Need to Correct: Difference between revisions
No edit summary |
No edit summary |
||
(9 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
''' | == '''Need to Correct (Errors, Criticism, etc.)''' == | ||
Short Description: | |||
CAT ID: | '''Short Description:''' Impulsive need for people to correct false information <br> | ||
Layer: 8 <br> | |||
Operational Scale | '''CAT ID:''' CAT-2024-007 <br> | ||
Level of Maturity | |||
Category: Vulnerability <br> | '''Layer:''' 8 <br> | ||
Subcategory | |||
Also Known As | '''Operational Scale:''' <br> | ||
== | |||
Brief Description | '''Level of Maturity:''' <br> | ||
Closely Related Concepts | |||
Mechanism | '''Category:''' Vulnerability <br> | ||
Multipliers | |||
Detailed Description: | '''Subcategory:''' <br> | ||
INTERACTIONS [VETs] | |||
== | '''Also Known As:''' <br> | ||
Use Case Example | |||
Example From The Wild | == '''Description:''' == | ||
== | |||
== | '''Brief Description:''' <br> | ||
'''Closely Related Concepts:''' <br> | |||
'''Mechanism:''' <br> | |||
'''Multipliers:''' <br> | |||
'''Detailed Description:''' The impulse people feel to correct errors. This may be exploited by an attacker to elicit sensitive information from an unsuspecting target. <br> | |||
'''INTERACTIONS''' [VETs]: <br> | |||
== '''Examples:''' == | |||
'''Use Case Example(s):''' <br> | |||
'''Example(s) From The Wild:''' <br> | |||
== '''Comments:''' == | |||
== '''References:''' == | |||
Halevi, T., Memon, N., & Nov, O. (2015). Spear-phishing in the wild: A real-world study of personality, phishing self-efficacy and vulnerability to spear-phishing attacks. Phishing Self-Efficacy and Vulnerability to Spear-Phishing Attacks (January 2, 2015).; <br> |
Latest revision as of 01:22, 28 July 2024
Need to Correct (Errors, Criticism, etc.)
Short Description: Impulsive need for people to correct false information
CAT ID: CAT-2024-007
Layer: 8
Operational Scale:
Level of Maturity:
Category: Vulnerability
Subcategory:
Also Known As:
Description:
Brief Description:
Closely Related Concepts:
Mechanism:
Multipliers:
Detailed Description: The impulse people feel to correct errors. This may be exploited by an attacker to elicit sensitive information from an unsuspecting target.
INTERACTIONS [VETs]:
Examples:
Use Case Example(s):
Example(s) From The Wild:
Comments:
References:
Halevi, T., Memon, N., & Nov, O. (2015). Spear-phishing in the wild: A real-world study of personality, phishing self-efficacy and vulnerability to spear-phishing attacks. Phishing Self-Efficacy and Vulnerability to Spear-Phishing Attacks (January 2, 2015).;