Corpus ID: 236493546

Social engineering: Concepts, Techniques and Security Countermeasures

@article{Syed2021SocialEC,
  title={Social engineering: Concepts, Techniques and Security Countermeasures},
  author={Adib Mohammed Syed},
  journal={ArXiv},
  year={2021},
  volume={abs/2107.14082}
}
The purpose of this report is to research the topic called Social Engineering in Cyber Security and present the explanation of the meaning, concepts, techniques, and security countermeasures of Social Engineering based on factual 

Figures from this paper

References

SHOWING 1-10 OF 41 REFERENCES
Social Engineering Attack Strategies and Defence Approaches
TLDR
It is shown that a multi-layered shield can mitigate various security risks and minimize the damage to systems and data. Expand
A survey of intrusion detection and prevention systems
TLDR
The problem of protecting information and data flows has existed from the very first day of information exchange, and the widespread use of wired and wireless communication networks, internet, web applications and computing has increased the gravity of the problem. Expand
Cyber Security Culture: Counteracting Cyber Threats through Organizational Learning and Training
TLDR
The authors provide in-depth understanding of how organizational learning can produce cultural change addressing the behaviour of individuals, as well as machines, in relation to bridging the education/training divide and allowing organizational learning to be embraced. Expand
Security threats to critical infrastructure: the human factor
TLDR
This paper presents a security awareness training framework, which can be used to train operators of critical infrastructure, on various social engineering security threats such as spear phishing, baiting, pretexting, among others. Expand
Cyber security
In the area of congestion management "security" is an established term that describes electric stability in the high voltage network. Actually it is so well established that it is reasonable toExpand
Proposed Approach for Targeted Attacks Detection
For years governments, organizations and companies have made great efforts to keep hackers, malware, cyber attacks at bay with different degrees of success. On the other hand, cyber criminals andExpand
Malicious SSL Certificate Detection: A Step Towards Advanced Persistent Threat Defence
TLDR
This paper presents a Malicious SSL certificate Detection (MSSLD) module, which aims at detecting the APT C&C communications based on a blacklist of malicious SSL certificates that are associated with malware and malicious activities. Expand
Advanced Persistent Threat and Spear Phishing Emails
In recent years, cyber exploitation and malicious activity are becoming increasingly sophisticated, targeted, and serious. Advanced persistent threats or APTs are a new and more sophisticated versionExpand
Botnet Command and Control Traffic Detection Challenges A Correlation based Solution
TLDR
A new approach based on voting between intrusion detection methods to collaboratively identify command and control traffic is outlined, which shows that the proposed voting-based intrusion detection significantly reduces the number of false positive alerts. Expand
Detection of advanced persistent threat using machine-learning correlation analysis
TLDR
The presented system is able to predict APT in its early steps with a prediction accuracy of 84.8% and is a significant contribution to the current body of research. Expand
...
1
2
3
4
5
...