Abstract
Social engineering attacks the weakest organizational security link - the human. The influx of employees using social media throughout the working environment has presented information security professionals with an extensive array of challenges facing people, process and technology. These challenges also show enormous impact on the confidentiality, integrity and availability of information assets residing within the organization. This paper aims to provide an in-depth insight into classification and mitigation of social engineering security issues faced by enterprises in adopting social media for business use.
Original language | English |
---|---|
Title of host publication | Proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2014 |
Editors | M Warren M Warren |
Place of Publication | Berlin |
Publisher | Springer-Verlag London Ltd. |
Pages | 243-255 |
Number of pages | 13 |
Volume | 490 |
ISBN (Electronic) | 9783662456699 |
DOIs | |
Publication status | Published - 2014 |
Event | International Conference on Applications and Techniques in Information Security (ATIS 2014) - Deakin University, Melbourne, Australia Duration: 26 Nov 2014 → 28 Nov 2014 http://atis2014.tulip.org.au/ |
Conference
Conference | International Conference on Applications and Techniques in Information Security (ATIS 2014) |
---|---|
Country/Territory | Australia |
City | Melbourne |
Period | 26/11/14 → 28/11/14 |
Internet address |