Social engineering attack examples, templates and scenarios

The field of information security is a fast-growing discipline. Even though the effectiveness of security measures to protect sensitive information is increasing, people remain susceptible to manipulation and thus the human element remains a weak link. A social engineering attack targets this weakne...

Full description

Saved in:
Bibliographic Details
Published inComputers & security Vol. 59; pp. 186 - 209
Main Authors Mouton, Francois, Leenen, Louise, Venter, H.S.
Format Journal Article
LanguageEnglish
Published Amsterdam Elsevier Ltd 01.06.2016
Elsevier Sequoia S.A
Subjects
Online AccessGet full text
ISSN0167-4048
1872-6208
DOI10.1016/j.cose.2016.03.004

Cover

Abstract The field of information security is a fast-growing discipline. Even though the effectiveness of security measures to protect sensitive information is increasing, people remain susceptible to manipulation and thus the human element remains a weak link. A social engineering attack targets this weakness by using various manipulation techniques to elicit sensitive information. The field of social engineering is still in its early stages with regard to formal definitions, attack frameworks and templates of attacks. This paper proposes detailed social engineering attack templates that are derived from real-world social engineering examples. Current documented examples of social engineering attacks do not include all the attack steps and phases. The proposed social engineering attack templates attempt to alleviate the problem of limited documented literature on social engineering attacks by mapping the real-world examples to the social engineering attack framework. Mapping several similar real-world examples to the social engineering attack framework allows one to establish a detailed flow of the attack whilst abstracting subjects and objects. This mapping is then utilised to propose the generalised social engineering attack templates that are representative of real-world examples, whilst still being general enough to encompass several different real-world examples. The proposed social engineering attack templates cover all three types of communication, namely bidirectional communication, unidirectional communication and indirect communication. In order to perform comparative studies of different social engineering models, processes and frameworks, it is necessary to have a formalised set of social engineering attack scenarios that are fully detailed in every phase and step of the process. The social engineering attack templates are converted to social engineering attack scenarios by populating the template with both subjects and objects from real-world examples whilst still maintaining the detailed flow of the attack as provided in the template. Furthermore, this paper illustrates how the social engineering attack scenarios are applied to verify a social engineering attack detection model. These templates and scenarios can be used by other researchers to either expand on, use for comparative measures, create additional examples or evaluate models for completeness. Additionally, the proposed social engineering attack templates can also be used to develop social engineering awareness material.
AbstractList The field of information security is a fast-growing discipline. Even though the effectiveness of security measures to protect sensitive information is increasing, people remain susceptible to manipulation and thus the human element remains a weak link. A social engineering attack targets this weakness by using various manipulation techniques to elicit sensitive information. The field of social engineering is still in its early stages with regard to formal definitions, attack frameworks and templates of attacks. This paper proposes detailed social engineering attack templates that are derived from real-world social engineering examples. The proposed social engineering attack templates attempt to alleviate the problem of limited documented literature on social engineering attacks by mapping the real-world examples to the social engineering attack framework. Mapping several similar real-world examples to the social engineering attack framework allows one to establish a detailed flow of the attack whilst abstracting subjects and objects. Furthermore, this paper illustrates how the social engineering attack scenarios are applied to verify a social engineering attack detection model.
The field of information security is a fast-growing discipline. Even though the effectiveness of security measures to protect sensitive information is increasing, people remain susceptible to manipulation and thus the human element remains a weak link. A social engineering attack targets this weakness by using various manipulation techniques to elicit sensitive information. The field of social engineering is still in its early stages with regard to formal definitions, attack frameworks and templates of attacks. This paper proposes detailed social engineering attack templates that are derived from real-world social engineering examples. Current documented examples of social engineering attacks do not include all the attack steps and phases. The proposed social engineering attack templates attempt to alleviate the problem of limited documented literature on social engineering attacks by mapping the real-world examples to the social engineering attack framework. Mapping several similar real-world examples to the social engineering attack framework allows one to establish a detailed flow of the attack whilst abstracting subjects and objects. This mapping is then utilised to propose the generalised social engineering attack templates that are representative of real-world examples, whilst still being general enough to encompass several different real-world examples. The proposed social engineering attack templates cover all three types of communication, namely bidirectional communication, unidirectional communication and indirect communication. In order to perform comparative studies of different social engineering models, processes and frameworks, it is necessary to have a formalised set of social engineering attack scenarios that are fully detailed in every phase and step of the process. The social engineering attack templates are converted to social engineering attack scenarios by populating the template with both subjects and objects from real-world examples whilst still maintaining the detailed flow of the attack as provided in the template. Furthermore, this paper illustrates how the social engineering attack scenarios are applied to verify a social engineering attack detection model. These templates and scenarios can be used by other researchers to either expand on, use for comparative measures, create additional examples or evaluate models for completeness. Additionally, the proposed social engineering attack templates can also be used to develop social engineering awareness material.
Author Mouton, Francois
Venter, H.S.
