Non-Technical Cyber-Attacks and International Cybersecurity: The Case of Social Engineering
Abstract
Keywords
Supporting Institution
Project Number
References
- Akyeşilmen, N. (2018). Siber politika ve siber güvenlik, Ankara: Orion Kitapevi.
- Aldawood, H. And Skinner, D. (2019). Contemporary cyber security social engineering solutions, measures, policies, tools and applications: A critical appraisal, International Journal of Security (IJS), 10(1), 1-15. https://f.hubspotusercontent30.net/hubfs/8156085/WhitePaper%20-%20IJS%20-%20Contemporary%20Cyber%20Security%20Social%20Engineering%20Solutions%5B1%5D.pdf Access date: October 30, 2022.
- Allen, J. (2022). Social engineering penetration testing: Attacks, methods, & steps. https://purplesec.us/social-engineering-penetration-testing/ Access date: November 13, 2022.
- Baezner, M and Robin, P. (2017). Hotspot analysis: Stuxnet, Zürich:Center for Security Studies (CSS). https://css.ethz.ch/content/dam/ethz/special-interest/gess/cis/center-for-securities-studies/pdfs/Cyber-Reports-2017-04.pdf Access date: November 10, 2022.
- Breda, F., Barbosa, H. and Morais, T. (2017). Social engineering and cybersecurity, conference: International technology, education and development conference. https://www.researchgate.net/publication/315351300_SOCIAL_ENGINEERING_AND_CYBER_SECURITY Access date: October 30, 2022.
- Brown, R. (2012). South Carolina offers details of data theft and warns it could happen elsewhere. https://www.nytimes.com/2012/11/21/us/more-details-of-south-carolina-hacking-episode.html Access date: November 10, 2022.
- CERT-UK. (2015). An introduction to social engineering, Cert-UK publicaiton, https://info.publicintelligence.net/UK-CERT-SocialEngineering.pdf Access date: October 29, 2022.
- Chinta, M., Alaparthi, J. And Kodali, E. (2016). A study on social engineering attacks and defense mechanisms. International Journal of Computer Science and Information Security (IJCSIS), 14 Special issues,225-231. https://archive.org/stream/IJCSISVol14SpecialIssueICETCSE2016Final/IJCSIS%20Vol%2014%20Special%20Issue%20ICETCSE%202016%20Final_djvu.txt Access date: October 30, 2022.
Details
Primary Language
English
Subjects
International Security
Journal Section
Research Article
Authors
Amal Alhosban
0009-0006-9267-613X
United States
Publication Date
January 25, 2024
Submission Date
August 19, 2023
Acceptance Date
October 10, 2023
Published in Issue
Year 2024 Volume: 23 Number: 1
Cited By
Across the Spectrum In-Depth Review AI-Based Models for Phishing Detection
IEEE Open Journal of the Communications Society
https://doi.org/10.1109/OJCOMS.2024.3462503Ethical simulation of a phishing attack
Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska
https://doi.org/10.35784/iapgos.7498