Steinmetz, 2023 - Google Patents
Executing effective social engineering penetration tests: A qualitative analysisSteinmetz, 2023
- Document ID
- 14939520406875637578
- Author
- Steinmetz K
- Publication year
- Publication venue
- Journal of Applied Security Research
External Links
Snippet
Penetration testing is an increasingly common strategy adopted by organizations to mitigate security risks including those posed by social engineering—the deception of individuals for the purposes of circumventing information security measures. Drawing from 54 interviews …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
- G06Q10/0639—Performance analysis
- G06Q10/06398—Performance of employee with respect to a job function
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
- G06Q10/105—Human resources
- G06Q10/1053—Employment or hiring
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kabanda et al. | Exploring SME cybersecurity practices in developing countries | |
Bakhshi | Social engineering: Revisiting end-user awareness and susceptibility to classic attack vectors | |
Akhgar et al. | Cyber crime and cyber terrorism investigator's handbook | |
Sebescen et al. | Securing the human: Employee security vulnerability risk in organizational settings | |
Steinmetz | Executing effective social engineering penetration tests: A qualitative analysis | |
Arpaci et al. | Development of a scale to measure cybercrime-awareness on social media | |
Cusack et al. | The impact of personality traits on user’s susceptibility to social engineering attacks | |
Steinmetz et al. | Organizational characteristics associated with vulnerability to social engineering deception: A qualitative analysis | |
Chigada et al. | Exploring information systems security implications posed by BYOD for a financial services firm | |
Alharthi et al. | Social engineering defense mechanisms: A taxonomy and a survey of employees’ awareness level | |
Dupont et al. | Broadening our understanding of cybercrime and its evolution | |
Amrin | The impact of cyber security on SMEs | |
Subhani et al. | Importance of conducting cyber security awareness sessions among undergraduate students | |
Kirlappos | Learning from" shadow security": understanding non-compliant behaviours to improve information security management | |
Kessler | Effectiveness of the protection motivation theory on small business employee security risk behavior | |
Harris et al. | A study of targeted telephone scams involving live attackers | |
Dorasamy et al. | Cybersecurity issues among working youths in an iot environment: A design thinking process for solution | |
Mark | An analysis of factors influencing phishing threat avoidance behavior: a quantitative study | |
Ulrich et al. | One Single Click is enough–an Empirical Study on Human Threats in Family Firm Cyber Security | |
Wayne | Social Engineering: The Effects of Cybercriminals on the Human Mind | |
Tasnim et al. | Determining cybersecurity awareness and human-cyber behaviour in Bangladeshi women: Addressing factors, risks and overcoming knowledge disparities | |
Butler | An examination of issues surrounding information security in california colleges | |
Almuqrin | Examining the influence of technology acceptance, self-efficacy, and locus of control on information security behavior of social media users | |
Alotaibi | A Novel Framework for Improving Cyber Security Management and Awareness for Home Users | |
Aviv | An Examination of User Detection of Business Email Compromise Amongst Corporate Professionals |