Leenen, Louise
Author_xml – sequence: 1
  givenname: Francois
  orcidid: 0000-0001-8804-7601
  surname: Mouton
  fullname: Mouton, Francois
  email: moutonf@gmail.com
  organization: Command, Control and Information Warfare, Defence, Peace, Safety and Security, Council for Scientific and Industrial Research, Pretoria, South Africa
– sequence: 2
  givenname: Louise
  surname: Leenen
  fullname: Leenen, Louise
  organization: Command, Control and Information Warfare, Defence, Peace, Safety and Security, Council for Scientific and Industrial Research, Pretoria, South Africa
– sequence: 3
  givenname: H.S.
  surname: Venter
  fullname: Venter, H.S.
  organization: Department of Computer Science, University of Pretoria, Pretoria, South Africa
BookMark eNp9kD9LBDEQxYMoeJ5-AasFGwt3nSS7mxzaiPgPBAu1DtlklJx7yZnkRL-9Oc_KwmoezPvNPN4e2fbBIyGHFBoKtD-dNyYkbFjRDfAGoN0iEyoFq3sGcptMykLULbRyl-ylNAegopdyQs4eg3F6rNC_Oo8YnX-tdM7avFX4qRfLEdNJlbEInTFV2tsqGfQ6upD2yc6LHhMe_M4peb6-erq8re8fbu4uL-5rw3uaa8qHGdXAwRjbzeiAtrVswKHrJBNMc4GMQ2cp7dgg-x5mRmhru8G20BnGgE_J8ebuMob3FaasFq6EGEftMaySopL2wAvfFevRH-s8rKIv6RQVUoi-vGqLS25cJoaUIr4o47LOLvgctRsVBbVuVc3VulW1blUBV_CDsj_oMrqFjl__Q-cbCEtLHw6jSsahN2hdRJOVDe4__Bsqz5F5
CODEN CPSEDU
CitedBy_id crossref_primary_10_3390_s18030817
crossref_primary_10_1108_K_05_2021_0377
crossref_primary_10_1002_spy2_486
crossref_primary_10_1016_j_infsof_2024_107426
crossref_primary_10_1177_02666669221116336
crossref_primary_10_1080_23738871_2018_1514417
crossref_primary_10_1016_j_cose_2020_101761
crossref_primary_10_1108_ITP_11_2021_0864
crossref_primary_10_1109_MCOM_2017_1600969
crossref_primary_10_1007_s10111_021_00683_y
crossref_primary_10_1016_j_cose_2024_103741
crossref_primary_10_1080_24751839_2020_1747001
crossref_primary_10_1108_ICS_09_2021_0137
crossref_primary_10_1016_j_ijhcs_2019_05_007
crossref_primary_10_7717_peerj_cs_2487
crossref_primary_10_1002_spy2_161
crossref_primary_10_1007_s41870_023_01540_z
crossref_primary_10_1109_RITA_2021_3052686
crossref_primary_10_38017_2390058X_73
crossref_primary_10_3390_s19092148
crossref_primary_10_4018_IJDCF_286762
crossref_primary_10_1109_ACCESS_2019_2919150
crossref_primary_10_1080_10447318_2024_2415750
crossref_primary_10_4236_sn_2018_72008
crossref_primary_10_1016_j_digbus_2020_100001
crossref_primary_10_3233_JCS_181253
crossref_primary_10_1007_s10611_021_09993_8
crossref_primary_10_3390_fi11040089
crossref_primary_10_1016_j_cose_2017_10_008
crossref_primary_10_1109_ACCESS_2022_3162594
crossref_primary_10_4018_JGIM_293290
crossref_primary_10_3390_s22228663
crossref_primary_10_55056_ed_778
crossref_primary_10_1016_j_jisa_2023_103501
crossref_primary_10_1016_j_cose_2023_103207
crossref_primary_10_1109_MNET_105_2100425
crossref_primary_10_22394_1726_1139_2022_2_123_138
crossref_primary_10_2139_ssrn_2467423
crossref_primary_10_1109_ACCESS_2020_3048839
crossref_primary_10_1002_spy2_73
crossref_primary_10_1007_s12243_020_00785_0
crossref_primary_10_1016_j_cose_2024_104137
crossref_primary_10_1109_ACCESS_2022_3191790
crossref_primary_10_3390_s21206814
crossref_primary_10_1002_ett_4876
crossref_primary_10_1016_j_knosys_2022_108709
crossref_primary_10_1080_08874417_2023_2185551
crossref_primary_10_1108_OCJ_03_2021_0006
crossref_primary_10_1109_ACCESS_2021_3051633
crossref_primary_10_1016_j_cose_2017_02_006
crossref_primary_10_1016_j_procs_2021_01_103
crossref_primary_10_31185_wjcm_48
crossref_primary_10_1080_23742917_2025_2454620
crossref_primary_10_1109_ACCESS_2024_3403197
crossref_primary_10_1109_TNSM_2020_3037050
crossref_primary_10_28925_2663_4023_2020_8_165173
crossref_primary_10_1016_j_bushor_2018_02_001
crossref_primary_10_1016_j_procs_2019_09_241
crossref_primary_10_1111_jpim_12545
Cites_doi 10.1080/19393550802623214
10.1037/h0025325
10.1080/01449290903121386
10.1007/978-3-662-44208-1_22
10.1037/h0047855
10.1080/00049537108254613
10.1108/09685220810920549
10.1201/1086.1065898X/46353.15.4.20060901/95427.3
10.1108/18347641211272731
10.1177/0146167205279904
10.1016/j.techsoc.2010.07.001
10.1080/0144929X.2013.763860
10.1016/j.dss.2003.11.004
10.1145/1290958.1290968
10.1177/0146167285111004
10.1016/j.cose.2015.09.001
10.1037/h0041109
ContentType Journal Article
Copyright 2016 Elsevier Ltd
Copyright Elsevier Sequoia S.A. Jun 2016
Copyright_xml – notice: 2016 Elsevier Ltd
– notice: Copyright Elsevier Sequoia S.A. Jun 2016
DBID AAYXX
CITATION
7SC
8FD
JQ2
K7.
