Skip to main content

2018 | OriginalPaper | Buchkapitel

35. Defense Methods Against Social Engineering Attacks

verfasst von : Jibran Saleem, Mohammad Hammoudeh

Erschienen in: Computer and Network Security Essentials

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this chapter, multiple Social Engineering defense methods are comprehensively reviewed. Focus has been placed on examining data, which supports the hypothesis that security awareness is one of the key strengths one can develop, to assist themselves and others, in avoiding and countering increased Social Engineering attacks in this day and age. Various case studies have also been analyzed and evaluated, which demonstrates positive impact on the security outlook of employees, once continuous and sufficient security training is delivered. Evidences of effective counter-techniques have been gathered using a variety of sources, all of which can be employed by businesses and individuals to deter and prevent Social Engineering attacks from taking place.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Mitnick, K. (2005). Art of intrusion C: The real stories behind the exploits of hackers, intruders and deceivers (1st ed.). Princeton: Wiley. Mitnick, K. (2005). Art of intrusion C: The real stories behind the exploits of hackers, intruders and deceivers (1st ed.). Princeton: Wiley.
2.
Zurück zum Zitat Erbschloe, M. (2004). Physical security for IT (1st ed.). Dorset: Digital Press. Erbschloe, M. (2004). Physical security for IT (1st ed.). Dorset: Digital Press.
3.
Zurück zum Zitat Shoniregun, C. A. (2014). Impacts and risk assessment of Technology for Internet Security (Advances in Information Security) (1st ed.). New York: Springer. Shoniregun, C. A. (2014). Impacts and risk assessment of Technology for Internet Security (Advances in Information Security) (1st ed.). New York: Springer.
8.
Zurück zum Zitat Mitnick, K., & Simon, W. (2002). The art of deception. Indianapolis: Wiley. Mitnick, K., & Simon, W. (2002). The art of deception. Indianapolis: Wiley.
9.
Zurück zum Zitat Heartfield, R., & Loukas, G. (2015). A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks. ACM Computing Surveys, 48(3), 37.CrossRef Heartfield, R., & Loukas, G. (2015). A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks. ACM Computing Surveys, 48(3), 37.CrossRef
10.
Zurück zum Zitat Suehring, S. (2015). Linux firewalls: Enhancing security with Nftables and beyond (4th ed.). Boston: Addison Wesley. Suehring, S. (2015). Linux firewalls: Enhancing security with Nftables and beyond (4th ed.). Boston: Addison Wesley.
15.
Zurück zum Zitat Robling, G., & Muller, M. (2009). Social engineering: a serious underestimated problem. Available at: https://www.researchgate.net/publication/220807213_Social_engineering_a_serious_underestimated_problem. Accessed 13 August 2016. Robling, G., & Muller, M. (2009). Social engineering: a serious underestimated problem. Available at: https://​www.​researchgate.​net/​publication/​220807213_​Social_​engineering_​a_​serious_​underestimated_​problem.​ Accessed 13 August 2016.
19.
Zurück zum Zitat Talib, S., Clarke, N. L., & Furnell, S. M. (2010). An analysis of information security awareness within home and work environments. Available at: http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=5438096&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2 Fabs _all.jsp%3Farnumber%3D5438096. Accessed 16 August 2016. Talib, S., Clarke, N. L., & Furnell, S. M. (2010). An analysis of information security awareness within home and work environments. Available at: http://​ieeexplore.​ieee.​org/​xpl/​login.​jsp?​tp=​&​arnumber=​5438096&​url=​http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2 Fabs _all.jsp%3Farnumber%3D5438096. Accessed 16 August 2016.
20.
Zurück zum Zitat ENISA. (2010). The new users’ guide: How to raise information security awareness (EN). Available at: https://www.enisa.europa.eu/publications/archive/copy_of_new-users-guide. Accessed 16 August 2016. ENISA. (2010). The new users’ guide: How to raise information security awareness (EN). Available at: https://​www.​enisa.​europa.​eu/​publications/​archive/​copy_​of_​new-users-guide.​ Accessed 16 August 2016.
25.
Zurück zum Zitat Wombat. (2016). Global manufacturing company reduces malware infections by 46%. Available at: https://info.wombatsecurity.com/hs-fs/hub/372792/file-2557238064-pdf/WombatSecurity_CaseStudy_Manufacturing_46PercentMalwareReduction_090815.pdf? submissionGuid=ffd67461-ca8b-4466-9d8b-a4ad57a5d9df. Accessed 18 August 2016. Wombat. (2016). Global manufacturing company reduces malware infections by 46%. Available at: https://​info.​wombatsecurity.​com/​hs-fs/​hub/​372792/​file-2557238064-pdf/​WombatSecurity_​CaseStudy_​Manufacturing_​46PercentMalware​Reduction_​090815.​pdf?​ submissionGuid=ffd67461-ca8b-4466-9d8b-a4ad57a5d9df. Accessed 18 August 2016.
Metadaten
Titel
Defense Methods Against Social Engineering Attacks
verfasst von
Jibran Saleem
Mohammad Hammoudeh
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-58424-9_35

Neuer Inhalt