{"title":"减轻社会工程攻击:关注薄弱的人类环节","authors":"R. O. Oveh, G. Aziken","doi":"10.1109/ITED56637.2022.10051202","DOIUrl":null,"url":null,"abstract":"Social engineering is a security concern that can be mitigated most efficiently from the most neglected aspect in the security ecosystem which is humans. Technological advancement focused at devices cannot prevent psychological human manipulation. This paper sort to determine the security practices and disposition of humans in a situation of vulnerability to social engineering attacks. Interview was used for data collection. 70 persons were interviewed using structured questions. The result showed that being a former victim of social engineering activity is not enough to prevent being another victim which is a consequence of security practices by the human. It is recommended that security practices against social engineering should be institutionalised in everyday human living.","PeriodicalId":246041,"journal":{"name":"2022 5th Information Technology for Education and Development (ITED)","volume":"151 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Mitigating Social Engineering Attack: A Focus on the Weak Human Link\",\"authors\":\"R. O. Oveh, G. Aziken\",\"doi\":\"10.1109/ITED56637.2022.10051202\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Social engineering is a security concern that can be mitigated most efficiently from the most neglected aspect in the security ecosystem which is humans. Technological advancement focused at devices cannot prevent psychological human manipulation. This paper sort to determine the security practices and disposition of humans in a situation of vulnerability to social engineering attacks. Interview was used for data collection. 70 persons were interviewed using structured questions. The result showed that being a former victim of social engineering activity is not enough to prevent being another victim which is a consequence of security practices by the human. It is recommended that security practices against social engineering should be institutionalised in everyday human living.\",\"PeriodicalId\":246041,\"journal\":{\"name\":\"2022 5th Information Technology for Education and Development (ITED)\",\"volume\":\"151 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 5th Information Technology for Education and Development (ITED)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ITED56637.2022.10051202\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 5th Information Technology for Education and Development (ITED)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITED56637.2022.10051202","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Mitigating Social Engineering Attack: A Focus on the Weak Human Link
Social engineering is a security concern that can be mitigated most efficiently from the most neglected aspect in the security ecosystem which is humans. Technological advancement focused at devices cannot prevent psychological human manipulation. This paper sort to determine the security practices and disposition of humans in a situation of vulnerability to social engineering attacks. Interview was used for data collection. 70 persons were interviewed using structured questions. The result showed that being a former victim of social engineering activity is not enough to prevent being another victim which is a consequence of security practices by the human. It is recommended that security practices against social engineering should be institutionalised in everyday human living.