Exploiting personality traits in social engineering attacks

Phishing attacks have become more sophisticated over time, more than any other forms of social engineering attacks, exploiting the end users’ vulnerabilities and weaknesses. This article reviews the literature regarding the connection between three personality models – Five Factor Model, Myers-Brigg...

Full description

Saved in:
Bibliographic Details
Published in:Revista română de informatică și automatică = Romanian journal of information technology and automatic control Vol. 32; no. 1; pp. 113 - 122
Main Authors: Irina CRISTESCU, Ella Magdalena CIUPERCĂ, Carmen Elena CÎRNU
Format: Journal Article
Language:English
Published: ICI Publishing House 01-03-2022
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Phishing attacks have become more sophisticated over time, more than any other forms of social engineering attacks, exploiting the end users’ vulnerabilities and weaknesses. This article reviews the literature regarding the connection between three personality models – Five Factor Model, Myers-Briggs Type Indicator and Dark Triad – and how they can be linked with the susceptibility of individuals to become targets of social engineering attacks. Thus, the focus on evaluating human vulnerabilities in the context of cyber security by identifying both the factors that influence the susceptibility to cyber-attacks, and the human characteristics/traits that can be exploited as a vulnerability in the context of cyber security attacks.
ISSN:1220-1758
1841-4303
DOI:10.33436/v32i1y202209