Publication:
Passive and Active Reconnaissance: A Social Engineering Case Study

dc.citedby1
dc.contributor.authorHidayah Zulkiffli S.N.en_US
dc.contributor.authorAhmad Zawawi M.N.en_US
dc.contributor.authorRahim F.A.en_US
dc.contributor.authorid57220806583en_US
dc.contributor.authorid56997510600en_US
dc.contributor.authorid57350579500en_US
dc.date.accessioned2023-05-29T08:08:13Z
dc.date.available2023-05-29T08:08:13Z
dc.date.issued2020
dc.descriptionInformation gathering; Social engineering; Social mediaen_US
dc.description.abstractLove scams, online scams and how absurd as it may seem, still causes people to lose their money. This issue happens because some people are still susceptible to social engineering. Our investigation attempts to find out how people could be exploited for this type of social engineering attack on social media. Social engineering could be categorized into passive and active reconnaissance. Our experiment involves individuals such as UNITEN students and Instafamous to find out if such attempts would deceive them. The methodology proposed is the attack cycle that consists of four steps: information gathering, establishing relationship and rapport, exploitation, and execution. This case study will also explore the possible uses of valuable information of target that can be gathered based on passive and active reconnaissance � 2020 IEEE.en_US
dc.description.natureFinalen_US
dc.identifier.ArtNo9243402
dc.identifier.doi10.1109/ICIMU49871.2020.9243402
dc.identifier.epage143
dc.identifier.scopus2-s2.0-85097645040
dc.identifier.spage138
dc.identifier.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-85097645040&doi=10.1109%2fICIMU49871.2020.9243402&partnerID=40&md5=8ef77ffb0b4366f5f2b7787748db4615
dc.identifier.urihttps://irepository.uniten.edu.my/handle/123456789/25329
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.sourceScopus
dc.sourcetitle2020 8th International Conference on Information Technology and Multimedia, ICIMU 2020
dc.titlePassive and Active Reconnaissance: A Social Engineering Case Studyen_US
dc.typeConference Paperen_US
dspace.entity.typePublication
Files
Collections