TY - JOUR
T1 - Strategies for counteracting social engineering attacks
AU - Fatima, Rubia
AU - Yasin, Affan
AU - Liu, Lin
AU - Jianmin, Wang
N1 - Publisher Copyright:
© 2022 MA Healthcare Ltd. All rights reserved.
PY - 2022/7/1
Y1 - 2022/7/1
N2 - As the result of a five-year project investigating social engineering attacks, researchers at Tsinghua University, China have identified a number of strategies that organisations can use to protect themselves. However, they warn that there is no single strategy that works for all forms of attack. And when choosing the right methods it's essential to consider the context, the environment and the available facilities..
AB - As the result of a five-year project investigating social engineering attacks, researchers at Tsinghua University, China have identified a number of strategies that organisations can use to protect themselves. However, they warn that there is no single strategy that works for all forms of attack. And when choosing the right methods it's essential to consider the context, the environment and the available facilities..
UR - http://www.scopus.com/inward/record.url?scp=85178293111&partnerID=8YFLogxK
U2 - 10.12968/S1361-3723(22)70583-0
DO - 10.12968/S1361-3723(22)70583-0
M3 - Article
AN - SCOPUS:85178293111
SN - 1361-3723
VL - 2022
JO - Computer Fraud and Security
JF - Computer Fraud and Security
IS - 7
ER -