13 Citations (Scopus)

Abstract

Social engineering attacks the weakest organizational security link - the human. The influx of employees using social media throughout the working environment has presented information security professionals with an extensive array of challenges facing people, process and technology. These challenges also show enormous impact on the confidentiality, integrity and availability of information assets residing within the organization. This paper aims to provide an in-depth insight into classification and mitigation of social engineering security issues faced by enterprises in adopting social media for business use.
Original languageEnglish
Title of host publicationProceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2014
EditorsM Warren M Warren
Place of PublicationBerlin
PublisherSpringer-Verlag London Ltd.
Pages243-255
Number of pages13
Volume490
ISBN (Electronic)9783662456699
DOIs
Publication statusPublished - 2014
EventInternational Conference on Applications and Techniques in Information Security (ATIS 2014) - Deakin University, Melbourne, Australia
Duration: 26 Nov 201428 Nov 2014
http://atis2014.tulip.org.au/

Conference

ConferenceInternational Conference on Applications and Techniques in Information Security (ATIS 2014)
Country/TerritoryAustralia
CityMelbourne
Period26/11/1428/11/14
Internet address

Fingerprint

Dive into the research topics of 'Social Engineering through Social Media: An Investigation on Enterprise Security'. Together they form a unique fingerprint.

Cite this