L7M
L~C
L~D
DOI 10.1016/j.cose.2016.03.004
DatabaseName CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
ProQuest Criminal Justice (Alumni)
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
ProQuest Criminal Justice (Alumni)
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList ProQuest Criminal Justice (Alumni)
Computer and Information Systems Abstracts

DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
Engineering
EISSN 1872-6208
EndPage 209
ExternalDocumentID 4050287571
10_1016_j_cose_2016_03_004
S0167404816300268
Genre Feature
GroupedDBID --K
--M
-~X
.DC
.~1
0R~
1B1
1RT
1~.
1~5
29F
4.4
457
4G.
5GY
5VS
7-5
71M
8P~
9JN
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AAXUO
AAYFN
ABBOA
ABFSI
ABMAC
ABXDB
ABYKQ
ACDAQ
ACGFO
ACGFS
ACNNM
ACRLP
ACZNC
ADBBV
ADEZE
ADHUB
ADJOM
ADMUD
AEBSH
AEKER
AENEX
AFFNX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
ASPBG
AVWKF
AXJTR
AZFZN
BKOJK
BKOMP
BLXMC
CS3
DU5
E.L
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-2
G-Q
GBLVA
GBOLZ
HLX
HLZ
HVGLF
HZ~
IHE
J1W
KOM
LG8
LG9
M41
MO0
MS~
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
PQQKQ
Q38
R2-
RIG
RNS
ROL
RPZ
RXW
SBC
SBM
SDF
SDG
SDP
SES
SEW
SPC
SPCBC
SSV
SSZ
T5K
TAE
TN5
TWZ
WH7
WUQ
XJE
XPP
XSW
YK3
ZMT
~G-
AATTM
AAXKI
AAYWO
AAYXX
ABJNI
ABWVN
ACRPL
ACVFH
ADCNI
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AFXIZ
AGCQF
AGQPQ
AGRNS
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
BNPGV
CITATION
SSH
7SC
8FD
EFKBS
JQ2
K7.
L7M
L~C
L~D
ID FETCH-LOGICAL-c361t-13b91a030ccd591bed4d2beb558272a37e2305d1152b86609c7add5bd405c2203
IEDL.DBID AIKHN
ISSN 0167-4048
IngestDate Thu Sep 04 16:57:56 EDT 2025
Fri Jul 25 04:59:23 EDT 2025
Thu Apr 24 23:05:00 EDT 2025
Tue Jul 01 03:48:13 EDT 2025
Fri Feb 23 02:33:37 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords Unidirectional communication
Social engineering attack framework
Bidirectional communication
Social engineering
Social engineering attack detection model
Social engineering attack templates
Social engineering attack examples
Indirect communication
Mitnick's attack cycle
Social engineering attack scenario
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c361t-13b91a030ccd591bed4d2beb558272a37e2305d1152b86609c7add5bd405c2203
Notes SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 14
ObjectType-Article-1
ObjectType-Feature-2
content type line 23
ORCID 0000-0001-8804-7601
PQID 1787762304
PQPubID 46289
PageCount 24
ParticipantIDs proquest_miscellaneous_1816031155
proquest_journals_1787762304
crossref_citationtrail_10_1016_j_cose_2016_03_004
crossref_primary_10_1016_j_cose_2016_03_004
elsevier_sciencedirect_doi_10_1016_j_cose_2016_03_004
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate June 2016
2016-06-00
20160601
PublicationDateYYYYMMDD 2016-06-01
PublicationDate_xml – month: 06
  year: 2016
  text: June 2016
PublicationDecade 2010
PublicationPlace Amsterdam
PublicationPlace_xml – name: Amsterdam
PublicationTitle Computers & security
PublicationYear 2016
Publisher Elsevier Ltd
Elsevier Sequoia S.A
Publisher_xml – name: Elsevier Ltd
– name: Elsevier Sequoia S.A
References Ivaturi, Janczewski (bib0130) 2011
Mohd Foozy, Ahmad, Abdollah, Yusof, Mas'ud (bib0205) 2011
Mouton, Malan, Kimppa, Venter (bib0235) 2015; 55
Jagatic, Johnson, Jakobsson, Menczer (bib0135) 2007; 50
Peltier (bib0250) 2006; 15
Tetri, Vuorinen (bib0290) 2013; 32
Major (bib0195) 2009; 18
Åhlfeldt, Backlund, Wangler, Söderström (bib0015) 2005
Mouton, Malan, Venter (bib0215) 2013
Brody, Brizzee, Cano (bib0030) 2012; 20
Greitzer, Strozer, Cohen, Bergey, Cowley, Moore (bib0090) 2014
Long (bib0185) 2011
Hadnagy (bib0100) 2010
Hamill, Deckro, Kloeber (bib0105) 2005; 39
Lott, Lott (bib0190) 1961; 62
Tam, Glassman, Vandenwauver (bib0285) 2010; 29
Esmail (bib0070) 2015; 6
Stasiukonis (bib0275) 2006
Workman (bib0300) 2008; 16
Dimkov, van Cleeff, Pieters, Hartel (bib0060) 2010
Mouton, Leenen, Malan, Venter (bib0220) 2014
Schrittwieser, Frühwirt, Kieseberg, Leithner, Mulazzani, Huber (bib0265) 2012
Jetten, Hornsey, Adarves-Yorno (bib0150) 2006; 32
Gruschka, Jensen (bib0095) 2010
Rao, Nayak (bib0255) 2014
CERT Insider Threat Team (bib0040) 2013
Mitnick, Simon (bib0200) 2002
Nohlberg (bib0240) 2008
Mouton, Leenen, Venter (bib0230) 2015
Abraham, Chengalur-Smith (bib0010) 2010; 32
Bader, Anjomshoaa, Tjoa (bib0020) 2010
Krombholz, Hobel, Huber, Weippl (bib0170) 2013
Kieseberg, Leithner, Mulazzani, Munroe, Schrittwieser, Sinha (bib0160) 2010
Salem, Hossain, Kamala (bib0260) 2010
Mouton, Malan, Venter (bib0210) 2012
Granger (bib0080) 2001
Dittes, Kelley (bib0065) 1956; 53
Jahankhani (bib0140) 2012; 7
Brainard, Juels, Rivest, Szydlo, Yung (bib0025) 2006
Janczewski, Fu (bib0145) 2010
