![]() Similarly, there is a rapid growth of numbers in mobile devices in the working environments and on most official occasions. The trend is going high due to an increase in Internet users. Network spoofing is becoming a common attack in wireless networks. ![]() ![]() Using stock and flow diagrams, we build a simulation model on Stella platform, analyze it and suggest possible solutions that business enterprises can take to implement measures through policy change. Causal loops are used to model the relationships of key parameters that contribute to cyber-attacks through social engineering through the patterns and behavior of social media users. We used analytical method to identify the key factors and parameters that cause social engineering attacks in businesses. In this paper we identify the dynamic pattern and behavior of social engineering both from within and without the business enterprises. Others are still trapped in the social engineering racket. Enterprises that have adopted the use of social media and emails to supplement on their marketing to complete business deals have been attacked or have detected attempted attacks on their infrastructure. The pervasive use of social media in small and medium enterprises has increased social engineering cyber-attacks.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |