Skip to main content

Table 3 Define relations among the core concepts

From: Social engineering in cybersecurity: a domain ontology and knowledge graph application examples

No.

Concept (Domain)

Relation (→)

Concept (Range)

1

Attack Motivation

motivate

Attacker

2

Attacker

motivated by

Attack Motivation

3

Attacker

gather and use

Social Engineering Information

4

Attacker

craft and perform

Attack Method

5

Attacker

formulate

Attack Strategy

6

Attack Method

to achieve

Attack Goal

7

Attack Method

guided by

Attack Strategy

8

Attack Method

apply to

Attack Target

9

Attack Method

performed through

Attack Medium

10

Attack Method

to exploit

Human Vulnerability

11

Attack Strategy

based on

Social Engineering Information

12

Attack Target

suffer

Attack Method

13

Attack Target

have vul

Human Vulnerability

14

Attack Target

interacted through

Attack Medium

15

Attack Target

bring out

Attack Consequence

16

Human Vulnerability

take effected by

Effect Mechanism

17

Effect Mechanism

explain

Attack Consequence

18

Attack Consequence

feed back to

Attack Goal

19

Attack Goal

to satisfy

Attack Motivation

20

Sub-goal

subgoal of

Goal

21

Attack Method

with skill

Common Skill

22

Attack Method

with trick

Auxiliary Trick