Need to Correct: Difference between revisions
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
''CAT Name''': Need to Correct (Errors, Criticism, etc.) <br> | |||
Short Description: Impusive need for people to correct false information <br> | ''Short Description''': Impusive need for people to correct false information <br> | ||
CAT ID: CAT-2024-007 <br> | ''CAT ID''': CAT-2024-007 <br> | ||
Layer: 8 <br> | ''Layer''': 8 <br> | ||
Operational Scale | ''Operational Scale''' | ||
Level of Maturity | ''Level of Maturity''' | ||
Category: Vulnerability <br> | ''Category''': Vulnerability <br> | ||
Subcategory | ''Subcategory''' | ||
Also Known As | ''Also Known As''' | ||
== | == '''Description''' == | ||
Brief Description | ''Brief Description''' | ||
Closely Related Concepts | ''Closely Related Concepts''' | ||
Mechanism | ''Mechanism''' | ||
Multipliers | ''Multipliers''' | ||
Detailed Description: The impulse people feel to correct errors. This may be exploited by an attacker to elicit sensitive information from an unsuspecting target. <br> | ''Detailed Description''': The impulse people feel to correct errors. This may be exploited by an attacker to elicit sensitive information from an unsuspecting target. <br> | ||
INTERACTIONS [VETs] | ''INTERACTIONS''' [VETs] | ||
== | == '''Examples''' == | ||
Use Case Example | ''Use Case Example''' | ||
Example From The Wild | ''Example From The Wild''' | ||
== | == '''Comments''' == | ||
== | == '''References''' ==: Halevi, T., Memon, N., & Nov, O. (2015). Spear-phishing in the wild: A real-world study of personality, phishing self-efficacy and vulnerability to spear-phishing attacks. Phishing Self-Efficacy and Vulnerability to Spear-Phishing Attacks (January 2, 2015).; <br> |
Revision as of 00:53, 28 July 2024
CAT Name': Need to Correct (Errors, Criticism, etc.)
Short Description': Impusive need for people to correct false information
CAT ID': CAT-2024-007
Layer': 8
Operational Scale'
Level of Maturity'
Category': Vulnerability
Subcategory'
Also Known As'
Description
Brief Description'
Closely Related Concepts'
Mechanism'
Multipliers'
Detailed Description': The impulse people feel to correct errors. This may be exploited by an attacker to elicit sensitive information from an unsuspecting target.
INTERACTIONS' [VETs]
Examples
Use Case Example' Example From The Wild'
Comments
== References ==: Halevi, T., Memon, N., & Nov, O. (2015). Spear-phishing in the wild: A real-world study of personality, phishing self-efficacy and vulnerability to spear-phishing attacks. Phishing Self-Efficacy and Vulnerability to Spear-Phishing Attacks (January 2, 2015).;