Skip to main content

Managing Social Engineering Risk

This thesis is the end result of the graduation project with the title ‘Managing social engineering risk’ and subtitle ‘Making social engineering transparent’. This research project focuses on social engineering in organizations and addresses the following questions; what is social engineering and who is this social engineer, what are the threats to organizations, how can these threats be identified and which countermeasures can be taken to mitigate the risk of social engineering?

The answers to these questions will lead to a social engineering risk management model to make the risks of social engineering more transparent and help organizations implement mitigating controls against social engineering.

A frequently overlooked factor in information security is the human, and more specifically the manipulation of a person to compromise information security. This thesis focuses on making the risks of this ‘social engineering’ transparent. And helping organizations manage these risks through a social engineering risk management model.

The research consists of:

* Elaborate theoretical research on social engineering and related subjects.
* Qualitative empirical research verifying the theory, generating comments on a preliminary social engineering risk management model and requirements for the final model.
* The proposal of a social engineering risk management model.
* Conclusions and recommendations.

File Type: PDF
File Size: 1.29 MB
Total Pages: 130

Direct Link Mega:
Download Now
Direct Link AnonFiles:
Download Now
Direct Link Mediafire:
Download Now
Direct Link Solidfiles:
Download Now
Direct Link Sabercathost:
Download Now
Direct Link Tusfiles:
Download Now


Popular posts from this blog

Web Hacking 101

With a Foreword written by HackerOne Co-Founders Michiel Prins and Jobert Abma, Web Hacking 101 is about the ethical exploration of software for security issues but learning to hack isn't always easy. With few exceptions, existing books are overly technical, only dedicate a single chapter to website vulnerabilities or don't include any real world examples. This book is different. Using publicly disclosed vulnerabilities, Web Hacking 101 explains common web vulnerabilities and will show you how to start finding vulnerabilities and collecting bounties.

Android Things Quick Start Guide

Android Things is the new Android based Operating System for the Internet of Things. With this book you will learn the core concepts by running code examples on different peripherals. Android Things is the IoT platform made by Google, based on Android. It allows us to build smart devices in a simple and convenient way, leveraging on the Android ecosystem tools and libraries, while letting Google take care of security updates.

Programming QuickStart Box Set

This tutorial on HTML is designed specifically for aspiring developers and web designers. This tutorial is explained in enough detail with practical examples and a simple overview so that it can be easily understood by beginners and provides enough knowledge to design their own webpages. You can get a higher level of expertise with some practice.  HTML or Hyper Text Markup Language is the most commonly used language for developing web pages.