메뉴 건너뛰기




Volumn , Issue , 2008, Pages 228-242

Social engineering and its countermeasures

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84856381706     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.4018/978-1-60566-132-2.ch014     Document Type: Chapter
Times cited : (7)

References (25)
  • 1
    • 9944264153 scopus 로고    scopus 로고
    • FTC Pulls Plug on Infomercial Giant
    • September 8
    • Ahrens, F. (2004, September 8). FTC Pulls Plug on Infomercial Giant. Washington Post, p. E1.
    • (2004) Washington Post
    • Ahrens, F.1
  • 3
    • 0030201356 scopus 로고    scopus 로고
    • Interpersonal deception theory
    • Buller, D. B., & Burgoon, J. K. (1996). Interpersonal Deception Theory. Communication Theory, 6(3), 203-242.
    • (1996) Communication Theory , vol.6 , Issue.3 , pp. 203-242
    • Buller, D.B.1    Burgoon, J.K.2
  • 4
    • 84898146982 scopus 로고    scopus 로고
    • Social engineering's threat to public privacy
    • Paper Presented At the The 6th Security Conference, Las Vegas, Nevada
    • Cazier, J. A., & Botelho, C. M. (2007). Social Engineering's Threat to Public Privacy. Paper presented at the the 6th Security Conference, Las Vegas, Nevada.
    • (2007)
    • Cazier, J.A.1    Botelho, C.M.2
  • 5
    • 0001229241 scopus 로고
    • Organizational information, media richness and structural design
    • Daft, R. L., & Lengel, R. H. (1986). Organizational information, media richness and structural design. Management Science, 32, 554-571.
    • (1986) Management Science , vol.32 , pp. 554-571
    • Daft, R.L.1    Lengel, R.H.2
  • 9
    • 33747798304 scopus 로고    scopus 로고
    • Information battleground
    • Herbert, A. J. (2005, December). Information Battleground. Air Force Magazine, 88.
    • (2005) Air Force Magazine , pp. 88
    • Herbert, A.J.1
  • 10
    • 0000125532 scopus 로고
    • Prospect theory: An analysis of decision under risk
    • Kahneman, D., & Tversky, A. (1979). Prospect Theory: An Analysis of Decision under Risk. Econometrica, 47(2), 263-292.
    • (1979) Econometrica , vol.47 , Issue.2 , pp. 263-292
    • Kahneman, D.1    Tversky, A.2
  • 11
    • 84898342130 scopus 로고    scopus 로고
    • Reporters' records accessed in hp probe
    • Retrieved May, 2007, from
    • Kersetter, J. (2006). Reporters' records accessed in HP probe. CNET News.com Retrieved May, 2007, from http://news.com.com/Reporters+records+accessed+in+HP+probe/2100-1014_3-6113362.html
    • (2006) CNET News.com
    • Kersetter, J.1
  • 13
    • 84864173673 scopus 로고    scopus 로고
    • How to Protect Insiders From Social Engineering Threats
    • Microsoft, Retrieved May, 2007, from
    • Microsoft. (2006>). How to Protect Insiders from Social Engineering Threats. Retrieved May, 2007, from http://www.microsoft.com/technet/security/midsizebusiness/topics/complianceandpolicies/socialengineeringthreats.mspx
    • (2006)
  • 15
    • 2342548557 scopus 로고    scopus 로고
    • The art of deception: Controlling the human element of security
    • Indiana, Wiley
    • Mitnick, K. D., & Simon, W. L. (2002). The Art of Deception: Controlling the Human Element of Security. Indianapolis, Indiana: Wiley.
    • (2002) Indianapolis
    • Mitnick, K.D.1    Simon, W.L.2
  • 17
    • 84898105081 scopus 로고    scopus 로고
    • New e-mail virus preys on Anna Kournikova fans, Retrieved May, 2007, from
    • New e-mail virus preys on Anna Kournikova fans. (2001). CNN.com. Retrieved May, 2007, from http://archives.cnn.com/2001/TECH/inter-net/02/12/anna.worm/index.html
    • (2001) CNN.com
  • 20
    • 84898230953 scopus 로고    scopus 로고
    • Hp chairman: Use of pretexting 'embarrassing'
    • Retrieved May, 2007, from
    • Shankland, S. (2006). HP chairman: Use of pretexting 'embarrassing'. CNET News.com Retrieved May, 2007, from http://news.com.com/HP+chairman+Use+of+pretexting+embarrassing/2100-1014_3-6113715.html
    • (2006) CNET News.com
    • Shankland, S.1
  • 21
    • 84898218389 scopus 로고    scopus 로고
    • Retrieved April, 2007, from
    • Silltow, J. (2001). Social Engineering, Part 1. Retrieved April, 2007, from http://www.theiia.org/ITAudit/index.cfm?act=itaudit.archivefid=339
    • (2001) Social Engineering, Part 1
    • Silltow, J.1
  • 23
    • 0016264378 scopus 로고
    • Judgment under uncertainty: Heuristics and biases
    • Tversky, A., & Kahneman, D. (1974). Judgment under Uncertainty: Heuristics and Biases. Science, 185(4157), 1124.
    • (1974) Science , vol.185 , Issue.4157 , pp. 1124
    • Tversky, A.1    Kahneman, D.2
  • 24
    • 84896264894 scopus 로고    scopus 로고
    • Augmenting detection of social engineering attacks using deception detection technology
    • Paper Presented At the International Conference On I-Warfare and Security, Princess Anne, Maryland
    • Twitchell, D. P. (2006). Augmenting Detection of Social Engineering Attacks Using Deception Detection Technology. Paper presented at the International Conference on i-Warfare and Security, Princess Anne, Maryland.
    • (2006)
    • Twitchell, D.P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.