-
1
-
-
33846794868
-
"Phishing for user security awareness"
-
Dodge, R.C., Carver, C. and Ferguson, A.J. (2007), "Phishing for user security awareness", Computers and Security, Vol. 26 No. 1, pp. 73-80.
-
(2007)
Computers and Security
, vol.26
, Issue.1
, pp. 73-80
-
-
Dodge, R.C.1
Carver, C.2
Ferguson, A.J.3
-
2
-
-
67651046637
-
"The weakest link"
-
Erianger, L. (2004), "The weakest link", PC Magazine, Vol. 23, pp. 58-9.
-
(2004)
PC Magazine
, vol.23
, pp. 58-59
-
-
Erianger, L.1
-
3
-
-
84897771350
-
"Social engineering fundamentals, part I: Hacker tactics"
-
18 December, available at: (accessed 12 October 2008)
-
Granger, S. (2001), "Social engineering fundamentals, part I: hacker tactics", SecurityFocus, 18 December, available at: www.securityfocus.com/infocus/1527 (accessed 12 October 2008).
-
(2001)
SecurityFocus
-
-
Granger, S.1
-
4
-
-
67651009068
-
"Ask and ye shall receive: A study in social engineering"
-
Greening, T. (1996), "Ask and ye shall receive: A study in social engineering", ACM SIGSAC Review, Vol. 14 No. 2, pp. 8-14.
-
(1996)
ACM SIGSAC Review
, vol.14
, Issue.2
, pp. 8-14
-
-
Greening, T.1
-
5
-
-
43249095597
-
"An assessment of end user vulnerability to phishing attacks"
-
Karakasiliotis, A., Furnell, S. and Papadaki, M. (2007), "An assessment of end user vulnerability to phishing attacks", Journal of Information Warfare, Vol. 6 No. 1, pp. 17-28.
-
(2007)
Journal of Information Warfare
, vol.6
, Issue.1
, pp. 17-28
-
-
Karakasiliotis, A.1
Furnell, S.2
Papadaki, M.3
-
6
-
-
2342548557
-
-
Wiley, Indianapolis, IN
-
Mitnick, K. and Simon, W. (2002), The Art of Deception: Controlling the Human Element of Security, Wiley, Indianapolis, IN.
-
(2002)
The Art of Deception: Controlling the Human Element of Security
-
-
Mitnick, K.1
Simon, W.2
-
7
-
-
34250729630
-
"Hacking human: Data-archaeology and surveillance in social networks"
-
Nolan, J. and Levesque, M. (2005), "Hacking human: Data-archaeology and surveillance in social networks", ACM SIGGROUP Bulletin, Vol. 25 No. 2, pp. 33-7.
-
(2005)
ACM SIGGROUP Bulletin
, vol.25
, Issue.2
, pp. 33-37
-
-
Nolan, J.1
Levesque, M.2
-
8
-
-
23944463649
-
"The urgency for effective user privacy-education to counter social engineering attacks on secure computer systems"
-
Salt Lake City, Utah, 28-30 October
-
Orgill, G.L., Romney, G.W., Bailey, M.G. and Orgill, P.M. (2004), "The urgency for effective user privacy-education to counter social engineering attacks on secure computer systems", Proceedings of 5th Conference on Information Technology Education, Salt Lake City, Utah, 28-30 October, pp. 171-81.
-
(2004)
Proceedings of 5th Conference on Information Technology Education
, pp. 171-181
-
-
Orgill, G.L.1
Romney, G.W.2
Bailey, M.G.3
Orgill, P.M.4
-
9
-
-
67651049427
-
"Social engineering: Exploiting the weakest links"
-
October, available at: (accessed 12 October)
-
Papadaki, M., Furnell, S. and Dodge, R. (2008), "Social engineering: Exploiting the weakest links", Whitepaper, European Network and Information Security Agency (ENISA), October, available at: www.enisa.europa.eu/doc/pdf/publications/enisa_whitepaper_social_ engineering.pdf (accessed 12 October).
-
(2008)
Whitepaper, European Network and Information Security Agency (ENISA)
-
-
Papadaki, M.1
Furnell, S.2
Dodge, R.3
-
10
-
-
72849151945
-
"Social engineering, the USB way"
-
7 June, available at: (accessed 12 October 2008)
-
Stasiukonis, S. (2006), "Social engineering, the USB way", Dark Reading, 7 June, available at: www.darkreading.com/ document.asp?doc_id=95556 (accessed 12 October 2008).
-
(2006)
Dark Reading
-
-
Stasiukonis, S.1
-
11
-
-
84926390184
-
"Social engineering: The dark art"
-
Kennesaw State University, Kennesaw, GA, 17-18 September
-
Thornburgh, T. (2004), "Social engineering: The dark art", Proceedings of the 1st Annual Conference on Information Security Curriculum Development, Kennesaw State University, Kennesaw, GA, 17-18 September.
-
(2004)
Proceedings of the 1st Annual Conference on Information Security Curriculum Development
-
-
Thornburgh, T.1
|