Ontology Formation For Publications On Social Engineering

ABSTRACT One of the significant activities of the nations in the present days is how information is exchanged by different forms of media, which reflects the importance of knowledge sharing. Currently this sharing of knowledge between objectives is obtained in a very ad-hoc fashion and lacks appropr...

Full description

Saved in:
Bibliographic Details
Main Author: Issam Shaaban Malqout Al-Shanfari
Format: Thesis
Language:English
Subjects:
Online Access:https://oarep.usim.edu.my/bitstreams/c8278c5f-99e0-4cae-9520-9c8cadd539d8/download
https://oarep.usim.edu.my/bitstreams/b6584d8c-2b75-459d-982a-b47648ab0e3b/download
https://oarep.usim.edu.my/bitstreams/0a39b7bc-e679-4825-b761-8dd0aa4623b0/download
https://oarep.usim.edu.my/bitstreams/f4a3c7fc-674f-4b13-b013-be84016185f1/download
https://oarep.usim.edu.my/bitstreams/ce0a2fd9-562a-4fcf-83b2-6746528b1fd6/download
https://oarep.usim.edu.my/bitstreams/961c4e6d-4d62-4477-84b6-5a4028f6834a/download
https://oarep.usim.edu.my/bitstreams/85d4ea9a-dc4a-4f69-a6bf-80e515d20233/download
https://oarep.usim.edu.my/bitstreams/65716519-4431-47f1-87b0-4f7986848d74/download
https://oarep.usim.edu.my/bitstreams/3b2fbf11-6588-4685-bb45-ad10e6e48c9d/download
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:ABSTRACT One of the significant activities of the nations in the present days is how information is exchanged by different forms of media, which reflects the importance of knowledge sharing. Currently this sharing of knowledge between objectives is obtained in a very ad-hoc fashion and lacks appropriate comprehension of the data meaning. Therefore, in order to facilitate the reuse and knowledge sharing, ontologies must be used in this situation. Social engineering, or what is known as the art of mind's penetration, is a collection of techniques used to make people do something or to declare about confidential information. Social engineering is defined as a way to gain valuable information about the system from people in general, where any attacker using little owned information to win the confidence of his victim, this trust, leads the victim to provide sensitive information to attacker through which can be discovered the properties of the system. The social engineering ontology includes a formal and explicit representation of the terms describing social engineering types such as human-based attacks and technical-based attacks, threats, and countermeasures. The stages used for this implementation form the methodology that has been suggested by Noy and McGuiness (2000) for the purpose of developing ontologies. This study, based on the findings in the literature, develops social engineering taxonomy consisting of two major categories, interprets the findings in a taxonomic hierarchy and develops social engineering ontology by using Protégé software. Therefore, this research aims to compile related publications on social engineering from selected databases. This study also aims to develop a collection of related terms (taxonomy) based on the extraction of publications related on social engineering, in order to facilitate information and knowledge sharing as well as knowledge reuse on social engineering.