메뉴 건너뛰기




Volumn 17, Issue 1, 2009, Pages 53-63

Social engineering: Assessing vulnerabilities in practice

Author keywords

Computer crimes; Data security; Electronic mail

Indexed keywords

DATA SECURITY; DESIGN/METHODOLOGY/APPROACH; SECURITY AWARENESS; SECURITY-AWARE; SOCIAL ENGINEERING; SOFTWARE INSTALLATIONS; SOFTWARE UPDATES; STAFF MEMBERS;

EID: 67651021787     PISSN: 09685227     EISSN: None     Source Type: Journal    
DOI: 10.1108/09685220910944768     Document Type: Article
Times cited : (24)

References (11)
  • 1
    • 33846794868 scopus 로고    scopus 로고
    • "Phishing for user security awareness"
    • Dodge, R.C., Carver, C. and Ferguson, A.J. (2007), "Phishing for user security awareness", Computers and Security, Vol. 26 No. 1, pp. 73-80.
    • (2007) Computers and Security , vol.26 , Issue.1 , pp. 73-80
    • Dodge, R.C.1    Carver, C.2    Ferguson, A.J.3
  • 2
    • 67651046637 scopus 로고    scopus 로고
    • "The weakest link"
    • Erianger, L. (2004), "The weakest link", PC Magazine, Vol. 23, pp. 58-9.
    • (2004) PC Magazine , vol.23 , pp. 58-59
    • Erianger, L.1
  • 3
    • 84897771350 scopus 로고    scopus 로고
    • "Social engineering fundamentals, part I: Hacker tactics"
    • 18 December, available at: (accessed 12 October 2008)
    • Granger, S. (2001), "Social engineering fundamentals, part I: hacker tactics", SecurityFocus, 18 December, available at: www.securityfocus.com/infocus/1527 (accessed 12 October 2008).
    • (2001) SecurityFocus
    • Granger, S.1
  • 4
    • 67651009068 scopus 로고    scopus 로고
    • "Ask and ye shall receive: A study in social engineering"
    • Greening, T. (1996), "Ask and ye shall receive: A study in social engineering", ACM SIGSAC Review, Vol. 14 No. 2, pp. 8-14.
    • (1996) ACM SIGSAC Review , vol.14 , Issue.2 , pp. 8-14
    • Greening, T.1
  • 5
    • 43249095597 scopus 로고    scopus 로고
    • "An assessment of end user vulnerability to phishing attacks"
    • Karakasiliotis, A., Furnell, S. and Papadaki, M. (2007), "An assessment of end user vulnerability to phishing attacks", Journal of Information Warfare, Vol. 6 No. 1, pp. 17-28.
    • (2007) Journal of Information Warfare , vol.6 , Issue.1 , pp. 17-28
    • Karakasiliotis, A.1    Furnell, S.2    Papadaki, M.3
  • 7
    • 34250729630 scopus 로고    scopus 로고
    • "Hacking human: Data-archaeology and surveillance in social networks"
    • Nolan, J. and Levesque, M. (2005), "Hacking human: Data-archaeology and surveillance in social networks", ACM SIGGROUP Bulletin, Vol. 25 No. 2, pp. 33-7.
    • (2005) ACM SIGGROUP Bulletin , vol.25 , Issue.2 , pp. 33-37
    • Nolan, J.1    Levesque, M.2
  • 8
    • 23944463649 scopus 로고    scopus 로고
    • "The urgency for effective user privacy-education to counter social engineering attacks on secure computer systems"
    • Salt Lake City, Utah, 28-30 October
    • Orgill, G.L., Romney, G.W., Bailey, M.G. and Orgill, P.M. (2004), "The urgency for effective user privacy-education to counter social engineering attacks on secure computer systems", Proceedings of 5th Conference on Information Technology Education, Salt Lake City, Utah, 28-30 October, pp. 171-81.
    • (2004) Proceedings of 5th Conference on Information Technology Education , pp. 171-181
    • Orgill, G.L.1    Romney, G.W.2    Bailey, M.G.3    Orgill, P.M.4
  • 9
    • 67651049427 scopus 로고    scopus 로고
    • "Social engineering: Exploiting the weakest links"
    • October, available at: (accessed 12 October)
    • Papadaki, M., Furnell, S. and Dodge, R. (2008), "Social engineering: Exploiting the weakest links", Whitepaper, European Network and Information Security Agency (ENISA), October, available at: www.enisa.europa.eu/doc/pdf/publications/enisa_whitepaper_social_ engineering.pdf (accessed 12 October).
    • (2008) Whitepaper, European Network and Information Security Agency (ENISA)
    • Papadaki, M.1    Furnell, S.2    Dodge, R.3
  • 10
    • 72849151945 scopus 로고    scopus 로고
    • "Social engineering, the USB way"
    • 7 June, available at: (accessed 12 October 2008)
    • Stasiukonis, S. (2006), "Social engineering, the USB way", Dark Reading, 7 June, available at: www.darkreading.com/ document.asp?doc_id=95556 (accessed 12 October 2008).
    • (2006) Dark Reading
    • Stasiukonis, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.