, and Attacks in a Crowdsourced Platform Offering Emotional Support." Wright State University / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=wright1482330888961028.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Salem, Omran S. A. "An Integrated Intelligent Approach to Enhance the Security Control of IT Systems. A Proactive Approach to Security Control Using Artificial Fuzzy Logic to Strengthen the Authentication Process and Reduce the Risk of Phishing." Thesis, University of Bradford, 2012. http://hdl.handle.net/10454/14863.

Full text
Abstract:
Hacking information systems is continuously on the increase. Social engineering attacks is performed by manipulating the weakest link in the security chain; people. Consequently, this type of attack has gained a higher rate of success than a technical attack. Based in Expert Systems, this study proposes a proactive and integrated Intelligent Social Engineering Security Model to mitigate the human risk and reduce the impact of social engineering attacks. Many computer users do not have enough security knowledge to be able to select a strong password for their authentication. The author has attempted to implement a novel quantitative approach to achieve strong passwords. A new fuzzy logic tool is being developed to evaluate password strength and measures the password strength based on dictionary attack, time crack and shoulder surfing attack (social engineering). A comparative study of existing tools used by major companies such as Microsoft, Google, CertainKey, Yahoo and Facebook are used to validate the proposed model and tool. A comprehensive literature survey and analytical study performed on phishing emails representing social engineering attacks that are directly related to financial fraud are presented and compared with other security threats. This research proposes a novel approach that successfully addresses social engineering attacks. Another intelligent tool is developed to discover phishing messages and provide educational feedback to the user focusing on the visible part of the incoming emails, considering the email’s source code and providing an in-line awareness security feedback.
APA, Harvard, Vancouver, ISO, and other styles
10

Forde, Edward Steven. "Security Strategies for Hosting Sensitive Information in the Commercial Cloud." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3604.

Full text
Abstract:
IT experts often struggle to find strategies to secure data on the cloud. Although current security standards might provide cloud compliance, they fail to offer guarantees of security assurance. The purpose of this qualitative case study was to explore the strategies used by IT security managers to host sensitive information in the commercial cloud. The study's population consisted of information security managers from a government agency in the eastern region of the United States. The routine active theory, developed by Cohen and Felson, was used as the conceptual framework for the study. The data collection process included IT security manager interviews (n = 7), organizational documents and procedures (n = 14), and direct observation of a training meeting (n = 35). Data collection from organizational data and observational data were summarized. Coding from the interviews and member checking were triangulated with organizational documents and observational data/field notes to produce major and minor themes. Through methodological triangulation, 5 major themes emerged from the data analysis: avoiding social engineering vulnerabilities, avoiding weak encryption, maintaining customer trust, training to create a cloud security culture, and developing sufficient policies. The findings of this study may benefit information security managers by enhancing their information security practices to better protect their organization's information that is stored in the commercial cloud. Improved information security practices may contribute to social change by providing by proving customers a lesser amount of risk of having their identity or data stolen from internal and external thieves
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Social engineering attacks"

1

Hamilton, Nicola. Attack of the genetically engineered tomatoes: Ethical dilemma of the 90s. Stowmarket: Whittet, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lobanov, Aleksey. Medical and biological bases of safety. ru: INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1439619.

Full text
Abstract:
The textbook considers the subject and tasks of the discipline, highlights the medical and biological foundations of ensuring human security in the conditions of natural, man-made and biological-social emergencies, as well as when using modern weapons of destruction by a probable enemy. Briefly, but quite informative, the structure of the human body and the basics of its functioning are described. The specificity and mechanism of the toxic effect of harmful substances on a person, the energy effect and the combined effect of the main damaging factors of the sources of emergency situations of peacetime and wartime are shown. The article highlights the medical and biological aspects of ensuring the safe life of people in adverse environmental conditions, including in regions with hot and cold climates (the Arctic). The methods of forecasting and assessing the medical situation in emergency zones and lesions are presented. The means and methods of medical and biological protection and first aid to the affected are shown. The main tasks and organizational structure of formations and institutions of the medical rescue service of the GO, the All-Russian Service of Disaster Medicine and medical formations of the EMERCOM of Russia are considered. Organizational issues of medical and biological protection in emergency situations are highlighted. The features of the organization of medical support for those affected by terrorist attacks are considered. It is intended for students and cadets of educational institutions of higher education studying under the bachelor's degree program in the following areas of training: "Technosphere security", "Infocommunication technologies and communication systems", "Information systems and technologies", "State and municipal management", "Economics", "Mechatronics and robotics", "Operation of transport and technological machines and complexes", "Informatics and computer engineering", "Air Navigation", "System analysis and management". It can also be useful for researchers and a wide range of specialists engaged in practical work on planning and organizing medical and biological protection of the population.
APA, Harvard, Vancouver, ISO, and other styles
3

Cybersecurity Threats, Malware Trends, and Strategies: Mitigate Exploits, Malware, Phishing, and Other Social Engineering Attacks. Packt Publishing, Limited, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Social engineering attacks"

