Need to Correct: Difference between revisions
No edit summary |
No edit summary |
||
| (8 intermediate revisions by the same user not shown) | |||
| Line 1: | Line 1: | ||
== '''Need to Correct (Errors, Criticism, etc.)''' == | |||
''Short Description''' | |||
''CAT ID''' | '''Short Description:''' Impulsive need for people to correct false information <br> | ||
''Layer''' | |||
''Operational Scale''' | '''CAT ID:''' CAT-2024-007 <br> | ||
''Level of Maturity''' | |||
''Category''' | '''Layer:''' 8 <br> | ||
''Subcategory''' | |||
''Also Known As''' | '''Operational Scale:''' <br> | ||
== '''Description''' == | |||
''Brief Description''' | '''Level of Maturity:''' <br> | ||
''Closely Related Concepts''' | |||
''Mechanism''' | '''Category:''' Vulnerability <br> | ||
''Multipliers''' | |||
''Detailed Description''' | '''Subcategory:''' <br> | ||
''INTERACTIONS''' [VETs] | |||
== '''Examples''' == | '''Also Known As:''' <br> | ||
''Use Case Example''' | |||
''Example From The Wild''' | == '''Description:''' == | ||
== '''Comments''' == | |||
== '''References''' == | '''Brief Description:''' <br> | ||
'''Closely Related Concepts:''' <br> | |||
'''Mechanism:''' <br> | |||
'''Multipliers:''' <br> | |||
'''Detailed Description:''' The impulse people feel to correct errors. This may be exploited by an attacker to elicit sensitive information from an unsuspecting target. <br> | |||
'''INTERACTIONS''' [VETs]: <br> | |||
== '''Examples:''' == | |||
'''Use Case Example(s):''' <br> | |||
'''Example(s) From The Wild:''' <br> | |||
== '''Comments:''' == | |||
== '''References:''' == | |||
Halevi, T., Memon, N., & Nov, O. (2015). Spear-phishing in the wild: A real-world study of personality, phishing self-efficacy and vulnerability to spear-phishing attacks. Phishing Self-Efficacy and Vulnerability to Spear-Phishing Attacks (January 2, 2015).; <br> | |||
Latest revision as of 01:22, 28 July 2024
Need to Correct (Errors, Criticism, etc.)
Short Description: Impulsive need for people to correct false information
CAT ID: CAT-2024-007
Layer: 8
Operational Scale:
Level of Maturity:
Category: Vulnerability
Subcategory:
Also Known As:
Description:
Brief Description:
Closely Related Concepts:
Mechanism:
Multipliers:
Detailed Description: The impulse people feel to correct errors. This may be exploited by an attacker to elicit sensitive information from an unsuspecting target.
INTERACTIONS [VETs]:
Examples:
Use Case Example(s):
Example(s) From The Wild:
Comments:
References:
Halevi, T., Memon, N., & Nov, O. (2015). Spear-phishing in the wild: A real-world study of personality, phishing self-efficacy and vulnerability to spear-phishing attacks. Phishing Self-Efficacy and Vulnerability to Spear-Phishing Attacks (January 2, 2015).;
