Useful Links
Computer Science
Cybersecurity
Human-Centric Cybersecurity
1. Introduction to Human-Centric Cybersecurity
2. Human Psychology and Cybersecurity
3. Human Error in Cybersecurity
4. Behavioral Science Applications
5. Social Engineering Attacks
6. Usable Security Design
7. Security Training and Awareness
8. Security Culture Development
9. Measurement and Metrics
10. Advanced Topics and Emerging Trends
Social Engineering Attacks
Fundamentals of Social Engineering
Psychological Manipulation Principles
The Social Engineering Kill Chain
Information Gathering
Relationship Building
Exploitation
Execution
Exit Strategy
Attack Vector Classification
Target Selection Criteria
Principles of Influence and Persuasion
Reciprocity
Commitment and Consistency
Social Proof
Authority
Liking and Similarity
Scarcity
Unity and Shared Identity
Common Attack Techniques
Phishing Attacks
Email Phishing
Spear Phishing
Whaling
Clone Phishing
Smishing
Vishing
Pretexting
Identity Impersonation
Scenario Creation
Information Elicitation
Baiting
Physical Media Drops
Digital Baiting
Curiosity Exploitation
Quid Pro Quo
Service Offers
Technical Support Scams
Physical Social Engineering
Tailgating
Piggybacking
Shoulder Surfing
Dumpster Diving
Psychology of Victimization
Emotional Exploitation
Fear Appeals
Urgency Creation
Greed and Opportunity
Curiosity and Interest
Trust Building Mechanisms
Cognitive Overload Tactics
Authority and Credibility Manipulation
Defense Against Social Engineering
Recognition Training
Verification Procedures
Reporting Mechanisms
Technical Controls
Organizational Policies
Previous
4. Behavioral Science Applications
Go to top
Next
6. Usable Security Design