@inproceedings{b284a58f447946558ba711c60a4a2aba,
title = "Understanding Social Engineers Strategies from the Perspective of Sun-Tzu Philosophy",
abstract = "Human remains susceptible to manipulations, and social engineers are expert of these techniques. To better understand the attack and defense strategies of social engineering attack, there is a need to map social engineering strategies with the war strategies. We can find plenty of war strategist and books on war strategies. By mapping the knowledge, we may get unique ways of defense and can further identify social engineering attack patterns. In this study, we have mapped the principles suggested by Sun-Tzu with social engineering attacks and further mentioned the initial results (by showing examples for each case). We aim to extend this work and further verify the effectiveness of this strategy in near future.",
keywords = "Human Element, Information Security, Mapping, Social Engineering, Social Engineers, Sun-Tzu",
author = "Affan Yasin and Rubia Fatima and Lin Liu and Jianmin Wang and Raian Ali",
note = "Publisher Copyright: {\textcopyright} 2020 IEEE.; 44th IEEE Annual Computers, Software, and Applications Conference, COMPSAC 2020 ; Conference date: 13-07-2020 Through 17-07-2020",
year = "2020",
month = jul,
doi = "10.1109/COMPSAC48688.2020.00045",
language = "English",
series = "Proceedings - 2020 IEEE 44th Annual Computers, Software, and Applications Conference, COMPSAC 2020",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "1773--1776",
editor = "Chan, {W. K.} and Bill Claycomb and Hiroki Takakura and Ji-Jiang Yang and Yuuichi Teranishi and Dave Towey and Sergio Segura and Hossain Shahriar and Sorel Reisman and Ahamed, {Sheikh Iqbal}",
booktitle = "Proceedings - 2020 IEEE 44th Annual Computers, Software, and Applications Conference, COMPSAC 2020",
}