期刊文献+

Social Engineering Threat and Defense: A Literature Survey 被引量:1

Social Engineering Threat and Defense: A Literature Survey
下载PDF
导出
摘要 This article surveys the literature on social engineering. There are lots of security application and hardware in market;still there are several methods that can be used to breach the information security defenses of an organization or individual. Social engineering attacks are interested in gaining information that may be used to carry out actions such as identity theft, stealing password or gaining information for another type of attack. The threat lies with the combinations of social engineering with another type of attacks like Phishing and Watering hole attack which make it hard to defense against. This research aims to investigate the impact of modern Social Engineering on the organization or individual. It describes the categories of Social Engineering, and how the attacker takes advantage of human behavior. At the same time, I also discuss the direct and indirect attack of social engineering and the defense mechanism against this attack. This article surveys the literature on social engineering. There are lots of security application and hardware in market;still there are several methods that can be used to breach the information security defenses of an organization or individual. Social engineering attacks are interested in gaining information that may be used to carry out actions such as identity theft, stealing password or gaining information for another type of attack. The threat lies with the combinations of social engineering with another type of attacks like Phishing and Watering hole attack which make it hard to defense against. This research aims to investigate the impact of modern Social Engineering on the organization or individual. It describes the categories of Social Engineering, and how the attacker takes advantage of human behavior. At the same time, I also discuss the direct and indirect attack of social engineering and the defense mechanism against this attack.
出处 《Journal of Information Security》 2018年第4期257-264,共8页 信息安全(英文)
关键词 Social Engineering Security PHISHING WATERING HOLE SPYWARE Social Engineering Security Phishing Watering Hole Spyware
  • 相关文献
  • 1Fresh FTP[J].网络安全和信息化,2017,0(11):166-166.
  • 2FreshFTP[J].网络安全和信息化,2018,0(12):156-156.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部