دانلود و نمایش مقالات مرتبط با Social engineering attacks::صفحه 1
بلافاصله پس از پرداخت دانلود کنید

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - Social engineering attacks

تعداد مقالات یافته شده: 2
ردیف عنوان نوع
1 A cybercrime incident architecture with adaptive response policy
معماری حوادث سایبری با سیاست واکنش تطبیقی-2019
Handling and mitigating the cybercrime incidents (CIs) have attracted significant research attention, over the last years, due to their increasing frequency of occurrence. However, the term cybercrime is often used interchangeably with other technology-linked malicious acts, such as cyberwarfare, and cyberterrorism, leading to misconceptions. In addition, there does not exist a management framework which would classify CIs, qualitatively and quantitatively evaluate their occurrence and promptly align them with appropriate measures and policies. This work introduces a Cybercrime Incident Architecture that enables a comprehensive cybercrime embodiment through feature identification, offence classification mechanisms, threats’ severity labeling and a completely novel Adaptive Response Policy (ARP) that identifies and interconnects the relevant stakeholders with preventive measures and response actions. The proposed architecture consists of four separate complementary components that lead to a manually – and in the future automatically – generated ARP. The idea is to build a holistic framework toward automated cybercrime handling. A criminal case study is selected to validate the introduced framework and highlight its potentiality to evolve into a CI expert system.
Keywords: Cybercrime incident | Offence classification system | Cyber-security | Threat severity | Security and privacy | Investigation techniques | Social engineering attacks | Malware/spyware crime
مقاله انگلیسی
2 Self-control, organizational context, and rational choice in Internet abuses at work
خود-کنترلی، زمینه سازمانی، و انتخاب منطقی در سوء استفاده های اینترنتی در کار-2018
Cyber criminals use the Internet as a major platform to launch malware and social engineering attacks. Employees’ violation of Internet use policy (IUP) elevates a firm’s security risks from cyber-attacks. In the literature, such deviant behavior is generally considered to be the result of a cost-benefit calculus. However, this study shows that dispositional factors such as self-control and procedural justice moderate the cost-benefit calculus. We conclude that self-control and procedural justice need to be integrated with the Rational Choice Theory to better explain Internet abuses at work.
keywords: Internet abuses| Rational choice| Self-control| Justice
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 5155 :::::::: بازدید دیروز: 3097 :::::::: بازدید کل: 39422 :::::::: افراد آنلاین: 56