|
|
|
Majid H. Alsulami, Fawaz D. Alharbi, Hamdan M. Almutairi, Bandar S. Almutairi, Mohammed M. Alotaibi, Majdi E. Alanzi, Khaled G. Alotaibi and Sultan S. Alharthi
Social engineering is one of the most inventive methods of gaining unauthorized access to information systems and obtaining sensitive information. This type of cybersecurity threat requires minimal technical knowledge because it relies on the organizatio...
ver más
|
|
|
|
|
|
|
Hussain Aldawood and Geoffrey Skinner
The idea and perception of good cyber security protection remains at the forefront of many organizations? information and communication technology strategy and investment. However, delving deeper into the details of its implementation reveals that organi...
ver más
|
|
|
|
|
|
|
Shagun Tripathi,Priyanka Panday
The world economy is experiencing unpredictable economic volatility and uncertainty, with possible calamitous social, political and economic consequences. One of the greatest challenges of our times is unemployment. Job creation in the 21st century has b...
ver más
|
|
|
|
|
|
|
Ruti Gafni, Tal Pavel, Raz Margolin, Ben Weiss
Pág. 27 - 41
Passwords are the standard means of registration and access to Websites, information systems, online services and various social networks. Databases are increasingly breached and social engineering is employed to obtain usernames and passwords for online...
ver más
|
|
|
|
|
|
|
Melissa Carlton, Yair Levy
Pág. 16 - 28
Cyber threats have been growing with social engineering and business e-mail compromise reported as the two most rising penetration vectors. Advanced Persistent Threats (APTs) are penetration techniques that combine several approaches to gain access to or...
ver más
|
|
|
|
|
|
|
Wilnelia Hernández, Yair Levy, Michelle M. Ramim
Pág. 93 - 109
Employees spend time during work hours on non-work related activities including visiting ecommerce Websites, managing personal email accounts, and engaging in e-banking. These types of actions in the workplace are known as cyberslacking. Cyberslacking af...
ver más
|
|
|
|