Please use this identifier to cite or link to this item: http://hdl.handle.net/123456789/2810
DC FieldValueLanguage
dc.contributor.authorKhidzir N.Z.en_US
dc.contributor.authorShekh Abdullah-Al-Musa Ahmeden_US
dc.contributor.authorTan, T.G.en_US
dc.contributor.authorDaud, K.A.M.en_US
dc.date.accessioned2022-01-18T06:18:01Z-
dc.date.available2022-01-18T06:18:01Z-
dc.date.issued2021-07-
dc.identifier.issn0094243X-
dc.identifier.urihttp://hdl.handle.net/123456789/2810-
dc.descriptionScopusen_US
dc.description.abstractThe basic network security issues have changed very little over the past decade. Protecting the confidential institutional information , preventing unauthorized access defending the network against SoE attacks remain primary concerns of network security professional toady. Widespread remote access by the high number of increasing sophisticated SoE attacks is making network security significantly more challenging in the institute . Confidential information can reside in two states on a network . It can reside on institutional physical storage media , such as a hard drive or memory , or it can reside in transit across the physical network wire in the form of packets. These two information states present multiple opportunities for SoE attacks from users in higher leaning institute internal network , as well as those users on the internet. Given the dramatic rise in external security threats , couples with the rising cost of network intrusions. Institution are more pressured than ever to define and protect their network perimeter . There is no choice for the institute but to keep abreast of large number of security issues confronting in today’s world.en_US
dc.description.sponsorshipUniversiti Malaysia Kelantanen_US
dc.language.isoenen_US
dc.publisherUniMAP / SCOPUSen_US
dc.subjectNetwork securityen_US
dc.subjectSocial Engineeringen_US
dc.subjectSoE attacking risk of threatsen_US
dc.subjectSoE attacking risk of vulnerabilitiesen_US
dc.subjectconceptual framework.en_US
dc.titleSocial Engineering (SoE) Attacks Towards Network Security in Higher Learning Institute: The Partial Least Squares Path Modeling Approachen_US
dc.typeNationalen_US
dc.relation.conferenceAIP Conference Proceedingsen_US
dc.identifier.doi10.1063/5.0053677-
dc.description.fundingRMIC, UMKen_US
dc.description.researchareaInformation Communication Technology, Social Engineering and Cybersecurityen_US
dc.volume2347en_US
dc.relation.seminarInternational Conference on Design Innovation, Social Science & Technology 2020en_US
dc.description.articleno020034en_US
dc.date.seminarstartdate2020-11-26-
dc.date.seminarenddate2020-11-27-
dc.description.typeIndexed Proceedingsen_US
dc.contributor.correspondingauthorzulkarnaen.k@umk.edu.myen_US
item.languageiso639-1en-
item.grantfulltextopen-
item.openairetypeNational-
item.fulltextWith Fulltext-
crisitem.author.deptUniversiti Malaysia Kelantan-
Appears in Collections:Faculty of Creative Technology & Heritage - Journal (Scopus/WOS)
Files in This Item:
File Description SizeFormat
aip-conference-proceedings-copyright-SocialEngineeringAttack-APTsDrNikZul-Signed-ICDISST2020.pdfConference Proceeding Indexed SCOPUS466.14 kBAdobe PDFView/Open
Social Engineering (SoE) Attacks (5) - Published.pdfArticle Submitted265.44 kBAdobe PDFView/Open
Acceptance Letter ICDISST-114.pdfAcceptance letter for article491.12 kBAdobe PDFView/Open
Social Engineering (SoE) Attacks (5) - Published - SCOPUS Index July 2021 - NikZulkarnaen.pdfSCOPUS Index Article265.44 kBAdobe PDFView/Open
Show simple item record

Google ScholarTM

Check

Altmetric

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.