Abstract
Social engineers are very successful at exploiting human weaknesses, gathering information, communicating with people and creating creative storylines attacking people's psychological needs and weaknesses. And that is why people, who are among the weakest links in the information security chain, remain susceptible to social engineering attacks.
| Original language | English |
|---|---|
| Pages (from-to) | 15-19 |
| Number of pages | 5 |
| Journal | Computer Fraud and Security |
| Volume | 2021 |
| Issue number | 10 |
| DOIs | |
| Publication status | Published - Oct 2021 |
| Externally published | Yes |
Fingerprint
Dive into the research topics of 'Counteracting social engineering attacks'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver