CYSE 201S


Home

Cybersecurity and the Social Sciences

This image has an empty alt attribute; its file name is Screenshot-2025-02-03-at-8.18.41-PM-1024x942.png

Singh, A. (1970, December 20). Social Engineering in cybersecurity: The evolution of a concept. Global Tech Council. https://www.globaltechcouncil.org/cyber-security/social-engineering-in-cybersecurity-the-evolution-of-a-concept/ 

This image has an empty alt attribute; its file name is Screenshot-2025-02-03-at-8.45.40-PM-1-1024x683.png

Ibreakstock. (2020, June 5). Social science word cloud concept stock illustration – illustration of Intelligence, global: 185183042. Dreamstime. https://www.dreamstime.com/social-science-word-cloud-concept-white-background-image185183042 

This image has an empty alt attribute; its file name is AdobeStock_305166874-scaled-2-1024x568.jpeg
Admin. (2022, March 23). Social Engineering in Cybersecurity. SECURITY INSIGHTS. https://www.securityinsights.net/social-engineering-in-cybersecurity/ 
This image has an empty alt attribute; its file name is Screenshot-2025-02-05-at-9.38.55-PM-2-1024x574.png

Beyond the firewall: How social engineers use psychology to compromise organizational cybersecurity. Tripwire. https://www.tripwire.com/state-of-security/beyond-firewall-how-social-engineers-use-psychology-compromise-organizational 

This image has an empty alt attribute; its file name is Screenshot-2025-02-06-at-2.04.15-PM-1024x601.png

Image delivery api. contentstack.com. (n.d.). https://www.contentstack.com/docs/developers/apis/image-delivery-api