Impact Analysis and Performance Model of Social Engineering Techniques

dc.contributor.authorDuman, Seydanur Ahi
dc.contributor.authorHayran, Rukiye
dc.contributor.authorSoğukpinar, Ibrahim
dc.date.accessioned2025-10-29T12:08:22Z
dc.date.issued2023
dc.departmentFakülteler, Mühendislik Fakültesi, Bilgisayar Mühendisliği Bölümü
dc.description11th International Symposium on Digital Forensics and Security, ISDFS 2023 -- TN; The University of Tennessee at Chattanooga -- 189042
dc.description.abstractThe field of information security is rapidly growing discipline. Although the effectiveness of security measures to protect sensitive information is increasing, the human factor that are open to manipulation remains the weakest link in the chain of security. Security of information is vital for organizations and governments. Also development of safeguards against illegal access to information is an area of increasing interest of researchers. Technology alone is not an adequate protection against information theft; human is often the weakest link in the chain of information security. The "art"of exposing people's vulnerabilities for sensitive information is known as social engineering. At the same time, the process of exploiting personal vulnerabilities is known as a social engineering attack. There are different kinds of this kinds of attacks. Targeting human weakness, social engineering attack uses various routing techniques to obtain sensitive information. In this work, the factors of the success of phishing, which is one of the social engineering attacks, were investigated. Some hypotheses have been developed according to these factors, and the accuracy of the hypotheses was shown with a questionnaire. A model that is used to calculate these parameters mathematically is proposed and the importance of being conscious to prevent such attacks is emphasized. © 2023 Elsevier B.V., All rights reserved.
dc.description.sponsorshipIEEE; IEEE Education Society's
dc.identifier.doi10.1109/ISDFS58141.2023.10131771
dc.identifier.isbn9798350336986
dc.identifier.scopus2-s2.0-85163056552
dc.identifier.scopusqualityN/A
dc.identifier.urihttps://doi.org/10.1109/ISDFS58141.2023.10131771
dc.identifier.urihttps://hdl.handle.net/20.500.14854/14457
dc.indekslendigikaynakScopus
dc.language.isoen
dc.publisherInstitute of Electrical and Electronics Engineers Inc.
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanı
dc.rightsinfo:eu-repo/semantics/closedAccess
dc.snmzKA_Scopus_20251020
dc.subjectattack
dc.subjecthooking
dc.subjectphishing
dc.subjectsecurity
dc.subjectsocial engineering
dc.titleImpact Analysis and Performance Model of Social Engineering Techniques
dc.typeConference Object

Dosyalar