Please use this identifier to cite or link to this item:
https://rda.sliit.lk/handle/123456789/2603
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kaushalya, T | - |
dc.contributor.author | Randeniya, R. M. R. S. B | - |
dc.contributor.author | Liyanage, S | - |
dc.date.accessioned | 2022-06-10T07:46:56Z | - |
dc.date.available | 2022-06-10T07:46:56Z | - |
dc.date.issued | 2019-01-31 | - |
dc.identifier.citation | S. A. D. T. P. Kaushalya, R. M. R. S. B. Randeniya and A. D. S. Liyanage, "An Overview of Social Engineering in the Context of Information Security," 2018 IEEE 5th International Conference on Engineering Technologies and Applied Sciences (ICETAS), 2018, pp. 1-6, doi: 10.1109/ICETAS.2018.8629126. | en_US |
dc.identifier.isbn | 978-1-5386-7966-1 | - |
dc.identifier.uri | http://rda.sliit.lk/handle/123456789/2603 | - |
dc.description.abstract | Social engineering in the context of information security is the exploitation of human psychology to gain access into secure data. Human emotion can act as both a strength and a weakness. When it comes to the world booming with technology, human emotions which are completely unrelated to the matter is made to relate through social engineering. Social engineering employs `traps' to pry on human emotion and its vulnerability, taking advantage of the flaws of human psychology. Information security breaches utilising social engineering techniques are vast, so that social engineering in this context is a topic which could not be neglected. This research paper presents an overview of social engineering attacks and suggested defence mechanisms. An introduction to social engineering attacks are given, with context to the current trends and related vulnerabilities. Main reasons for the spread of social engineering attacks in the current context are also presented. Attack frameworks are presented and defence approaches are proposed at the end. | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.relation.ispartofseries | 2018 IEEE 5th International Conference on Engineering Technologies and Applied Sciences (ICETAS); | - |
dc.subject | Overview | en_US |
dc.subject | Social Engineering | en_US |
dc.subject | Context | en_US |
dc.subject | Information Security | en_US |
dc.title | An Overview of Social Engineering in the Context of Information Security | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1109/ICETAS.2018.8629126 | en_US |
Appears in Collections: | Department of Electrical and Electronic Engineering-Scopes Research Papers Research Papers - Department of Electrical and Electronic Engineering Research Papers - SLIIT Staff Publications |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
An_Overview_of_Social_Engineering_in_the_Context_of_Information_Security.pdf Until 2050-12-31 | 2.04 MB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.