Symantec Security Response (bib0280) 2014
Dang (bib0055) 2008; 1
Laribee (bib0175) 2006
Hill (bib0115) 1971; 23
Gerard, Wilhelmy, Conolley (bib0075) 1968; 8
Zeltser (bib0305) 2009
Harley (bib0110) 1998
Brown, Howe, Ihbe, Prakash, Borders (bib0035) 2008
Greitzer, Strozer, Cohen, Moore, Mundie, Cowley (bib0085) 2014
Culpepper (bib0050) 2004
Lenkart (bib0180) 2011
Mouton, Malan, Leenen, Venter (bib0225) 2014
Noy, McGuinness (bib0245) 2001
CERT Insider Threat Team (bib0045) 2014
Simon (bib0270) 1957
Irani, Balduzzi, Balzarotti, Kirda, Pu (bib0125) 2011
Jodeit, Johns (bib0155) 2010
Thornburgh (bib0295) 2004
Insko, Smith, Alicke, Wade, Taylor (bib0120) 1985; 11
Kingsley Ezechi (bib0165) 2011
Dang (10.1016/j.cose.2016.03.004_bib0055) 2008; 1
Jagatic (10.1016/j.cose.2016.03.004_bib0135) 2007; 50
CERT Insider Threat Team (10.1016/j.cose.2016.03.004_bib0040)
Noy (10.1016/j.cose.2016.03.004_bib0245) 2001
Harley (10.1016/j.cose.2016.03.004_bib0110) 1998
Jetten (10.1016/j.cose.2016.03.004_bib0150) 2006; 32
Stasiukonis (10.1016/j.cose.2016.03.004_bib0275)
Dimkov (10.1016/j.cose.2016.03.004_bib0060)
Long (10.1016/j.cose.2016.03.004_bib0185) 2011
Lott (10.1016/j.cose.2016.03.004_bib0190) 1961; 62
Schrittwieser (10.1016/j.cose.2016.03.004_bib0265) 2012
Bader (10.1016/j.cose.2016.03.004_bib0020) 2010
Dittes (10.1016/j.cose.2016.03.004_bib0065) 1956; 53
Mouton (10.1016/j.cose.2016.03.004_bib0210) 2012
Kingsley Ezechi (10.1016/j.cose.2016.03.004_bib0165)
Rao (10.1016/j.cose.2016.03.004_bib0255) 2014
Salem (10.1016/j.cose.2016.03.004_bib0260) 2010
Symantec Security Response (10.1016/j.cose.2016.03.004_bib0280)
Insko (10.1016/j.cose.2016.03.004_bib0120) 1985; 11
CERT Insider Threat Team (10.1016/j.cose.2016.03.004_bib0045)
Mouton (10.1016/j.cose.2016.03.004_bib0215) 2013
Workman (10.1016/j.cose.2016.03.004_bib0300) 2008; 16
Mohd Foozy (10.1016/j.cose.2016.03.004_bib0205) 2011
Simon (10.1016/j.cose.2016.03.004_bib0270) 1957
Tam (10.1016/j.cose.2016.03.004_bib0285) 2010; 29
Granger (10.1016/j.cose.2016.03.004_bib0080)
Nohlberg (10.1016/j.cose.2016.03.004_bib0240) 2008
Jodeit (10.1016/j.cose.2016.03.004_bib0155) 2010
Mouton (10.1016/j.cose.2016.03.004_bib0220) 2014
Zeltser (10.1016/j.cose.2016.03.004_bib0305)
Hill (10.1016/j.cose.2016.03.004_bib0115) 1971; 23
Janczewski (10.1016/j.cose.2016.03.004_bib0145) 2010
Gerard (10.1016/j.cose.2016.03.004_bib0075) 1968; 8
Hadnagy (10.1016/j.cose.2016.03.004_bib0100) 2010
Irani (10.1016/j.cose.2016.03.004_bib0125) 2011
Mitnick (10.1016/j.cose.2016.03.004_bib0200) 2002
Abraham (10.1016/j.cose.2016.03.004_bib0010) 2010; 32
Krombholz (10.1016/j.cose.2016.03.004_bib0170)
Esmail (10.1016/j.cose.2016.03.004_bib0070) 2015; 6
Mouton (10.1016/j.cose.2016.03.004_bib0235) 2015; 55
Brown (10.1016/j.cose.2016.03.004_bib0035)
Hamill (10.1016/j.cose.2016.03.004_bib0105) 2005; 39
Laribee (10.1016/j.cose.2016.03.004_bib0175) 2006
Major (10.1016/j.cose.2016.03.004_bib0195) 2009; 18
Brainard (10.1016/j.cose.2016.03.004_bib0025)
Culpepper (10.1016/j.cose.2016.03.004_bib0050) 2004
Kieseberg (10.1016/j.cose.2016.03.004_bib0160)
Lenkart (10.1016/j.cose.2016.03.004_bib0180)
Ivaturi (10.1016/j.cose.2016.03.004_bib0130) 2011
Åhlfeldt (10.1016/j.cose.2016.03.004_bib0015) 2005
Mouton (10.1016/j.cose.2016.03.004_bib0230) 2015
Peltier (10.1016/j.cose.2016.03.004_bib0250) 2006; 15
Tetri (10.1016/j.cose.2016.03.004_bib0290) 2013; 32
Greitzer (10.1016/j.cose.2016.03.004_bib0085) 2014
Greitzer (10.1016/j.cose.2016.03.004_bib0090) 2014
Mouton (10.1016/j.cose.2016.03.004_bib0225) 2014
Jahankhani (10.1016/j.cose.2016.03.004_bib0140) 2012; 7
Thornburgh (10.1016/j.cose.2016.03.004_bib0295)
Brody (10.1016/j.cose.2016.03.004_bib0030) 2012; 20
Gruschka (10.1016/j.cose.2016.03.004_bib0095)
References_xml – year: 2012
  ident: bib0265
  article-title: Guess who's texting you? Evaluating the security of smartphone messaging applications
– volume: 29
  start-page: 233
  year: 2010
  end-page: 244
  ident: bib0285
  article-title: The psychology of password management: a tradeoff between security and convenience
  publication-title: Behav Inf Technol
– year: 2006
  ident: bib0175
  article-title: Development of methodical social engineering taxonomy project
– volume: 50
  start-page: 94
  year: 2007
  end-page: 100
  ident: bib0135
  article-title: Social phishing
  publication-title: Commun ACM
– start-page: 46
  year: 2010
  end-page: 52
  ident: bib0155
  article-title: USB device drivers: a stepping stone into your kernel
– year: 2006
  ident: bib0275
  article-title: Social engineering, the usb way
– year: 2010
  ident: bib0020
  article-title: Privacy aspects of mashup architecture
– volume: 20
  start-page: 335
  year: 2012
