Advanced Persistent Threats & Social Engineering

被引:0
|
作者
Weippl, Edgar [1 ]
机构
[1] Vienn Univ Technol, Secure Business Austria, Vienna, Austria
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Social Engineering has long been a very effective means of attacking information systems. The term knowledge worker has been coined by Peter Drucker more than 50 years ago and still describes very well the basic characteristics of many employees. Today, with current hypes such as BYOD (bring your own device) and public cloud services, young professionals expect to use the same technology both in their private life and while working. In global companies teams are no longer geographically co-located but staffed globally just-in-time. The decrease in personal interaction combined with the plethora of tools used (E-Mail, IM, Skype, Dropbox, Linked-In, Lync, etc.) create new opportunities for attackers. As recent attacks on companies such as the New York Times, RSA or Apple have shown, targeted spear-phishing attacks are an effective evolution of social engineering attacks. When combined with zero-day-exploits they become a dangerous weapon, often used by advanced persistent threats. In this talk we will explore some attack vectors and possible steps to mitigate the risk.
引用
收藏
页码:IS13 / IS13
页数:1
相关论文
共 50 条
  • [1] Advanced Persistent Threats & Social Engineering
    Weippl, Edgar
    [J]. 2014 11TH INTERNATIONAL CONFERENCE ON E-BUSINESS (ICE-B), 2014, : IS21 - IS21
  • [2] Social Engineering Based Security Requirements Elicitation Model for Advanced Persistent Threats
    Kim, Seung-Jun
    Lee, Seok-Won
    [J]. REQUIREMENTS ENGINEERING FOR INTERNET OF THINGS, 2018, 809 : 29 - 40
  • [3] Modeling social worm propagation for advanced persistent threats
    Zhou, Peng
    Gu, Xiaojing
    Nepal, Surya
    Zhou, Jianying
    [J]. COMPUTERS & SECURITY, 2021, 108
  • [4] Advanced Persistent Threats
    Ozzengin, Yavuz Selim
    Sakiz, Fatih
    Benzer, Recep
    [J]. 2016 24TH SIGNAL PROCESSING AND COMMUNICATION APPLICATION CONFERENCE (SIU), 2016, : 1845 - 1848
  • [5] Online Social Networking: A Source of Intelligence for Advanced Persistent Threats
    Molok, Nurul Nuha Abdul
    Ahmad, Atif
    Chang, Shanton
    [J]. INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2012, 2 (01) : 1 - 13
  • [6] A Study on Advanced Persistent Threats
    Chen, Ping
    Desmet, Lieven
    Huygens, Christophe
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, CMS 2014, 2014, 8735 : 63 - 72
  • [7] A Practical Study on Advanced Persistent Threats
    Jeun, Inkyung
    Lee, Youngsook
    Won, Dongho
    [J]. COMPUTER APPLICATIONS FOR SECURITY, CONTROL AND SYSTEM ENGINEERING, 2012, 339 : 144 - +
  • [8] Advanced Persistent Threats - Detection and Defense
    Vukalovic, J.
    Delija, D.
    [J]. 2015 8TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2015, : 1324 - 1330
  • [9] Advanced Persistent Threats in Autonomous Driving
    [J]. Kant, Krishna (kkant@temple.edu), 1600, Association for Computing Machinery, 2 Penn Plaza, Suite 701, New York, NY 10121-0701, United States (47):
  • [10] Advanced Persistent Threats: Behind the Scenes
    Ussath, Martin
    Jaeger, David
    Cheng, Feng
    Meinel, Christoph
    [J]. 2016 ANNUAL CONFERENCE ON INFORMATION SCIENCE AND SYSTEMS (CISS), 2016,