Repository logo
 
Publication

Information security threat assessment using social engineering in the organizational context: literature review

dc.contributor.authorLopes, António
dc.contributor.authorReis, Leonilde
dc.contributor.authorSão Mamede, Henrique
dc.contributor.authorSantos, Arnaldo
dc.date.accessioned2023-06-19T12:12:05Z
dc.date.available2023-06-19T12:12:05Z
dc.date.issued2022
dc.description.abstractCurrently, due to the value and diversity of data that organizations use and produce in their activity, it is extremely important to protect this asset. Security flaws can arise due to several factors and whenever it is difficult to gain access to the desired information, because of technological barriers. In this case, attacks are redirected to the exploitation of human beings vulnerabilities, through various techniques. The objective of this work focuses on literature review, studying the underlying theme of Social Engineering, as it uses human trust, convincing someone of something fake, using various interactions and different vectors to gain access to private information. The research work will be supported by Design Science Research, due to the possibility of construction, evaluation, and subsequent validation of the artifact. The contribute of a framework proposal for preventing social engineering attacks in organizations and provide the best recommendations, guiding, and supporting the stakeholders in the selection and definition of controls that guarantee the security of organizational information and avoid possible attacks by Social Engineering. It is expected that the practical ef-fects of the future work will result in a reduction in the number of attacks using Social Engineering, greater individual and collective preparation to deal with this problem and, over time, the incentive to continued expansion of the adoption of these artifacts at the organizational level.pt_PT
dc.description.versioninfo:eu-repo/semantics/publishedVersionpt_PT
dc.identifier.doi10.1007/978-3-031-04819-7_24pt_PT
dc.identifier.issn2367-3370
dc.identifier.urihttp://hdl.handle.net/10400.2/14083
dc.language.isoengpt_PT
dc.peerreviewedyespt_PT
dc.rights.urihttp://creativecommons.org/licenses/by-sa/4.0/pt_PT
dc.subjectSocial engineeringpt_PT
dc.subjectInformation securitypt_PT
dc.subjectInformation systemspt_PT
dc.subjectInformation and communication technologiespt_PT
dc.titleInformation security threat assessment using social engineering in the organizational context: literature reviewpt_PT
dc.typeconference object
dspace.entity.typePublication
oaire.citation.endPage242pt_PT
oaire.citation.startPage233pt_PT
oaire.citation.titleWorld Conference on Information Systems and Technologies (Worldcist)pt_PT
oaire.citation.volume469pt_PT
person.familyNameLopes
person.familyNameReis
person.familyNameSão Mamede
person.familyNameSantos
person.givenNameAntónio
person.givenNameLeonilde
person.givenNameHenrique
person.givenNameArnaldo
person.identifierR-002-0P0
person.identifierhttps://scholar.google.pt/citations?user=ik_0xPkAAAAJ&hl=pt-PT
person.identifier.ciencia-idB61D-AF04-BEF3
person.identifier.ciencia-id7F17-9DAD-C007
person.identifier.ciencia-id3211-438A-A256
person.identifier.orcid0000-0001-8996-6394
person.identifier.orcid0000-0002-4398-8384
person.identifier.orcid0000-0002-5383-9884
person.identifier.orcid0000-0001-5139-6728
person.identifier.scopus-author-id36458782500
rcaap.rightsrestrictedAccesspt_PT
rcaap.typeconferenceObjectpt_PT
relation.isAuthorOfPublication9f635c10-24fe-424e-a696-11611acbb5fb
relation.isAuthorOfPublication46a9025b-8bf0-4924-b320-20d107b74e12
relation.isAuthorOfPublication86fd6131-eed5-42be-9639-9466ddf680ab
relation.isAuthorOfPublicationb40e1515-a3da-429d-83f6-717be6d9f30d
relation.isAuthorOfPublication.latestForDiscovery86fd6131-eed5-42be-9639-9466ddf680ab

Files

Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
Social Engeneering Threats.pdf
Size:
336.7 KB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.97 KB
Format:
Item-specific license agreed upon to submission
Description: