[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Birthriya et al., 2024 - Google Patents

A comprehensive survey of social engineering attacks: taxonomy of attacks, prevention, and mitigation strategies

Birthriya et al., 2024

Document ID
6260182321567698867
Author
Birthriya S
Ahlawat P
Jain A
Publication year
Publication venue
Journal of Applied Security Research

External Links

Snippet

Social engineering attacks pose a significant threat to individuals, organizations, and governments globally. These attacks leverage human psychology, manipulating individuals into divulging sensitive information or undertaking actions that jeopardize security. The …
Continue reading at www.tandfonline.com (other versions)

Similar Documents

Publication Publication Date Title
Jain et al. A survey of phishing attack techniques, defence mechanisms and open research challenges
Alkhalil et al. Phishing attacks: A recent comprehensive study and a new anatomy
Alabdan Phishing attacks survey: Types, vectors, and technical approaches
Priestman et al. Phishing in healthcare organisations: Threats, mitigation and approaches
Goel et al. Mobile phishing attacks and defence mechanisms: State of art and open research challenges
Diogenes et al. Cybersecurity-attack and defense strategies: Infrastructure security with red team and blue team tactics
Heartfield et al. A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks
Imgraben et al. Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users
Lohani Social engineering: Hacking into humans
Al-Otaibi et al. A study on social engineering attacks: Phishing attack
Kalla et al. Phishing detection implementation using databricks and artificial Intelligence
Shin et al. Focusing on the weakest link: A similarity analysis on phishing campaigns based on the att&ck matrix
Varshney et al. Anti-phishing: A comprehensive perspective
Hassan et al. Digital Privacy and Security Using Windows: A Practical Guide
Kaur et al. Cybersecurity threats in Fintech
Jaber et al. COVID-19 and global increases in cybersecurity attacks: review of possible adverse artificial intelligence attacks
Möller Threats and threat intelligence
Thakral et al. Cybersecurity and ethics for IoT system: A massive analysis
Zamir Cybersecurity and social media
Birthriya et al. A comprehensive survey of social engineering attacks: taxonomy of attacks, prevention, and mitigation strategies
Li et al. Uncovering the Cloak: A Systematic Review of Techniques Used to Conceal Phishing Websites
Kajave et al. How Cyber Criminal Use Social Engineering To Target Organizations
Calder Cyber Security: Essential principles to secure your organisation
Muhammad et al. Information protection of end users on the web: Privacy issues and measures
Gururaj et al. Social Engineering in Cybersecurity: Threats and Defenses