Investigating The Effect of Social Engineering Techniques on Employees Vulnerability(Case study: Tehran Municipality Employees)
Journal Title: Electronic and Cyber Defense - Year 2023, Vol 11, Issue 1
Abstract
Social engineering is the art of deceiving people in a way that no use of force and threat, something to do or provide that information to social engineer . Social engineering can follow self-interest or organizational or national interest. Hackers, criminals, spies, saboteurs and ... all use social engineering to achieve their goals .social engineer uses Various techniques. In this study, the effect of this techniques on the vulnerability of people looked at the combined method (qualitative and quantitative ) to measure this effect .First, various social engineering techniques as well as their vulnerability conducted by reviewing previous research and the interviewing with the experts in the field of engineering social was obtained and different techniques in a variety of technical, social, physical and technical â social were categorized. Afterwards in quantitative stage, By creating a questionnaire and various Items In the form of Likert scale and Provide the questionnaire to the target community(Employees of Tehran Municipality) The degree of vulnerability of people to a variety of social engineering techniques was obtained. It was found vulnerability of the target population is more than to the techniques of technical, social, technical â social and physical respectively . to prevent social engineering, human âdriven and technology âbased solutions were proposed that human âcentered mainly on training personnel and IT solutions based on the provision of the right equipment, computers and creating a right information access cycle in organizations .
Authors and Affiliations
Seyyedhasan Hoseini,nasim majidi gahrodi,
Reducing the Destructive Effect of Misbehaving Users in Cooperative Spectrum Sensing using Reinforcement Learning
The presence of misbehaving users in Cognitive Radio Networks (CRN) can disrupt the process of spectrum sensing and detecting the status of the Primary User (PU). In order to reduce the destructive effect of this group o...
Analysis of exchange market disruptors using graph-based social network analysis
Today, increasing the science and technology and the communication technologies, especially in cyberspace, however physically act have become interact with cyberspace has caused a more significant effect on the culture a...
Novel Spoofing Mitigation Method using Wavelet Transform Based on PSO Algorithm in the Acquisition Stage of GPS Receiver
The spoofing attack is one of the most serious interferences in the Global Positioning System (GPS). By propagating a signal structurally similar to the original GPS signal, the spoofers try to influence the function of...
A Greedy Algorithm for Constructing Region-Fault Tolerant Geometric Spanners
In this paper, we consider the problem of constructing the region-fault tolerant geometric spanners when the problem is restricted to a subclass of convex regions. Let S be a set of n points in the plane. In particular,...
Providing an Improved Unmanned Aerial Vehicle Detection System to Increase Detection speed Using Deep Learning
Abstract:In recent years, Unmanned Aerial Vehicles have become significantly available to the public of people. Affordable prices, being equipped with advanced technologies, small sizes, easy portability and ⦠etc. cre...