1

Raman, Karthik, Susan Baumes, Kevin Beets, and Carl Ness. "Social-Engineering and Low-Tech Attacks." In Computer Security Handbook, 19.1–19.25. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781118851678.ch19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Smith, Aaron, Maria Papadaki, and Steven M. Furnell. "Improving Awareness of Social Engineering Attacks." In Information Assurance and Security Education and Training, 249–56. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39377-8_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Saleem, Jibran, and Mohammad Hammoudeh. "Defense Methods Against Social Engineering Attacks." In Computer and Network Security Essentials, 603–18. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58424-9_35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Heartfield, Ryan, and George Loukas. "Protection Against Semantic Social Engineering Attacks." In Versatile Cybersecurity, 99–140. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-97643-3_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Irani, Danesh, Marco Balduzzi, Davide Balzarotti, Engin Kirda, and Calton Pu. "Reverse Social Engineering Attacks in Online Social Networks." In Detection of Intrusions and Malware, and Vulnerability Assessment, 55–74. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22424-9_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gonzalez, Jose J., Jose M. Sarriegi, and Alazne Gurrutxaga. "A Framework for Conceptualizing Social Engineering Attacks." In Critical Information Infrastructures Security, 79–90. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11962977_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mashtalyar, Nikol, Uwera Nina Ntaganzwa, Thales Santos, Saqib Hakak, and Suprio Ray. "Social Engineering Attacks: Recent Advances and Challenges." In HCI for Cybersecurity, Privacy and Trust, 417–31. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77392-2_27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mokoena, Tebogo, Tranos Zuva, and Martin Appiah. "Analysis of Social Engineering Attacks Using Exploit Kits." In Intelligent Algorithms in Software Engineering, 189–204. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-51965-0_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Taib, Ronnie, Kun Yu, Shlomo Berkovsky, Mark Wiggins, and Piers Bayl-Smith. "Social Engineering and Organisational Dependencies in Phishing Attacks." In Human-Computer Interaction – INTERACT 2019, 564–84. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-29381-9_35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Nguyen, Christopher, Walt Williams, Brandon Didlake, Donte Mitchell, James McGinnis, and Dipankar Dasgupta. "Social Engineering Attacks in Healthcare Systems: A Survey." In National Cyber Summit (NCS) Research Track 2021, 141–50. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-84614-5_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Social engineering attacks"

1

Nelson, Jennifer, X. Lin, C. Chen, J. Iglesias, and J. J. Li. "Social Engineering for Security Attacks." In the The 3rd Multidisciplinary International Social Networks Conference. New York, New York, USA: ACM Press, 2016. http://dx.doi.org/10.1145/2955129.2955158.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gupta, Surbhi, Abhishek Singhal, and Akanksha Kapoor. "A literature survey on social engineering attacks: Phishing attack." In 2016 International Conference on Computing, Communication and Automation (ICCCA). IEEE, 2016. http://dx.doi.org/10.1109/ccaa.2016.7813778.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lutz, Adam, Victor Sansing, Waleed E. Farag, and Soundararajan Ezekiel. "Malware and social engineering attacks on healthcare." In Disruptive Technologies in Information Sciences III, edited by Misty Blowers, Russell D. Hall, and Venkateswara R. Dasari. SPIE, 2019. http://dx.doi.org/10.1117/12.2533344.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Arabia-Obedoza, Maha Rita, Gloria Rodriguez, Amber Johnston, Fatima Salahdine, and Naima Kaabouch. "Social Engineering Attacks A Reconnaissance Synthesis Analysis." In 2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON). IEEE, 2020. http://dx.doi.org/10.1109/uemcon51285.2020.9298100.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Krombholz, Katharina, Heidelinde Hobel, Markus Huber, and Edgar Weippl. "Social engineering attacks on the knowledge worker." In the 6th International Conference. New York, New York, USA: ACM Press, 2013. http://dx.doi.org/10.1145/2523514.2523596.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Li, Tong, Kaiyuan Wang, and Jennifer Horkoff. "Towards Effective Assessment for Social Engineering Attacks." In 2019 IEEE 27th International Requirements Engineering Conference (RE). IEEE, 2019. http://dx.doi.org/10.1109/re.2019.00051.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kano, Yuki, and Tatsuo Nakajima. "Trust Factors of Social Engineering Attacks on Social Networking Services." In 2021 IEEE 3rd Global Conference on Life Sciences and Technologies (LifeTech). IEEE, 2021. http://dx.doi.org/10.1109/lifetech52111.2021.9391929.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chen, Guangxuan, Guomin Zhou, Zhoujie Mao, Qiang Liu, Ziwan Zheng, Guangxiao Chen, and Panke Qin. "Research of Social Engineering Attacks in Telecommunications Fraud." In 2015 International Conference on Social Science, Education Management and Sports Education. Paris, France: Atlantis Press, 2015. http://dx.doi.org/10.2991/ssemse-15.2015.477.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bhakta, Ram, and Ian G. Harris. "Semantic analysis of dialogs to detect social engineering attacks." In 2015 IEEE International Conference on Semantic Computing (ICSC). IEEE, 2015. http://dx.doi.org/10.1109/icosc.2015.7050843.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Janczewski, L. J., and Lingyan Fu. "Social engineering-based attacks: Model and new zealand perspective." In 2010 International Multiconference on Computer Science and Information Technology (IMCSIT 2010). IEEE, 2010. http://dx.doi.org/10.1109/imcsit.2010.5680026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography