{"title":"Strategies for counteracting social engineering attacks","authors":"R. Fatima, Affan Yasin, Lin Liu, Wang Jianmin","doi":"10.12968/s1361-3723(22)70583-0","DOIUrl":null,"url":null,"abstract":"As the result of a five-year project investigating social engineering attacks, researchers at Tsinghua University, China have identified a number of strategies that organisations can use to protect themselves. However, they warn that there is no single strategy that works for all forms of attack. And when choosing the right methods it's essential to consider the context, the environment and the available facilities.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"13 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Fraud and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.12968/s1361-3723(22)70583-0","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"Social Sciences","Score":null,"Total":0}
引用次数: 2
Abstract
As the result of a five-year project investigating social engineering attacks, researchers at Tsinghua University, China have identified a number of strategies that organisations can use to protect themselves. However, they warn that there is no single strategy that works for all forms of attack. And when choosing the right methods it's essential to consider the context, the environment and the available facilities.
期刊介绍:
Computer Fraud & Security has grown with the fast-moving information technology industry and has earned a reputation for editorial excellence with IT security practitioners around the world. Every month Computer Fraud & Security enables you to see the threats to your IT systems before they become a problem. It focuses on providing practical, usable information to effectively manage and control computer and information security within commercial organizations.