Kano et al., 2021 - Google Patents
Trust factors of social engineering attacks on social networking servicesKano et al., 2021
- Document ID
- 9002761124316476215
- Author
- Kano Y
- Nakajima T
- Publication year
- Publication venue
- 2021 IEEE 3rd global conference on life sciences and technologies (LifeTech)
External Links
Snippet
Social engineering is a hacking technique that steals personal or confidential information by taking advantage of human psychological weaknesses. This paper investigates the trust factors of social engineering attacks on SNSs, by conducting an experiment with 35 …
- 238000000034 method 0 abstract description 6
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/16—Arrangements for providing special services to substations contains provisionally no documents
- H04L12/18—Arrangements for providing special services to substations contains provisionally no documents for broadcast or conference, e.g. multicast
- H04L12/1813—Arrangements for providing special services to substations contains provisionally no documents for broadcast or conference, e.g. multicast for computer conferences, e.g. chat rooms
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Syafitri et al. | Social engineering attacks prevention: A systematic literature review | |
Prabhu Kavin et al. | Machine learning‐based secure data acquisition for fake accounts detection in future mobile communication networks | |
Albladi et al. | User characteristics that influence judgment of social engineering attacks in social networks | |
Iuga et al. | Baiting the hook: factors impacting susceptibility to phishing attacks | |
Goel et al. | Got phished? Internet security and human vulnerability | |
Rader et al. | Identifying patterns in informal sources of security information | |
Kano et al. | Trust factors of social engineering attacks on social networking services | |
Herbert et al. | A world full of privacy and security (mis) conceptions? findings of a representative survey in 12 countries | |
Kavin et al. | Machine learning-based secure data acquisition for fake accounts detection in future mobile communication networks | |
Montañez et al. | Social engineering attacks and defenses in the physical world vs. cyberspace: a contrast study | |
Algarni et al. | Social engineering in social networking sites: how good becomes evil | |
Hutchings et al. | Displacing big data: How criminals cheat the system | |
Blancaflor et al. | Let’s go phishing: A phishing awareness campaign using smishing, email phishing, and social media phishing tools | |
Orunsolu et al. | A Users' Awareness Study and Influence of Socio-Demography Perception of Anti-Phishing Security Tips. | |
Dickerson et al. | Contextualised cyber security awareness approach for online romance fraud | |
Naz et al. | A comprehensive survey on social engineering-based attacks on social networks | |
Hassandoust et al. | How contextualisation affects the vulnerability of individuals to phishing attempts | |
Orunsolu et al. | An empirical evaluation of security tips in phishing prevention: A case study of nigerian banks | |
Mohd Zaharon et al. | Factors affecting awareness of phishing among generation Y | |
Kulkarni et al. | Human Susceptibility to Social Engineering Attacks: an innovative approach to social change | |
Halouzka et al. | Overview of Cyber Threats in Central European Countries | |
Achary et al. | An Expert System for the Detection and Mitigation of Social Engineering Attacks (Sea) Using Machine Learning Algorithm | |
Cornelius | Online identity theft victimization: An assessment of victims and non-victims level of cyber security knowledge | |
Khadka et al. | A survey on the principles of persuasion as a social engineering strategy in phishing | |
Bieger et al. | Phishing prevention in mobile messaging platforms by the Dutch banking sector |