TY - JOUR
T1 - Counteracting social engineering attacks
AU - Yasin, Affan
AU - Fatima, Rubia
AU - Liu, Lin
AU - Wanga, Jianmin
AU - Ali, Raian
AU - Wei, Ziqi
N1 - Publisher Copyright:
© 2021 Elsevier Ltd
PY - 2021/10
Y1 - 2021/10
N2 - Social engineers are very successful at exploiting human weaknesses, gathering information, communicating with people and creating creative storylines attacking people's psychological needs and weaknesses. And that is why people, who are among the weakest links in the information security chain, remain susceptible to social engineering attacks.
AB - Social engineers are very successful at exploiting human weaknesses, gathering information, communicating with people and creating creative storylines attacking people's psychological needs and weaknesses. And that is why people, who are among the weakest links in the information security chain, remain susceptible to social engineering attacks.
UR - http://www.scopus.com/inward/record.url?scp=85117748246&partnerID=8YFLogxK
U2 - 10.1016/S1361-3723(21)00108-1
DO - 10.1016/S1361-3723(21)00108-1
M3 - Article
AN - SCOPUS:85117748246
SN - 1361-3723
VL - 2021
SP - 15
EP - 19
JO - Computer Fraud and Security
JF - Computer Fraud and Security
IS - 10
ER -