Analysis of Recent Attacks based on Social Engineering Techniques

@article{Sokolov2019AnalysisOR,
  title={Analysis of Recent Attacks based on Social Engineering Techniques},
  author={Volodymyr Yu. Sokolov and O. Y. Korzhenko},
  journal={ArXiv},
  year={2019},
  volume={abs/1902.07965}
}
  • Volodymyr Yu. Sokolov, O. Y. Korzhenko
  • Published 2019
  • Computer Science
  • ArXiv
  • This paper attempts to strengthen the pursued research on social engineering (SE) threat identification, and control, by means of the author's illustrated classification, which includes attack types, determining the degree of possible harm to each types of possible, known attacks, countermeasures by types of threats that leads to loss of personal or corporate confidential information (user id, passwords, closed documentation). Further, this analytical study will become the starting point for… CONTINUE READING

    Figures and Topics from this paper.

    Explore Further: Topics Discussed in This Paper

    References

    Publications referenced by this paper.
    SHOWING 1-2 OF 2 REFERENCES

    What is Social Engineering? How Criminals Take Advantage of Human Behavior [Electronic resource

    • V. Hulme George
    • IDG Communications,
    • 2017
    VIEW 1 EXCERPT