[go: up one dir, main page]

Kano et al., 2021 - Google Patents

Trust factors of social engineering attacks on social networking services

Kano et al., 2021

Document ID
9002761124316476215
Author
Kano Y
Nakajima T
Publication year
Publication venue
2021 IEEE 3rd global conference on life sciences and technologies (LifeTech)

External Links

Snippet

Social engineering is a hacking technique that steals personal or confidential information by taking advantage of human psychological weaknesses. This paper investigates the trust factors of social engineering attacks on SNSs, by conducting an experiment with 35 …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • H04L12/58Message switching systems, e.g. electronic mail systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations contains provisionally no documents
    • H04L12/18Arrangements for providing special services to substations contains provisionally no documents for broadcast or conference, e.g. multicast
    • H04L12/1813Arrangements for providing special services to substations contains provisionally no documents for broadcast or conference, e.g. multicast for computer conferences, e.g. chat rooms

Similar Documents

Publication Publication Date Title
Syafitri et al. Social engineering attacks prevention: A systematic literature review
Prabhu Kavin et al. Machine learning‐based secure data acquisition for fake accounts detection in future mobile communication networks
Albladi et al. User characteristics that influence judgment of social engineering attacks in social networks
Iuga et al. Baiting the hook: factors impacting susceptibility to phishing attacks
Goel et al. Got phished? Internet security and human vulnerability
Rader et al. Identifying patterns in informal sources of security information
Kano et al. Trust factors of social engineering attacks on social networking services
Herbert et al. A world full of privacy and security (mis) conceptions? findings of a representative survey in 12 countries
Kavin et al. Machine learning-based secure data acquisition for fake accounts detection in future mobile communication networks
Montañez et al. Social engineering attacks and defenses in the physical world vs. cyberspace: a contrast study
Algarni et al. Social engineering in social networking sites: how good becomes evil
Hutchings et al. Displacing big data: How criminals cheat the system
Blancaflor et al. Let’s go phishing: A phishing awareness campaign using smishing, email phishing, and social media phishing tools
Orunsolu et al. A Users' Awareness Study and Influence of Socio-Demography Perception of Anti-Phishing Security Tips.
Dickerson et al. Contextualised cyber security awareness approach for online romance fraud
Naz et al. A comprehensive survey on social engineering-based attacks on social networks
Hassandoust et al. How contextualisation affects the vulnerability of individuals to phishing attempts
Orunsolu et al. An empirical evaluation of security tips in phishing prevention: A case study of nigerian banks
Mohd Zaharon et al. Factors affecting awareness of phishing among generation Y
Kulkarni et al. Human Susceptibility to Social Engineering Attacks: an innovative approach to social change
Halouzka et al. Overview of Cyber Threats in Central European Countries
Achary et al. An Expert System for the Detection and Mitigation of Social Engineering Attacks (Sea) Using Machine Learning Algorithm
Cornelius Online identity theft victimization: An assessment of victims and non-victims level of cyber security knowledge
Khadka et al. A survey on the principles of persuasion as a social engineering strategy in phishing
Bieger et al. Phishing prevention in mobile messaging platforms by the Dutch banking sector