[go: up one dir, main page]

Steinmetz, 2023 - Google Patents

Executing effective social engineering penetration tests: A qualitative analysis

Steinmetz, 2023

Document ID
14939520406875637578
Author
Steinmetz K
Publication year
Publication venue
Journal of Applied Security Research

External Links

Snippet

Penetration testing is an increasingly common strategy adopted by organizations to mitigate security risks including those posed by social engineering—the deception of individuals for the purposes of circumventing information security measures. Drawing from 54 interviews …
Continue reading at www.tandfonline.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
    • G06Q10/063Operations research or analysis
    • G06Q10/0639Performance analysis
    • G06Q10/06398Performance of employee with respect to a job function
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • G06Q10/105Human resources
    • G06Q10/1053Employment or hiring

Similar Documents

Publication Publication Date Title
Kabanda et al. Exploring SME cybersecurity practices in developing countries
Bakhshi Social engineering: Revisiting end-user awareness and susceptibility to classic attack vectors
Akhgar et al. Cyber crime and cyber terrorism investigator's handbook
Sebescen et al. Securing the human: Employee security vulnerability risk in organizational settings
Steinmetz Executing effective social engineering penetration tests: A qualitative analysis
Arpaci et al. Development of a scale to measure cybercrime-awareness on social media
Cusack et al. The impact of personality traits on user’s susceptibility to social engineering attacks
Steinmetz et al. Organizational characteristics associated with vulnerability to social engineering deception: A qualitative analysis
Chigada et al. Exploring information systems security implications posed by BYOD for a financial services firm
Alharthi et al. Social engineering defense mechanisms: A taxonomy and a survey of employees’ awareness level
Dupont et al. Broadening our understanding of cybercrime and its evolution
Amrin The impact of cyber security on SMEs
Subhani et al. Importance of conducting cyber security awareness sessions among undergraduate students
Kirlappos Learning from" shadow security": understanding non-compliant behaviours to improve information security management
Kessler Effectiveness of the protection motivation theory on small business employee security risk behavior
Harris et al. A study of targeted telephone scams involving live attackers
Dorasamy et al. Cybersecurity issues among working youths in an iot environment: A design thinking process for solution
Mark An analysis of factors influencing phishing threat avoidance behavior: a quantitative study
Ulrich et al. One Single Click is enough–an Empirical Study on Human Threats in Family Firm Cyber Security
Wayne Social Engineering: The Effects of Cybercriminals on the Human Mind
Tasnim et al. Determining cybersecurity awareness and human-cyber behaviour in Bangladeshi women: Addressing factors, risks and overcoming knowledge disparities
Butler An examination of issues surrounding information security in california colleges
Almuqrin Examining the influence of technology acceptance, self-efficacy, and locus of control on information security behavior of social media users
Alotaibi A Novel Framework for Improving Cyber Security Management and Awareness for Home Users
Aviv An Examination of User Detection of Business Email Compromise Amongst Corporate Professionals