Abstract

In The context of Information technology and Cyber Security a nexus of computers and humans occurs as Social engineering. Defenders would like to know how this group interacts with users to gain access to secure information. The purpose of this research initially was to find out from Social Engineers what were the best defensive techniques. A survey was created to ask social engineers about specific defensive techniques that are prevalent in Cyber security. Not enough data was collected from social engineers and the second half of the paper covers why this was. One of the main reasons for lack of data was due to a lack of in-group trust of the researchers by the group being researched. Much of the theory behind the why has been applied to other groups in other fields.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call