IAD Index of Academic Documents
  • Home Page
  • About
    • About Izmir Academy Association
    • About IAD Index
    • IAD Team
    • IAD Logos and Links
    • Policies
    • Contact
  • Submit A Journal
  • Submit A Conference
  • Submit Paper/Book
    • Submit a Preprint
    • Submit a Book
  • Contact
  • Teknik Bilimler Dergisi
  • Volume:13 Issue:2
  • EXAMINING THE SOCIAL ENGINEERING ATTACK VECTOR IN THE LINE OF DATA BREACH

EXAMINING THE SOCIAL ENGINEERING ATTACK VECTOR IN THE LINE OF DATA BREACH

Authors : Ahmet Ali SÜZEN
Pages : 50-56
View : 33 | Download : 42
Publication Date : 2023-08-01
Article Type : Research Paper
Abstract :The versatile use of information and communication technologies also diversifies data sources. The data produced by data sources must reach the relevant target source within the framework of confidentiality, integrity and accessibility. These data sources are protected by technical methods within the scope of information security. The increase in data sources creates information security problems by making protection with only technical methods insufficient. Malicious attackers target the security measures of users or organizations using advanced techniques and methods. One of the most effective methods of these attacks is social engineering attacks. Social engineering is an attack vector that attackers use to force or persuade people to obtain the requested information. The human vulnerabilities that arise in the success of social engineering attacks are fear, desire to help, carelessness and comfort zone. In this study, the contribution of data breaches to social engineering attacks and the contribution of social engineering to data breaches are investigated by analyzing current data breaches from both sides insert ignore into journalissuearticles values(breach source and data target);. At the same time, security approaches are proposed within the scope of the implementation and damage effects of social engineering attacks.
Keywords : Attack Vectors, Data Breaches, Phishing Social engineering

ORIGINAL ARTICLE URL
VIEW PAPER (PDF)

* There may have been changes in the journal, article,conference, book, preprint etc. informations. Therefore, it would be appropriate to follow the information on the official page of the source. The information here is shared for informational purposes. IAD is not responsible for incorrect or missing information.


Index of Academic Documents
İzmir Academy Association
CopyRight © 2023-2025