Skip to main content
. 2020 Sep 30;11:1755. doi: 10.3389/fpsyg.2020.01755

Figure 2.

Figure 2

Extending the basic schema of human cognition presented in Figure 1 to accommodate social engineering cyberattacks. The extension is to incorporate an attacker that wages a social engineering cyberattack against a victim's human cognition functions (i.e., the oval). The resulting behavior is associated to persuasion (i.e., an attack succeeds when a victim is persuaded to act as intended by the attacker).