UPSI Digital Repository (UDRep)
Start | FAQ | About

QR Code Link :

Type :article
Subject :HM Sociology
Main Author :Nik Zulkarnaen Khidzir
Additional Authors :Shekh Abdullah-Al-Musa Ahmed
Title :Viewpoint of probabilistic risk assessment in artificial enabled social engineering attacks
Place of Production :Tanjong Malim
Publisher :Fakulti Pengurusan dan Ekonomi
Year of Publication :2019
Corporate Name :Universiti Pendidikan Sultan Idris

Abstract : Universiti Pendidikan Sultan Idris
Risk assessment really a complex decision-making process in the domain of in-formation security areas. There are a lot of unclear model of software domain and the lack of associated uncertainty are two main reasons that directly affect individual decisions making regarding risk assessment. When artificial enabled social engineering attacks are effectively may happening in every levels of domain. On the other hand, the risk assessment conducted on the safety requirements on artificial enabled social engineering attacks. So the simple meaning of social engineering is to refers to the psychologically and mentality use people to give secret information in the context of information security. A strategy of self-confidence for information collection, fraud, or access to the system, is different from a traditional "con" that it is often one of the more complex fraudulent schemes. That is why in this paper we proposed theoretical framework, which can not only demonstrate its potential for the risk assessment, but it can be sensitive and effective in analyzing a critical and uncertain operational environment that can address the extreme effects of information security.

References

Abawajy, J. (2014). User preference of cyber security awareness delivery methods. Behaviour & Information Technology, Volume 33 (Issue 3), 237-248.

Buang, M. F. M. E. A. & Daud, S.M. (2012). A web-based KM system for digital forensics - Knowledge sharing capability. Proceedings of 2012 International Conference on Multimedia Computing and Systems, ICMCS 2012, Pages 528-533.

Clay Posey, T. L. R. P. B. L. (2015). The Impact of Organizational Commitment on Insiders’ Motivation to Protect Organizational Information Assets. Journal of Management Information Systems, Volume 32(Issue 4), Pages 179-214.

Hinson, G. (2008). Social Engineering Techniques, Risks, and Controls. The EDP Audit, Control, and Security Newsletter, Volume 37(Issue 4-5), Pages 32-46.

Major, S. D. A. (2009). Social Engineering: Hacking the Wetware! Information Security Journal: A Global Perspective, Volume 18( 1), 40-46.

Pieters, W. (2011). The (Social) Construction of Information Security. The Information Society, Volume 27(Issue 5).

Vuorinen, P. T. J. (2013). Dissecting social engineering. Journal Behavior & Information Technology 32(10), Pages 1014-1023.

Workman, M. (2008). Wisecrackers: A theory-grounded investigation of phishing and pretext social engineering threats to information security. Publication cover image Volume59, Issue4, 551-564.

Tham, M. T., Vagi, F., Morris, A. J., & Wood, R. K. (1991). On-line multivariable adaptive control of a binary distillation column. Volume 69(Issue 4), 997-1009.

 


This material may be protected under Copyright Act which governs the making of photocopies or reproductions of copyrighted materials.
You may use the digitized material for private study, scholarship, or research.

Back to previous page

Installed and configured by Bahagian Automasi, Perpustakaan Tuanku Bainun, Universiti Pendidikan Sultan Idris
If you have enquiries, kindly contact us at pustakasys@upsi.edu.my or 016-3630263. Office hours only.