This paper attempts to strengthen the pursued research on social engineering (SE) threat identification, and control, by means of the author’s illustrated classification, which includes attack types, determining the degree of possible harm to each types of possible, known attacks, countermeasures by types of threats that leads to loss of personal or corporate confidential information (user id, passwords, closed documentation). Further, this analytical study will become the starting point for deeper, practically oriented and tested research
Is data on this page outdated, violates copyrights or anything else? Report the problem now and we will take corresponding actions after reviewing your request.