메뉴 건너뛰기




Volumn 22, Issue , 2015, Pages 113-122

Advanced social engineering attacks

Author keywords

Attack scenarios; Bring your own device; Knowledge worker; Privacy; Security; Social engineering

Indexed keywords

DATA PRIVACY; KNOWLEDGE MANAGEMENT; SOCIAL NETWORKING (ONLINE); VIRTUAL REALITY;

EID: 84951909906     PISSN: 22142134     EISSN: 22142126     Source Type: Journal    
DOI: 10.1016/j.jisa.2014.09.005     Document Type: Article
Times cited : (409)

References (56)
  • 2
    • 84951909884 scopus 로고    scopus 로고
    • Anatomy of an attack. Available online: [last accessed 17.07.13]
    • Anatomy of an attack. Available online: http://blogs.rsa.com/anatomy-of-an-attack/ [last accessed 17.07.13].
  • 13
    • 84951910028 scopus 로고    scopus 로고
    • Protect against social engineering attacks
    • [Retrieved 2008-11-13]
    • Gartner Inc Protect against social engineering attacks Gart Secur Webletter 1 1 Feb. 2002 [Retrieved 2008-11-13]
    • (2002) Gart Secur Webletter , vol.1 , Issue.1
    • Inc, G.1
  • 14
    • 84951909719 scopus 로고    scopus 로고
    • Google hack attack was ultra sophisticated. Available online: [last accessed 17.07.13]
    • Google hack attack was ultra sophisticated. Available online: http://www.wired.com/threatlevel/2010/01/operation-aurora/ [last accessed 17.07.13].
  • 15
    • 34748849150 scopus 로고    scopus 로고
    • A multi-level defense against social engineering
    • D. Gragg A multi-level defense against social engineering SANS Reading Room March, 13, 2003
    • (2003) SANS Reading Room
    • Gragg, D.1
  • 16
    • 84897771350 scopus 로고    scopus 로고
    • Social engineering fundamentals, Part I: Hacker tactics
    • S. Granger Social engineering fundamentals, Part I: hacker tactics SecurityFocus 2001
    • (2001) SecurityFocus
    • Granger, S.1
  • 17
    • 77957955892 scopus 로고    scopus 로고
    • Attack surfaces: A taxonomy for attacks on cloud services
    • N. Gruschka, and M. Jensen Attack surfaces: a taxonomy for attacks on cloud services IEEE CLOUD 2010 276 279
    • (2010) IEEE CLOUD , pp. 276-279
    • Gruschka, N.1    Jensen, M.2
  • 18
    • 84856038557 scopus 로고    scopus 로고
    • Phishing as a tragedy of the commons
    • Lake Tahoe, CA
    • C. Herley, and D. Florencio Phishing as a tragedy of the commons NSPW 2008 2008 Lake Tahoe, CA
    • (2008) NSPW 2008
    • Herley, C.1    Florencio, D.2
  • 19
    • 70849122971 scopus 로고    scopus 로고
    • Towards automating social engineering using social networking sites
    • CSE'09. International Conference on IEEE
    • M. Huber, S. Kowalski, M. Nohlberg, and S. Tjoa Towards automating social engineering using social networking sites Computational Science and Engineering, 2009 CSE'09. International Conference on vol. 3 2009 IEEE 117 124
    • (2009) Computational Science and Engineering, 2009 , vol.3 , pp. 117-124
    • Huber, M.1    Kowalski, S.2    Nohlberg, M.3    Tjoa, S.4
  • 21
    • 79955551180 scopus 로고    scopus 로고
    • Friend-in-the-middle attacks: Exploiting social networking sites for spam
    • M. Huber, M. Mulazzani, E. Weippl, G. Kitzler, and S. Goluch Friend-in-the-middle attacks: exploiting social networking sites for spam IEEE Internet Comput 15 3 2011 28 34
    • (2011) IEEE Internet Comput , vol.15 , Issue.3 , pp. 28-34
    • Huber, M.1    Mulazzani, M.2    Weippl, E.3    Kitzler, G.4    Goluch, S.5
  • 27
    • 84951910074 scopus 로고    scopus 로고
    • Online Available at: [last accessed 21.01.14]
    • R. King Twitter: more than 250K user accounts have been compromised Online 2013 Available at: http://www.zdnet.com/twitter-more-than-250k-user-accounts-have-been-compromised-7000010711/ [last accessed 21.01.14]
