Exploiting personality traits in social engineering attacks
Phishing attacks have become more sophisticated over time, more than any other forms of social engineering attacks, exploiting the end users’ vulnerabilities and weaknesses. This article reviews the literature regarding the connection between three personality models – Five Factor Model, Myers-Brigg...
Saved in:
Published in: | Revista română de informatică și automatică = Romanian journal of information technology and automatic control Vol. 32; no. 1; pp. 113 - 122 |
---|---|
Main Authors: | , , |
Format: | Journal Article |
Language: | English |
Published: |
ICI Publishing House
01-03-2022
|
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Phishing attacks have become more sophisticated over time, more than any other forms of social engineering attacks, exploiting the end users’ vulnerabilities and weaknesses. This article reviews the literature regarding the connection between three personality models – Five Factor Model, Myers-Briggs Type Indicator and Dark Triad – and how they can be linked with the susceptibility of individuals to become targets of social engineering attacks. Thus, the focus on evaluating human vulnerabilities in the context of cyber security by identifying both the factors that influence the susceptibility to cyber-attacks, and the human characteristics/traits that can be exploited as a vulnerability in the context of cyber security attacks. |
---|---|
ISSN: | 1220-1758 1841-4303 |
DOI: | 10.33436/v32i1y202209 |