Skip to main content

Social Engineering Attack Methods

Despite heavy investment in security infrastructure cyber crime is still growing both in  quantity and quality. With the enormous growth in adoption of Internet enabled applications  and devices the focus for cyber criminals is increasingly shifting from exploiting software  vulnerabilities to exploiting vulnerabilities in human behavior through the use of social  engineering methodologies. However, there only has been intermittent and as a result in  exhaustive academic scrutiny on it till date.

The objective of this research, therefore, is to reinvigorate the extant research on cyber crimes built using social engineering principles by giving new directions and in-depth perspectives.

This research focuses on new and emerging attack types, level of awareness regarding these attack types and the impact these new attack types potentially have on users’ ability to detect

The new and emerging attack types are presented across two separate research studies that result in a taxonomy of social engineering attacks.

In order to understand the level of  awareness and preparedness to tackle these new forms of attacks, a qualitative study of  security policies for online banking industry is carried out.

Finally, the impact of these new types of social engineering attacks is tested through an experimental study where subjects are exposed to a simulated version of some of these attacks in order to test their deception  detection abilities.

Together, the conceptual and the empirical studies contribute to research by: (1) providing a
systematic way to categorize social engineering attack types (2) suggesting a framework for
organizations to audit the adequacy of their security policies and (3) a revealing a new
direction and method for analyzing the impact of these attack types on users’ ability to detect

File Type: PDF
File Size: 4.19 MB
Total Pages: 194

Direct Link Mega:
Download Now
Direct Link AnonFiles:
Download Now
Direct Link Mediafire:
Download Now
Direct Link Solidfiles:
Download Now
Direct Link Sabercathost:
Download Now
Direct Link Tusfiles:
Download Now


Popular posts from this blog

Web Hacking 101

With a Foreword written by HackerOne Co-Founders Michiel Prins and Jobert Abma, Web Hacking 101 is about the ethical exploration of software for security issues but learning to hack isn't always easy. With few exceptions, existing books are overly technical, only dedicate a single chapter to website vulnerabilities or don't include any real world examples. This book is different. Using publicly disclosed vulnerabilities, Web Hacking 101 explains common web vulnerabilities and will show you how to start finding vulnerabilities and collecting bounties.

Hack-X-Crypt (By Ujjwal Sahay)

This is basically a straight forward guide towards ethical hacking and cyber security.Computer hacking is the practice of altering computer hardware and software to carry out a goal outside of the creator‘s original intention. People who slot in computer hacking actions and activities are often entitled as hackers. The majority of people assume that hackers are computer criminals. They fall short to identify the fact that criminals and hackers are two entirely unrelated things.

High Performance Cloud Auditing

This eBook mainly focuses on cloud security and high performance computing for cloud auditing. The eBook discusses emerging challenges and techniques developed for high performance semantic cloud auditing, and presents the state of the art in cloud auditing, computing and security techniques with focus on technical aspects and feasibility of auditing issues in federated cloud computing environments.