  end-page: 347
  ident: bib0030
  article-title: Flying under the radar: social engineering
  publication-title: Int J Account Inf Manage
– volume: 7
  start-page: 79
  year: 2012
  end-page: 90
  ident: bib0140
  article-title: The behaviour and perceptions of on-line consumers: risk, risk perception and trust
  publication-title: Int J Inf Sci Manage
– start-page: 1418
  year: 2010
  end-page: 1423
  ident: bib0260
  article-title: Awareness program and AI based tool to reduce risk of phishing attacks
– volume: 32
  start-page: 1014
  year: 2013
  end-page: 1023
  ident: bib0290
  article-title: Dissecting social engineering
  publication-title: Behav Inf Technol
– year: 1957
  ident: bib0270
  article-title: Models of man; social and rational
– volume: 6
  year: 2015
  ident: bib0070
  article-title: eps1.5_br4ve-trave1er.asf , mr. Robot: Season 1
  publication-title: Episode
– volume: 1
  start-page: 4
  year: 2008
  end-page: 9
  ident: bib0055
  article-title: The origins of social engineering
  publication-title: McAfee Secur J
– year: 2013
  ident: bib0170
  article-title: Social engineering attacks on the knowledge worker
– year: 2009
  ident: bib0305
  article-title: Malware infection that began with windshield fliers
– year: 2008
  ident: bib0240
  article-title: Securing information assets: understanding, measuring and protecting against social engineering attacks
– year: 2011
  ident: bib0185
  article-title: No tech hacking: a guide to social engineering, dumpster diving, and shoulder surfing
– year: 2014
  ident: bib0045
  article-title: Unintentional insider threats: social engineering
– start-page: 236
  year: 2014
  end-page: 250
  ident: bib0085
  article-title: Analysis of unintentional insider threats deriving from social engineering exploits
– start-page: 216
  year: 2015
  end-page: 223
  ident: bib0230
  article-title: Social engineering attack detection model: SEADMv2
– start-page: 847
  year: 2010
  end-page: 853
  ident: bib0145
  article-title: Social engineering-based attacks: model and New Zealand perspective
– year: 2010
  ident: bib0100
  article-title: Social engineering: the art of human hacking
– year: 2002
  ident: bib0200
  article-title: The art of deception: controlling the human element of security
– volume: 39
  start-page: 463
  year: 2005
  end-page: 484
  ident: bib0105
  article-title: Evaluating information assurance strategies
  publication-title: Decis Support Syst
– year: 2006
  ident: bib0025
  article-title: Fourth-factor authentication: somebody you know
– start-page: 55
  year: 2011
  end-page: 74
  ident: bib0125
  article-title: Reverse social engineering attacks in online social networks
  publication-title: Detection of intrusions and malware, and vulnerability assessment, vol. 6739 of lecture notes in computer science
– year: 2011
  ident: bib0180
  article-title: The vulnerability of social networking media and the insider threat new eyes for bad guys
– volume: 32
  start-page: 162
  year: 2006
  end-page: 173
  ident: bib0150
  article-title: When group members admit to being conformist: the role of relative intragroup status in conformity self-reports
  publication-title: Pers Soc Psychol Bull
– volume: 32
  start-page: 183
  year: 2010
  end-page: 196
  ident: bib0010
  article-title: An overview of social engineering malware: trends, tactics, and implications
  publication-title: Technol Soc
– volume: 55
  start-page: 114
  year: 2015
  end-page: 127
  ident: bib0235
  article-title: Necessity for ethics in social engineering research
  publication-title: Comput Secur
– start-page: 2025
  year: 2014
  end-page: 2034
  ident: bib0090
  article-title: Unintentional insider threat: contributing factors, observables, and mitigation strategies
– start-page: 40
  year: 2012
  end-page: 51
  ident: bib0210
  article-title: Development of cognitive functioning psychological measures for the SEADM
– year: 2004
  ident: bib0050
  article-title: Effectiveness of using red teams to identify maritime security vulnerabilities to terrorist attack
– start-page: 266
  year: 2014
  end-page: 279
  ident: bib0220
  article-title: Towards an ontological model defining the social engineering domain
  publication-title: ICT and society, vol. 431 of IFIP advances in information and communication technology
– year: 2011
  ident: bib0165
  article-title: Detecting and combating malware
– volume: 8
  start-page: 79
  year: 1968
  end-page: 82
  ident: bib0075
  article-title: Conformity and group size
  publication-title: J Pers Soc Psychol
– volume: 18
  start-page: 40
  year: 2009
  end-page: 46
  ident: bib0195
  article-title: Social engineering: hacking the wetware!