    • (2013) Twitter: More Than 250K User Accounts Have Been Compromised
    • King, R.1
  • 29
    • 84893246018 scopus 로고    scopus 로고
    • Fake identities in social media: A case study on the sustainability of the Facebook business model
    • K. Krombholz, D. Merkl, and E. Weippl Fake identities in social media: a case study on the sustainability of the Facebook business model J Sci Study Relig 4 2 2012 175 212
    • (2012) J Sci Study Relig , vol.4 , Issue.2 , pp. 175-212
    • Krombholz, K.1    Merkl, D.2    Weippl, E.3
  • 30
    • 35048876774 scopus 로고    scopus 로고
    • Self-efficacy, training effectiveness, and deception detection: A longitudinal study of lie detection training
    • K. Marett, D. Biros, and M. Knode Self-efficacy, training effectiveness, and deception detection: a longitudinal study of lie detection training Lect Notes Comput Sci 3073 2004 187 200
    • (2004) Lect Notes Comput Sci , vol.3073 , pp. 187-200
    • Marett, K.1    Biros, D.2    Knode, M.3
  • 31
    • 84951909841 scopus 로고    scopus 로고
    • Microsoft hacked: joins Apple, Facebook, Twitter - InformationWeek. online: [last accessed 10.07.13]
    • Microsoft hacked: joins Apple, Facebook, Twitter - InformationWeek. Available online: http://www.informationweek.com/security/\Attackacks/microsoft-hacked-joins-apple-facebook-tw/240149323 [last accessed 10.07.13].
  • 32
    • 84867375385 scopus 로고    scopus 로고
    • Byod: Security and privacy considerations
    • K. Miller, J. Voas, and G. Hurlburt Byod: security and privacy considerations IT Prof 14 5 2012 53 55
    • (2012) IT Prof , vol.14 , Issue.5 , pp. 53-55
    • Miller, K.1    Voas, J.2    Hurlburt, G.3
  • 36
    • 84893294050 scopus 로고    scopus 로고
    • Online Available at: [last accessed 04.07.13]
    • R. Nelson Methods of hacking: social engineering Online 2008 Available at: http://www.isr.umd.edu/gemstone/infosec/ver2/papers/socialeng.html [last accessed 04.07.13]
    • (2008) Methods of Hacking: Social Engineering
    • Nelson, R.1
  • 37
    • 84893295799 scopus 로고    scopus 로고
    • Phishing for the truth: A scenario-based experiment of users' behavioural response to emails
    • L. Janczewski, H. Wolfe, S. Shenoi, IFIP Advances in Information and Communication Technology Springer Berlin Heidelberg
    • K. Parsons, A. McCormac, M. Pattinson, M. Butavicius, and C. Jerram Phishing for the truth: a scenario-based experiment of users' behavioural response to emails L. Janczewski, H. Wolfe, S. Shenoi, Security and privacy protection in information processing systems IFIP Advances in Information and Communication Technology vol. 405 2013 Springer Berlin Heidelberg 366 378
    • (2013) Security and Privacy Protection in Information Processing Systems , vol.405 , pp. 366-378
    • Parsons, K.1    McCormac, A.2    Pattinson, M.3    Butavicius, M.4    Jerram, C.5
  • 38
    • 84893290133 scopus 로고    scopus 로고
    • [last accessed 01.07.13]
    • N. Perlroth Chinese hackers infiltrate New York Times computers Jan. 2013 Available at: https://www.nytimes.com/2013/01/31/technology/chinese-hackers-infiltrate-new-york-times-computers.html [last accessed 01.07.13]
    • (2013) Chinese Hackers Infiltrate New York Times Computers
    • Perlroth, N.1
  • 40
    • 34748869064 scopus 로고    scopus 로고
    • An investigation of heuristics of human judgment in detecting deception and potential implications in countering social engineering
    • IEEE
    • T. Qin, and J. Burgoon An investigation of heuristics of human judgment in detecting deception and potential implications in countering social engineering Intell Secur Inform 2007 152 159 IEEE
