References

Primary Sources

Average Cost of a Vacation. Value Penguin. Retrieved from https://www.valuepenguin.com/average-cost-vacation

 

Bakhshi, T. (2017). Social engineering: Revisiting end-user awareness and susceptibility to classic attack vectors. 2017 13th International Conference on Emerging Technologies (ICET) Retrieved from https://ieeexplore.ieee.org/document/8281653?denied=

 

Bean-Mellinger, B. (2019). The Average Cost Per Month for Office Supplies. Chron (Online). https://smallbusiness.chron.com/average-cost-per-month-office-supplies-12771.html

 

(2019). Consultant Salaries in 2019. Consulting.com. Retrieved from https://www.consulting.com/consultant-salaries

 

Cybersecurity and Infrastructure Security Agency (CISA). Avoiding Social Engineering and Phishing Attacks. Retrieved From: https://www.us-cert.gov/ncas/tips/ST04-014

Kaushalya, S.A.D.T.P. & Randeniya, R. M. R. S. B. & Liyanage, A. D. S. (2018). An Overview of Social Engineering in the Context of Social Security. 2018 IEEE 5th International Conference on Engineering Technologies and Applied Sciences (ICETAS). Retrieved from https://ieeexplore.ieee.org/document/8629126?denied=

(2017). How Much Does a Computer Programmer Make? U.S. News (Online). https://money.usnews.com/careers/best-jobs/computer-programmer/salary

(2018). How Much Might a Business Website Cost Today? Digital.com. Retrieved through https://digital.com/blog/how-much-does-website-cost/

(2014). How Much Do Startups Pay for Office Space? Priceonomics. Retrieved from https://priceonomics.com/how-much-do-startups-pay-for-office-space/

Stembert, N. et al. (2015). A Study of Preventing Email (Spear) Phishing by Enabling Human Intelligence. 2015 European Intelligence and Security Informatics Conference. Retrieved from: https://ieeexplore.ieee.org/document/7379731?denied=

 

Nyamsuren, E. & Ho-Jin Choi. (2007). Preventing Social Engineering in Ubiquitous Environment. Future Generation Communication and Networking (FGCN 2007). Retrieved from https://ieeexplore.ieee.org/document/4426307?denied=

 

Krombholz, K. Hobel, H. Huber, M. Wieppl, E. (June 2015). Advanced social engineering attacks. Journal of Information Security and Applications, Volume 22, pp. 113 – 122. Retrieved from: https://www.sciencedirect.com/science/article/pii/S2214212614001343

 

Lord, N. (January 2019). Social Engineering Attacks: Common Techniques & How to Prevent an

Attack. Digital Guardian. Retrieved From:

https://digitalguardian.com/blog/social-engineering-attacks-common-techniques-how-pre

vent-attack

 

Ruddy, R. (January, 2016). How to Prevent Social Engineering… You Can’t. Phoenix TS.

Retrieved From: https://phoenixts.com/blog/how-to-prevent-social-engineering-you-cant/

 

Olavsrud, T. (October 2010). 9 Best Defenses Against Social Engineering Attacks. eSecurity

Planet. Retrieved From: https://www.esecurityplanet.com/views/article.php/3908881/9-Best-Defenses-Against-So

cial-Engineering-Attacks.htm

 

Tankard, C. (August 2011). Advanced Persistent threats and how to monitor and deter them. Network Security, Volume 2011(Issue 8), pp. 16-19. Retrieved from: https://www.sciencedirect.com/science/article/pii/S1353485811700861

 

Shewan, D. (2019). The Comprehensive Guide to Online Advertising Costs. WordStream. Retrieved from https://www.wordstream.com/blog/ws/2017/07/05/online-advertising-costs

 

Bullee, J.H., & Montoya, L., & Pieters, W., Junger, M., Hartel, P. (January 2015). The persuasion and security awareness experiment: reducing the success of social engineering attacks. Journal of Experimental Criminology, Volume 11 (Issue 1), pp. 97-115. Retrieved from: https://link.springer.com/article/10.1007/s11292-014-9222-7

 

Gupta, S., & Singhal, A., & Kapoor, A. (January 2017). A literature survey on social engineering attacks: Phishing attacks, 2016 International Conference on Computing, Communication and Automation (ICCCA), Noida, India, April 2016. IEEE. Retrieved from: https://ieeexplore.ieee.org/abstract/document/7813778  

Orgill, G. Romney, G. Bailey, M. Orgill, P. (October 2004). The Urgency for Effective User Privacy-education to Counter Social Engineering Attacks on Secure Computer Systems. ACM Digital Library. Retrieved from: https://dl.acm.org/citation.cfm?id=1029577

Images & Infographics

“https://www.dictionary.com/”

“https://www.cybintsolutions.com/cyber-security-facts-stats/”

“https://www.keepnetlabs.com/social-engineering-stats/”

“https://www.ibtimes.com/phishing-scams-fbi-says-businesses-have-lost-5-billion-phishing-social-engineering-2536205”

“https://www.edts.com/edts-blog/15-examples-of-phishing-emails-from-2016-2017”

“https://www.google.com/search?safe=strict&client=firefox-b-1-d&biw=1385&bih=732&tbm=isch&sa=1&ei=QFy-XNzoM4X4tAXKibHoCg&q=photo+of+a+usb+drive&oq=photo+of+a+usb+drive&gs_l=img.3…84456.90656..90756…5.0..0.92.1404.21……1….1..gws-wiz-img…….35i39j0j0i67j0i8i30j0i24.5inybD8-1xo#imgdii=vB7MQpn1C4njIM:&imgrc=lxj4sIL1AcftmM:”

“https://ieeexplore.ieee.org/document/8629126?denied=”

“https://www.imperva.com/learn/application-security/social-engineering-attack/”

“https://www.eccouncil.org/ethical-hacking/”