  publication-title: Inf Secur J Global Persp
– start-page: 1
  year: 2014
  end-page: 9
  ident: bib0225
  article-title: Social engineering attack framework
– volume: 23
  start-page: 189
  year: 1971
  end-page: 199
  ident: bib0115
  article-title: Peer group conformity in adolescent smoking and its relationship to affiliation and autonomy needs
  publication-title: Aust J Psychol
– volume: 16
  start-page: 463
  year: 2008
  end-page: 483
  ident: bib0300
  article-title: A test of interventions for security threats from social engineering
  publication-title: Inf Manage Comput Secur
– start-page: 1
  year: 2011
  end-page: 7
  ident: bib0205
  article-title: Generic taxonomy of social engineering attack
– start-page: 1
  year: 2013
  end-page: 8
  ident: bib0215
  article-title: Social engineering from a normative ethics perspective
– year: 2001
  ident: bib0245
  article-title: Ontology development 101: a guide to creating your first ontology
– volume: 53
  start-page: 100
  year: 1956
  end-page: 107
  ident: bib0065
  article-title: Effects of different conditions of acceptance upon conformity to group norms
  publication-title: J Abnorm Soc Psychol
– year: 2010
  ident: bib0095
  article-title: Attack surfaces: a taxonomy for attacks on cloud services
– start-page: 1
  year: 2005
  end-page: 4
  ident: bib0015
  article-title: Security issues in health care process integration? A research-in-progress report
– year: 2010
  ident: bib0160
  article-title: QR code security
– volume: 11
  start-page: 41
  year: 1985
  end-page: 50
  ident: bib0120
  article-title: Conformity and group size the concern with being right and the concern with being liked
  publication-title: Pers Soc Psychol Bull
– year: 2004
  ident: bib0295
  article-title: Social engineering: the “dark art”
– start-page: 1
  year: 2011
  end-page: 12
  ident: bib0130
  article-title: A taxonomy for social engineering attacks
– year: 2013
  ident: bib0040
  article-title: Unintentional insider threats: a foundational study
– year: 2001
  ident: bib0080
  article-title: Social engineering fundamentals, part i: Hacker tactics
– year: 2010
  ident: bib0060
  article-title: Two methodologies for physical penetration testing using social engineering
– start-page: 307
  year: 2014
  end-page: 323
  ident: bib0255
  article-title: Social engineering
  publication-title: The InfoSec handbook
– year: 2008
  ident: bib0035
  article-title: Social networks and context-aware spam
– year: 2014
  ident: bib0280
  article-title: Francophoned? a sophisticated social engineering attack
– start-page: 4
  year: 1998
  end-page: 29
  ident: bib0110
  article-title: Re-floating the titanic: dealing with social engineering attacks
– volume: 62
  start-page: 408
  year: 1961
  end-page: 412
  ident: bib0190
  article-title: Group cohesiveness, communication level, and conformity
  publication-title: J Abnorm Soc Psychol
– volume: 15
  start-page: 13
  year: 2006
  end-page: 21
  ident: bib0250
  article-title: Social engineering: concepts and solutions
  publication-title: Inf Syst Secur
– volume: 18
  start-page: 40
  issue: 1
  year: 2009
  ident: 10.1016/j.cose.2016.03.004_bib0195
  article-title: Social engineering: hacking the wetware!
  publication-title: Inf Secur J Global Persp
  doi: 10.1080/19393550802623214
– year: 2004
  ident: 10.1016/j.cose.2016.03.004_bib0050
– volume: 8
  start-page: 79
  issue: 1p1
  year: 1968
  ident: 10.1016/j.cose.2016.03.004_bib0075
  article-title: Conformity and group size
  publication-title: J Pers Soc Psychol
  doi: 10.1037/h0025325
– volume: 29
  start-page: 233
  issue: 3
  year: 2010
  ident: 10.1016/j.cose.2016.03.004_bib0285
  article-title: The psychology of password management: a tradeoff between security and convenience
  publication-title: Behav Inf Technol
  doi: 10.1080/01449290903121386
– start-page: 40
  year: 2012
  ident: 10.1016/j.cose.2016.03.004_bib0210
– ident: 10.1016/j.cose.2016.03.004_bib0045
– ident: 10.1016/j.cose.2016.03.004_bib0060
– start-page: 266
  year: 2014
  ident: 10.1016/j.cose.2016.03.004_bib0220
  article-title: Towards an ontological model defining the social engineering domain
  doi: 10.1007/978-3-662-44208-1_22
– year: 2011
  ident: 10.1016/j.cose.2016.03.004_bib0185
– year: 2008
  ident: 10.1016/j.cose.2016.03.004_bib0240
– volume: 53
  start-page: 100
  issue: 1
  year: 1956
  ident: 10.1016/j.cose.2016.03.004_bib0065
  article-title: Effects of different conditions of acceptance upon conformity to group norms
  publication-title: J Abnorm Soc Psychol
  doi: 10.1037/h0047855
– start-page: 46
  year: 2010
  ident: 10.1016/j.cose.2016.03.004_bib0155
– year: 2006
  ident: 10.1016/j.cose.2016.03.004_bib0175
– start-page: 55
  year: 2011
  ident: 10.1016/j.cose.2016.03.004_bib0125
  article-title: Reverse social engineering attacks in online social networks
– year: 2002
  ident: 10.1016/j.cose.2016.03.004_bib0200
– start-page: 1
  year: 2011
  ident: 10.1016/j.cose.2016.03.004_bib0130
– volume: 23
  start-page: 189
  issue: 2
  year: 1971
  ident: 10.1016/j.cose.2016.03.004_bib0115
  article-title: Peer group conformity in adolescent smoking and its relationship to affiliation and autonomy needs
  publication-title: Aust J Psychol
