From: Social engineering in cybersecurity: a domain ontology and knowledge graph application examples
No. | Concept | Description | Concept |
---|---|---|---|
1 | Attacker | Equivalent To | Social Engineer |
2 | Attack Target | Equivalent To | Victim |
3 | Attack Goal | Equivalent To | Attack Purpose |
4 | Attack Medium | Equivalent To (Entity of) | Social Interaction |