Social Engineering Attacks: How to Prevent

Author:

Manukyan Lilit1ORCID,Gevorgyan Mariam2ORCID

Affiliation:

1. Brusov State University, Yerevan, Armenia

2. French University in Armenia, Yerevan, Armenia; Institute for Physical Research, NAS of Armenia, Yerevan, Armenia

Abstract

We present the pervasive threat of social engineering attacks in cyber security. The article explores interdisciplinary perspectives, such as psychology and information technology discipline, the social engineering attack types, sequence and traits. Through an in-depth analysis of social engineering attacks, this paper aims to raise awareness about the evolving threat landscape and provides actionable strategies for effective prevention. Nowadays social engineering attacks are incredibly important for all mobile and computer users. Beyond spotting an attack, one can also be proactive about privacy and security. Keeping your devices themselves is just as important as all your other digital behaviors. 90 % of cyber attacks involve social engineering. “Human hacking” scams tend to lure unsuspecting users into exposing data, spreading malware infections, or giving access to restricted systems. In this article we have been presenting pervasive and growing threat-social engineering, interdisciplinary perspectives, such as psychology and information technology discipline, the social engineering attack types, sequence and traits. Therefore, in the article we have been studying social engineering attacks and ways of preventing them.

Publisher

Institute of Cited Scientists

Reference23 articles.

1. 1. Anderson J., Ross (2008). "Security engineering: a guide to building dependable distributed systems" (2 ed.). Indianapolis, IN: Wiley. ISBN 978-0-470-06852-6. Chapter 2, page 17.

2. 2. URL: https://terrorgum.com/tfox/books/security_engineering_a_guide_to_building_dependable_distributed_systems.pdf

3. 3. "Social Engineering Defined". Security Through Education. Retrieved 3 October 2021.

4. 4. URL: https://www.social-engineer.org/framework/general-discussion/social-engineering-defined/

5. 5. Mathieu J. Guitton (1 June, 2020). "Cybersecurity, social engineering, artificial intelligence, technological addictions: Societal challenges for the coming decade". Computers in Human Behavior. 107: 106307.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3