  doi: 10.1080/00049537108254613
– volume: 16
  start-page: 463
  issue: 5
  year: 2008
  ident: 10.1016/j.cose.2016.03.004_bib0300
  article-title: A test of interventions for security threats from social engineering
  publication-title: Inf Manage Comput Secur
  doi: 10.1108/09685220810920549
– ident: 10.1016/j.cose.2016.03.004_bib0095
– volume: 15
  start-page: 13
  issue: 5
  year: 2006
  ident: 10.1016/j.cose.2016.03.004_bib0250
  article-title: Social engineering: concepts and solutions
  publication-title: Inf Syst Secur
  doi: 10.1201/1086.1065898X/46353.15.4.20060901/95427.3
– volume: 20
  start-page: 335
  issue: 4
  year: 2012
  ident: 10.1016/j.cose.2016.03.004_bib0030
  article-title: Flying under the radar: social engineering
  publication-title: Int J Account Inf Manage
  doi: 10.1108/18347641211272731
– start-page: 1
  year: 2014
  ident: 10.1016/j.cose.2016.03.004_bib0225
– ident: 10.1016/j.cose.2016.03.004_bib0280
– year: 2012
  ident: 10.1016/j.cose.2016.03.004_bib0265
– ident: 10.1016/j.cose.2016.03.004_bib0040
– year: 2010
  ident: 10.1016/j.cose.2016.03.004_bib0100
– start-page: 307
  year: 2014
  ident: 10.1016/j.cose.2016.03.004_bib0255
  article-title: Social engineering
– start-page: 236
  year: 2014
  ident: 10.1016/j.cose.2016.03.004_bib0085
– volume: 32
  start-page: 162
  issue: 2
  year: 2006
  ident: 10.1016/j.cose.2016.03.004_bib0150
  article-title: When group members admit to being conformist: the role of relative intragroup status in conformity self-reports
  publication-title: Pers Soc Psychol Bull
  doi: 10.1177/0146167205279904
– ident: 10.1016/j.cose.2016.03.004_bib0025
– start-page: 2025
  year: 2014
  ident: 10.1016/j.cose.2016.03.004_bib0090
– start-page: 1
  year: 2005
  ident: 10.1016/j.cose.2016.03.004_bib0015
– volume: 1
  start-page: 4
  issue: 1
  year: 2008
  ident: 10.1016/j.cose.2016.03.004_bib0055
  article-title: The origins of social engineering
  publication-title: McAfee Secur J
– start-page: 4
  year: 1998
  ident: 10.1016/j.cose.2016.03.004_bib0110
– start-page: 1
  year: 2011
  ident: 10.1016/j.cose.2016.03.004_bib0205
– year: 1957
  ident: 10.1016/j.cose.2016.03.004_bib0270
– start-page: 216
  year: 2015
  ident: 10.1016/j.cose.2016.03.004_bib0230
– volume: 6
  year: 2015
  ident: 10.1016/j.cose.2016.03.004_bib0070
  article-title: eps1.5_br4ve-trave1er.asf , mr. Robot: Season 1
  publication-title: Episode
– volume: 32
  start-page: 183
  issue: 3
  year: 2010
  ident: 10.1016/j.cose.2016.03.004_bib0010
  article-title: An overview of social engineering malware: trends, tactics, and implications
  publication-title: Technol Soc
  doi: 10.1016/j.techsoc.2010.07.001
– volume: 32
  start-page: 1014
  issue: 10
  year: 2013
  ident: 10.1016/j.cose.2016.03.004_bib0290
  article-title: Dissecting social engineering
  publication-title: Behav Inf Technol
  doi: 10.1080/0144929X.2013.763860
– ident: 10.1016/j.cose.2016.03.004_bib0305
– volume: 39
  start-page: 463
  issue: 3
  year: 2005
  ident: 10.1016/j.cose.2016.03.004_bib0105
  article-title: Evaluating information assurance strategies
  publication-title: Decis Support Syst
  doi: 10.1016/j.dss.2003.11.004
– ident: 10.1016/j.cose.2016.03.004_bib0035
– start-page: 1
  year: 2013
  ident: 10.1016/j.cose.2016.03.004_bib0215
– start-page: 847
  year: 2010
  ident: 10.1016/j.cose.2016.03.004_bib0145
– ident: 10.1016/j.cose.2016.03.004_bib0180
– start-page: 1418
  year: 2010
  ident: 10.1016/j.cose.2016.03.004_bib0260
– ident: 10.1016/j.cose.2016.03.004_bib0295
– volume: 50
  start-page: 94
  issue: 10
  year: 2007
  ident: 10.1016/j.cose.2016.03.004_bib0135
  article-title: Social phishing
  publication-title: Commun ACM
  doi: 10.1145/1290958.1290968
– ident: 10.1016/j.cose.2016.03.004_bib0160
– volume: 11
  start-page: 41
  issue: 1
  year: 1985
  ident: 10.1016/j.cose.2016.03.004_bib0120
  article-title: Conformity and group size the concern with being right and the concern with being liked
  publication-title: Pers Soc Psychol Bull
  doi: 10.1177/0146167285111004
– ident: 10.1016/j.cose.2016.03.004_bib0275
– year: 2010
  ident: 10.1016/j.cose.2016.03.004_bib0020
– volume: 7
  start-page: 79
  issue: 1
  year: 2012
  ident: 10.1016/j.cose.2016.03.004_bib0140
  article-title: The behaviour and perceptions of on-line consumers: risk, risk perception and trust
  publication-title: Int J Inf Sci Manage
– volume: 55
  start-page: 114
  year: 2015
  ident: 10.1016/j.cose.2016.03.004_bib0235
  article-title: Necessity for ethics in social engineering research
  publication-title: Comput Secur
  doi: 10.1016/j.cose.2015.09.001
– ident: 10.1016/j.cose.2016.03.004_bib0080
– ident: 10.1016/j.cose.2016.03.004_bib0170
– ident: 10.1016/j.cose.2016.03.004_bib0165
– volume: 62
  start-page: 408
  issue: 2
  year: 1961
  ident: 10.1016/j.cose.2016.03.004_bib0190
  article-title: Group cohesiveness, communication level, and conformity
  publication-title: J Abnorm Soc Psychol
  doi: 10.1037/h0041109
– year: 2001
  ident: 10.1016/j.cose.2016.03.004_bib0245
SSID ssj0017688
Score 2.4610107
Snippet The field of information security is a fast-growing discipline. Even though the effectiveness of security measures to protect sensitive information is...
SourceID proquest
crossref
elsevier
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 186
SubjectTerms Bidirectional communication
Computer information security
Data integrity
Engineering
Human
Indirect communication
Intrusion detection systems
Leaking of information
Links
Manipulation
Mapping
Mitnick's attack cycle
Social engineering
Social engineering attack detection model
Social engineering attack examples
Social engineering attack framework
Social engineering attack scenario
Social engineering attack templates
Studies
Unidirectional communication
Title Social engineering attack examples, templates and scenarios
URI https://dx.doi.org/10.1016/j.cose.2016.03.004
https://www.proquest.com/docview/1787762304
https://www.proquest.com/docview/1816031155
Volume 59
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1NS8QwEB3W9eLFb_GbCN60bpM03QZPIi6rohcVvIU0iaAuXXFX8ORvd2abrijowUuhTULLNPMyIW_eAOxzabOcP2SJfuAuwRXfJtpajXM5DTKgazpOicJX13n_Lru4V_ctOG1yYYhWGbG_xvQJWscnnWjNzsvjY-dmQqAnuRNSjRJ5MQOzQupctWH25Pyyfz09TMCIuphKfOOAmDtT07yIFk4Mr7zWOs1-W59-IPVk-ektwnyMG9lJ_WlL0ArVMiw0NRlYdNEVOK7zbVn40hlkdjy27pmFd0tSwKNDRnpUAwoyma08Iz0n3DEPR6tw1zu7Pe0nsUBC4mTOqYx8qblFN3XOK83L4DMvylAqVYiusLIbcIOhPAZ9oizyPNWui3CmSo9RmhMilWvQroZVWAdGGxuhCu_TTGZ4sWUqghVeSyWtFt0N4I1ZjIvq4VTEYmAamtiTIVMaMqVJpUFTbsDBdMxLrZ3xZ2_VWNt8mwEGwf3PcdvNrzHR_0aGIw4hzEtq3ps2o-fQcYitwvAN-xSTEtsYUG3-89VbMEd3NXNsG9rj17ewgzHKuNyFmaMPvhtn4ifZSuNs
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwELagDLDwRjwKGIkNQmM7zkNMCFGVR7sAUjfLsV2Jh1JEW4mJ385d4hSBRAeWDLGtRGff57P83XeEHDOho5gNoiAbMBPAjq-DTOsM1nLohAPXNAwThbu9uPMY3fRlf45c1rkwSKv02F9heonW_k3LW7P19vTUui8J9Ch3gqpRPE7nyUIkRYK8vrPPKc-DQTydTgW-obvPnKlIXkgKR35XXCmdRn_tTr9wutx82qtk2UeN9KL6sTUy54p1slJXZKDeQTfIeZVtS923yiDV47E2L9R9aBQCHp1SVKN6xRCT6sJSVHOC8_JwtEke21cPl53Al0cIjIgZFpHPM6bBSY2xMmO5s5HluculTHnCtUgcHC-khZCP52kch5lJAMxkbiFGM5yHYos0imHhtgnFYw2XqbVhJCJ46DzkTnObCSl0xpMdwmqzKOO1w7GExauqSWLPCk2p0JQqFApMuUNOpmPeKuWMmb1lbW31Y_4VQPvMcc16apT3vpFigEIA8gKbj6bN4Dd4GaILN5xAn7QssA3h1O4_P31IFjsP3Tt1d9273SNL2FJxyJqkMX6fuH2IVsb5QbkavwC_f-Q3
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Social+engineering+attack+examples%2C+templates+and+scenarios&rft.jtitle=Computers+%26+security&rft.au=Mouton%2C+Francois&rft.au=Leenen%2C+Louise&rft.au=Venter%2C+HS&rft.date=2016-06-01&rft.pub=Elsevier+Sequoia+S.A&rft.issn=0167-4048&rft.eissn=1872-6208&rft.volume=59&rft.spage=186&rft_id=info:doi/10.1016%2Fj.cose.2016.03.004&rft.externalDBID=NO_FULL_TEXT&rft.externalDocID=4050287571
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0167-4048&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0167-4048&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0167-4048&client=summon