<?xml version="1.0" encoding="UTF-8" ?>
<modsCollection xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" xmlns:slims="http://slims.web.id" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-3.xsd">
<mods version="3.3" ID="1044">
<titleInfo>
<title>Handbook of research on information and cyber security in the fourth industrial revolution</title>
</titleInfo>
<name type="Personal Name" authority="">
<namePart>Fields, Ziska</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<genre authority="marcgt">bibliography</genre>
<originInfo>
<place><placeTerm type="text">Hershey</placeTerm></place>
<publisher>Information science Reference</publisher>
<dateIssued>2018</dateIssued>
<issuance>monographic</issuance>
<edition></edition>
</originInfo>
<language>
<languageTerm type="code">en</languageTerm>
<languageTerm type="text">ENGLISH</languageTerm>
</language>
<physicalDescription>
<form authority="gmd">Text</form>
<extent>xxvi, 647hlm/: Ind.; ...cm</extent>
</physicalDescription>
<relatedItem type="series">
<titleInfo>
<title>A volume in the Advances in Information Security, Privacy, and Ethics (AISPE) Book Series</title>
</titleInfo>
</relatedItem>
<note>Social engineering refers to the art of using deception and manipulating individuals to gain access to systems or information assets and subsequently compromising these systems and information assets. Information security must provide protection to the confidentiality, integrity, and availability of information. In order to mitigate information security’s weakest link, it becomes necessary to understand the ways in which human behavior can be exploited via social engineering. This chapter will seek to analyze the role of social engineering in information security breaches and the factors that contribute to its success. A variety of social engineering attacks, impacts, and mitigations will be discussed. Human factors such as trust, obedience, and fear are easily exploited, thereby allowing social engineers to execute successful
attacks. However, with effective countermeasures such as information security awareness training, education, and audit procedures, the impacts of social engineering can be decreased or eliminated altogether</note>
<subject authority=""><topic>Computer networks--Security measures</topic></subject>
<classification>658.478</classification><identifier type="isbn"></identifier><location>
<physicalLocation>Repository Universitas Langlangbuana Sistem Repository Elektronik Skripsi, Tesis, Desertasi dan Penelitian Dosen Universitas Langlangbuana</physicalLocation>
<shelfLocator>658.478 FIE h</shelfLocator>
<holdingSimple>
<copyInformation>
<numerationAndChronology type="1">B115</numerationAndChronology>
<sublocation>My Library</sublocation>
<shelfLocator>658.478 FIE h</shelfLocator>
</copyInformation>
</holdingSimple>
</location>
<slims:digitals>
<slims:digital_item id="6378" url="" path="/Handbook of Research on Information and Cyber Security in the Fourth Industrial Revolution - Ziska Fields.pdf" mimetype="application/pdf">Handbook of research on information and cyber security in the fourth industrial revolution</slims:digital_item>
</slims:digitals><slims:image>cover_Information_and_cyber.PNG.PNG</slims:image>
<recordInfo>
<recordIdentifier>1044</recordIdentifier>
<recordCreationDate encoding="w3cdtf">2022-09-09 10:28:37</recordCreationDate>
<recordChangeDate encoding="w3cdtf">2022-09-09 10:28:57</recordChangeDate>
<recordOrigin>machine generated</recordOrigin>
</recordInfo></mods></modsCollection>