메뉴 건너뛰기




Volumn , Issue , 2008, Pages 1-11

The cycle of deception - A model of social engineering attacks, defences and victims

Author keywords

Computer crime; Deception; Fraud; Security models; Social engineering

Indexed keywords

COMPUTER CRIME; SECURITY OF DATA;

EID: 84926018906     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (13)

References (16)
  • 1
    • 0043232732 scopus 로고    scopus 로고
    • Users are not the Enemy: Why users compromise computer security mechanisms and how to take remedial measures
    • Adams A. and Sasse M. (1999), Users are not the Enemy: Why users compromise computer security mechanisms and how to take remedial measures, Commun. ACM 42.
    • (1999) Commun. ACM , pp. 42
    • Adams, A.1    Sasse, M.2
  • 2
    • 0035387175 scopus 로고    scopus 로고
    • Transforming the "weakest link": A humancomputer interaction approach to usable and effective security
    • Brostoff S., Sasse A. and Weirich D. (2002), Transforming the "weakest link": A Humancomputer Interaction Approach to Usable and Effective Security, BT Technology Journal 19(3), 122-131.
    • (2002) BT Technology Journal , vol.19 , Issue.3 , pp. 122-131
    • Brostoff, S.1    Sasse, A.2    Weirich, D.3
  • 4
    • 84926042788 scopus 로고    scopus 로고
    • AP., Accessed 6 Mar. 2006
    • Dalrymple, M. (2005), Auditors Find IRS Workers Prone to Hackers. [Online]. AP. Available from: http://sfgate.com/cgi-bin/article.cgi?file=/news/archive/2005/03/16/national/w162055S07. DTL, (Accessed 6 Mar. 2006)
    • (2005) Auditors Find IRS Workers Prone to Hackers
    • Dalrymple, M.1
  • 5
    • 84925986433 scopus 로고    scopus 로고
    • Accessed 29 Jan 2007
    • De Melo, D. (2007), Sutherland's Differential Association. [Online]. Available from: http://home.comcast.net/~ddemelo/crime/differ.html, (Accessed 29 Jan 2007)
    • (2007) Sutherland's Differential Association
    • De Melo, D.1
  • 7
    • 84887839075 scopus 로고    scopus 로고
    • The signs, signifiers and semiotics of the successful semantic attack
    • St. Juliens/Valletta, Malta, 2005
    • Jordan, J. and Goudey, H. (2005), The signs, signifiers and semiotics of the successful semantic attack. Presented at the 14th Annual EICAR Conference, St. Juliens/Valletta, Malta, 2005.
    • (2005) The 14th Annual EICAR Conference
    • Jordan, J.1    Goudey, H.2
  • 9
    • 84925986431 scopus 로고    scopus 로고
    • Value based risk assessment: The key to a successful security target for the telecommunication industry
    • 2002
    • Kowalski, S. (2002), Value Based Risk Assessment: The Key to a Successful Security Target for the Telecommunication Industry, 3rd International Common Criteria Conference (ICCC) Ottawa, 2002.
    • (2002) 3rd International Common Criteria Conference (ICCC) Ottawa
    • Kowalski, S.1
  • 11
    • 9544229100 scopus 로고    scopus 로고
    • Indianapolis: Wiley Publishing, Inc.
    • Mitnick, K. (2002), The Art of deception. Indianapolis: Wiley Publishing, Inc., ISBN: 076454280X.
    • (2002) The Art of Deception
    • Mitnick, K.1
  • 14
    • 33748968091 scopus 로고    scopus 로고
    • CNN, Accessed 28 Mar. 2008
    • Tanneeru, M. (2005) A convicted hacker debunks some myths. [Online]. CNN. Available at: http://edition. cnn. com/2005/TECH/internet/10/07/kevin. mitnick.cnna/index.html (Accessed 28 Mar. 2008)
    • (2005) A Convicted Hacker Debunks Some Myths
    • Tanneeru, M.1
  • 16
    • 85084161283 scopus 로고
    • Information security technology?... Don't rely on it a case study in social engineering
    • Accessed 12 Apr. 2004
    • Winkler, I. and Dealt, B. (1995), Information Security Technology?... Don't rely on it A case Study in Social Engineering. [Online]. Proceedings of the Fifth USENIX UNIX Security Symposium. Available at: http://www.usenix.org/publications/library/proceedings/security95/full-papers/winkler.ps, (Accessed 12 Apr. 2004)
    • (1995) Proceedings of the Fifth USENIX UNIX Security Symposium
    • Winkler, I.1    Dealt, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.