Yahoo Poland Wyszukiwanie w Internecie

Search results

  1. This paper presents an attempted survey of the current state of Social Engineering – including the social context of the phenomenon, a brief history of notable social engineering attacks and their impact, a structured overview of social engineering attacks and common methods, a discussion of various defense tactics and, finally, discusses ...

  2. 13 sty 2024 · The paper examines various social engineering techniques employed by attackers, the impacts of successful attacks on organizations and individuals, and mitigation strategies to prevent or...

  3. 29 lip 2016 · This paper proposes a social engineering attack framework based on Kevin Mitnick's social engineering attack cycle.

  4. Social engineering attacks are an urgent security threat, with the number of detected attacks rising each year. In 2011, a global survey of 853 informa-tion technology professionals revealed that 48% of large companies have experi-enced 25 or more social engineering attacks in the past two years [1].

  5. 2 kwi 2019 · This paper provides an in-depth survey about the social engineering attacks, their classifications, detection strategies, and prevention procedures.

  6. 1 sie 2021 · This paper explores the subject of social engineering from an interdisciplinary perspective. A literature review from the information technology, psychology, and business disciplines explains the interconnected nature of the topic as well as the necessity to comprehend it from multiple viewpoints.

  7. What makes social engineering different from a typical con or fraud is that these attacks usually involve a series of highly calculated steps— methodically planned to slowly reach an end goal— using principles of human psychology to manipulate the target. Brief Example of Social Engineering.