메뉴 건너뛰기




Volumn , Issue , 2013, Pages 28-35

Social engineering attacks on the knowledge worker

Author keywords

Attack scenarios; Bring your own device; Knowledge worker; Privacy; Security; Social engineering

Indexed keywords

ATTACK SCENARIOS; BRING YOUR OWN DEVICES; KNOWLEDGE WORKERS; SECURITY; SOCIAL ENGINEERING;

EID: 84893276970     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2523514.2523596     Document Type: Conference Paper
Times cited : (35)

References (41)
  • 1
    • 80955154992 scopus 로고    scopus 로고
    • last accessed on 2013-07-17
    • Anatomy of an attack. available online: http://httpblogs.rsa.com/anatomy- of-an-attack/, last accessed on 2013-07-17.
    • Anatomy of an Attack
  • 2
    • 84893233651 scopus 로고    scopus 로고
    • last accessed on 2013-07-17
    • Google hack attack was ultra sophisticated. available online: http://www.wired.com/threatlevel/2010/01/operationaurora/, last accessed on 2013-07-17.
    • Google Hack Attack Was Ultra Sophisticated
  • 5
    • 84893340465 scopus 로고    scopus 로고
    • last accessed on 2013-07-18
    • Whatsapp. available online: http://www.whatsapp.com/, last accessed on 2013-07-18.
  • 7
    • 78649246134 scopus 로고    scopus 로고
    • Privacy aspects of mashup architecture
    • 2010 IEEE Second International Conference on
    • G. Bader, A. Anjomshoaa, and A. Tjoa. Privacy aspects of mashup architecture. In Social Computing (SocialCom), 2010 IEEE Second International Conference on, pages 1141-1146, 2010.
    • (2010) Social Computing (SocialCom) , pp. 1141-1146
    • Bader, G.1    Anjomshoaa, A.2    Tjoa, A.3
  • 17
    • 77957955892 scopus 로고    scopus 로고
    • Attack surfaces: A taxonomy for attacks on cloud services
    • N. Gruschka and M. Jensen. Attack surfaces: A taxonomy for attacks on cloud services. In IEEE CLOUD, pages 276-279, 2010.
    • (2010) IEEE CLOUD , pp. 276-279
    • Gruschka, N.1    Jensen, M.2
  • 18
    • 84856038557 scopus 로고    scopus 로고
    • Phishing as a tragedy of the commons
    • Lake Tahoe, CA
    • C. Herley and D. Florencio. Phishing as a Tragedy of the Commons. NSPW 2008, Lake Tahoe, CA, 2008.
    • (2008) NSPW 2008
    • Herley, C.1    Florencio, D.2
  • 19
    • 70849122971 scopus 로고    scopus 로고
    • Towards automating social engineering using social networking sites
    • International Conference on IEEE
    • M. Huber, S. Kowalski, M. Nohlberg, and S. Tjoa. Towards automating social engineering using social networking sites. In Computational Science and Engineering, 2009. CSE'09. International Conference on, Volume 3, pages 117-124. IEEE, 2009.
    • (2009) Computational Science and Engineering, 2009. CSE'09 , vol.3 , pp. 117-124
    • Huber, M.1    Kowalski, S.2    Nohlberg, M.3    Tjoa, S.4
  • 25
    • 84893246018 scopus 로고    scopus 로고
    • Fake identities in social media: A case study on the sustainability of the facebook business model
    • K. Krombholz, D. Merkl, and E. Weippl. Fake identities in social media: A case study on the sustainability of the facebook business model. JoSSR, 4(2): 175-212, 2012.
    • (2012) JoSSR , vol.4 , Issue.2 , pp. 175-212
    • Krombholz, K.1    Merkl, D.2    Weippl, E.3
  • 26
    • 35048876774 scopus 로고    scopus 로고
    • Self-efficacy, training effectiveness, and deception detection: A longitudinal study of lie detection training
    • K. Marett, D. Biros, and M. Knode. Self-efficacy, Training Effectiveness, and Deception Detection: A Longitudinal Study of Lie Detection Training. lecture notes in computer science, 3073: 187-200, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3073 , pp. 187-200
    • Marett, K.1    Biros, D.2    Knode, M.3
  • 27
    • 84867375385 scopus 로고    scopus 로고
    • Byod: Security and privacy considerations
    • K. Miller, J. Voas, and G. Hurlburt. Byod: Security and privacy considerations. IT Professional, 14(5): 53-55, 2012.
    • (2012) IT Professional , vol.14 , Issue.5 , pp. 53-55
    • Miller, K.1    Voas, J.2    Hurlburt, G.3
  • 30
    • 84893294050 scopus 로고    scopus 로고
    • last accessed on 2013-07-04
    • R. Nelson. Methods of Hacking: Social Engineering. online, 2008. Available at: http://www.isr.umd.edu/gemstone/infosec/ver2/papers/socialeng. html, last accessed on 2013-07-04.
    • (2008) Methods of Hacking: Social Engineering
    • Nelson, R.1
  • 32
    • 84893290133 scopus 로고    scopus 로고
    • Jan. last accessed on: 2013-07-01
    • N. Perlroth. Chinese hackers infiltrate new york times computers, Jan. 2013. available at https://www.nytimes.com/2013/01/31/technology/chinese- hackers-infiltrate-new-york-times-computers.html, last accessed on: 2013-07-01.
    • (2013) Chinese Hackers Infiltrate New York Times Computers
    • Perlroth, N.1
  • 34
    • 34748869064 scopus 로고    scopus 로고
    • An investigation of heuristics of human judgment in detecting deception and potential implications in countering social engineering
    • 2007 IEEE
    • T. Qin and J. Burgoon. An Investigation of Heuristics of Human Judgment in Detecting Deception and Potential Implications in Countering Social Engineering. Intelligence and Security Informatics, 2007 IEEE, pages 152-159, 2007.
    • (2007) Intelligence and Security Informatics , pp. 152-159
    • Qin, T.1    Burgoon, J.2
  • 37
    • 84893265725 scopus 로고    scopus 로고
    • last accessed on 2013-07-04
    • SocialEngineer. What is phishing - paypal phishing examples. available online: http://www.socialengineer.org/wiki/archives/Phishing/PhishingPayPal. html, last accessed on 2013-07-04.
    • What Is Phishing - Paypal Phishing Examples
  • 39
    • 72849151945 scopus 로고    scopus 로고
    • last accessed on: 2013-07-02
    • S. Stasiukonis. Social Engineering, the USB Way. 2006. available at http://www.darkreading.com/security/perimeter/showArticle.jhtml?articleID= 208803634, last accessed on: 2013-07-02.
    • (2006) Social Engineering, the USB Way
    • Stasiukonis, S.1
  • 40
    • 77951996290 scopus 로고    scopus 로고
    • The psychology of password management: A tradeoff between security and convenience
    • May
    • L. Tam, M. Glassman, and M. Vandenwauver. The psychology of password management: a tradeoff between security and convenience. Behav. Inf. Technol., 29(3): 233-244, May 2010.
    • (2010) Behav. Inf. Technol. , vol.29 , Issue.3 , pp. 233-244
    • Tam, L.1    Glassman, M.2    Vandenwauver, M.3
  • 41
    • 84873390405 scopus 로고    scopus 로고
    • The human element of information security
    • H. Thompson. The human element of information security. Security Privacy, IEEE, 11(1): 32-35, 2013.
    • (2013) Security Privacy, IEEE , vol.11 , Issue.1 , pp. 32-35
    • Thompson, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.