    • (2007) Intell Secur Inform , pp. 152-159
    • Qin, T.1    Burgoon, J.2
  • 43
    • 84951910091 scopus 로고    scopus 로고
    • SocialEngineer. What is phishing - paypal phishing examples. online: [last accessed 04.07.13]
    • SocialEngineer. What is phishing - paypal phishing examples. Available online: http://www.social-engineer.org/wiki/archives/Phishing/Phishing-PayPal.html [last accessed 04.07.13].
  • 44
    • 84951909853 scopus 로고    scopus 로고
    • online: [last accessed 13.07.13]
    • Sophos Sophos Facebook id probe shows 41% of users happy to reveal all to potential identity thieves 2007 Available online: http://www.sophos.com/en-us/press-office/press-releases/2007/08/facebook.aspx [last accessed 13.07.13]
    • (2007) Network and Distributed System Security Symposium (NDSS 2012)
    • Sophos1
  • 45
    • 41949111662 scopus 로고    scopus 로고
    • Using cartoons to teach internet security
    • S. Srikwan Using cartoons to teach internet security Cryptologia 32 2 2008 137 154
    • (2008) Cryptologia , vol.32 , Issue.2 , pp. 137-154
    • Srikwan, S.1
  • 46
    • 72849151945 scopus 로고    scopus 로고
    • [last accessed 02.07.13]
    • S. Stasiukonis Social engineering, the USB way 2006 Available at: http://www.darkreading.com/security/perimeter/show Article.jhtml?articleID=208803634 [last accessed 02.07.13]
    • (2006) Social Engineering, the USB Way
    • Stasiukonis, S.1
  • 48
    • 77951996290 scopus 로고    scopus 로고
    • The psychology of password management: A tradeoff between security and convenience
    • L. Tam, M. Glassman, and M. Vandenwauver The psychology of password management: a tradeoff between security and convenience Behav Inf Technol 29 3 May 2010 233 244
    • (2010) Behav Inf Technol , vol.29 , Issue.3 , pp. 233-244
    • Tam, L.1    Glassman, M.2    Vandenwauver, M.3
  • 49
    • 84951910120 scopus 로고    scopus 로고
    • The robin sage experiment: fake profile fools security pros. at: [last accessed 14.07.13]
    • The robin sage experiment: fake profile fools security pros. Available at: http://www.networkworld.com/news/2010/070810-the-robin-sage-experiment-fake.html?t51hb [last accessed 14.07.13].
  • 50
    • 84951909971 scopus 로고    scopus 로고
    • Available at: [last accessed 01.12.13]
    • The Wall Street Journal Security tokens take hit 2011 Available at: http://online.wsj.com/news/articles/SB10001424052702304906004576369990616694366 [last accessed 01.12.13]
    • (2011) Security Tokens Take Hit
    • Wall Street Journal, T.1
  • 51
    • 84873390405 scopus 로고    scopus 로고
    • The human element of information security
    • IEEE
    • H. Thompson The human element of information security Sec Priv 11 1 2013 32 35 IEEE
    • (2013) Sec Priv , vol.11 , Issue.1 , pp. 32-35
    • Thompson, H.1
  • 52
    • 84951909848 scopus 로고    scopus 로고
    • online at: [last accessed 03.12.13]
    • TrustedSec Social-engineer toolkit 2013 Available online at: https://www.trustedsec.com/downloads/social-engineer-toolkit/ [last accessed 03.12.13]
    • (2013) Social-engineer Toolkit
    • Trustedsec1
  • 53
    • 84951909680 scopus 로고    scopus 로고
    • Whatsapp. online: [last accessed 18.07.13]
    • Whatsapp. Available online: http://www.whatsapp.com/ [last accessed 18.07.13].
  • 54
    • 84951909819 scopus 로고    scopus 로고
    • Online Available at: [last accessed 21.01.14]
    • Z. Whittaker Apple hacked by same group that attacked Facebook Online 2013 Available at: http://www.zdnet.com/apple-hacked-by-same-group-that-attacked-facebook-7000011509/ [last accessed 21.01.14]
    • (2013) Apple Hacked by Same Group That Attacked Facebook
    • Whittaker, Z.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.