Please use this identifier to cite or link to this item: https://doi.org/10.15480/336.2707
DC FieldValueLanguage
dc.contributor.authorÜbelacker, Sven-
dc.contributor.authorRebahi-Gilbert, Youssef-
dc.date.accessioned2020-03-10T17:25:38Z-
dc.date.available2020-03-10T17:25:38Z-
dc.date.issued2016-12-29-
dc.identifier.urihttp://hdl.handle.net/11420/5273-
dc.description.abstractThe 'Social Engineering Poetry Slam' is a format to enable the ethical hacker community to talk about Social Engineering in a favourable and entertaining environment. This self-organised session was recorded at the 33C3 Chaos Communication Congress in 2016. One contribution was removed upon slammer's request. It was announced as follows: "Listen to social engineering attack stories from fellow hackers. Presented in a poetry slam style! A poetry slam can be a novel research approach to find stories of social engineering attacks, fictional or experienced. This slam will give us a new platform to discover and discuss social engineering. Or present your social engineering experience or fictional story on how to deceive or manipulate people in the attacker's malicious interest. How did you get social engineered? Did you hear from a social engineering incident or know someone who managed to detect and mitigate it?"en
dc.language.isoende_DE
dc.subjectSocial Engineeringde_DE
dc.subjectChaos Communication Congressde_DE
dc.subjectHamburgde_DE
dc.subjectPoetry Slamde_DE
dc.subjectHackingde_DE
dc.subject.ddc004: Informatikde_DE
dc.titleSocial Engineering Poetry Slam @ 33C3de_DE
dc.typeAudiovisualde_DE
dc.identifier.doi10.15480/336.2707-
dc.type.diniMovingImage-
dcterms.DCMITypeImage-
tuhh.identifier.urnurn:nbn:de:gbv:830-882.078239-
tuhh.abstract.englishThe 'Social Engineering Poetry Slam' is a format to enable the ethical hacker community to talk about Social Engineering in a favourable and entertaining environment. This self-organised session was recorded at the 33C3 Chaos Communication Congress in 2016. One contribution was removed upon slammer's request. It was announced as follows: "Listen to social engineering attack stories from fellow hackers. Presented in a poetry slam style! A poetry slam can be a novel research approach to find stories of social engineering attacks, fictional or experienced. This slam will give us a new platform to discover and discuss social engineering. Or present your social engineering experience or fictional story on how to deceive or manipulate people in the attacker's malicious interest. How did you get social engineered? Did you hear from a social engineering incident or know someone who managed to detect and mitigate it?"de_DE
tuhh.publication.instituteSicherheit in verteilten Anwendungen E-15de_DE
tuhh.identifier.doi10.15480/336.2707-
tuhh.type.opusAudiovisuell-
tuhh.gvk.hasppnfalse-
tuhh.hasurnfalse-
dc.type.driverother-
dc.rights.cchttps://creativecommons.org/licenses/by-sa/4.0/de_DE
dc.type.casraiOnline Resource-
datacite.contributor.ContactPersonÜbelacker, Sven-
tuhh.type.rdmtrue-
local.researchdata.deleteaftertenyearsfalsede_DE
item.cerifentitytypeProducts-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.fulltextWith Fulltext-
item.creatorOrcidÜbelacker, Sven-
item.creatorOrcidRebahi-Gilbert, Youssef-
item.openairetypeAudiovisual-
item.languageiso639-1en-
item.creatorGNDÜbelacker, Sven-
item.creatorGNDRebahi-Gilbert, Youssef-
item.grantfulltextopen-
crisitem.author.deptSicherheit in verteilten Anwendungen E-15-
crisitem.author.orcid0000-0001-9228-8248-
crisitem.author.parentorgStudiendekanat Elektrotechnik, Informatik und Mathematik-
Appears in Collections:Research Data TUHH
Files in This Item:
File Description SizeFormat
2016-12-29.33C3.Social_Engineering_Poetry_Slam_-_cut_hdhalf.webmSocial Engineering Poetry Slam @ 33C3 (video 720p, webm)416,64 MBWebMView/Open
2016-12-29.33C3.Social_Engineering_Poetry_Slam_-_cut.opus.oggSocial Engineering Poetry Slam @ 33C3 (audio only, opus/ogg)67,98 MBOGG AudioView/Open
Show simple item record

Page view(s)

71
Last Week
3
Last month
16
checked on May 30, 2020

Download(s)

36
checked on May 30, 2020

Google ScholarTM

Check

Note about this record

Export

This item is licensed under a Creative Commons License Creative Commons