Managing Social Engineering Attacks- Considering Human Factors and Security Investment.
Reza AlaviShareeful IslamHaris MouratidisSin LeePublished in: HAISA (2015)
Keyphrases
- human factors
- security threats
- security mechanisms
- security problems
- security protocols
- computer security
- cyber attacks
- security measures
- human computer interaction
- java card
- security breaches
- security vulnerabilities
- security issues
- denial of service attacks
- security risks
- countermeasures
- border security
- fault injection
- chosen plaintext
- information security
- malicious users
- social networks
- security flaws
- security requirements
- stream cipher
- social interaction
- cryptographic protocols
- access control
- malicious attacks
- secure routing
- biometric template
- identity theft
- information leakage
- intrusion detection
- intrusion detection and prevention
- aviation safety
- network security
- security policies
- sql injection
- buffer overflow
- user centred design
- malicious nodes
- dos attacks
- data mining
- smart card
- software engineering
- social media
- user interface
- artificial intelligence
- key agreement protocol
- ddos attacks
- cyber security
- social context
- security analysis
- key management
- anomaly detection
- wireless sensor networks