Affiliation:
1. University of North Carolina at Chapel Hill, USA
Abstract
Cybersecurity criminals often use social engineering techniques to meet their objectives. The most egregious cybersecurity attacks may be designed to get an organization to override defenses, change standards, or convince governing bodies to change laws and regulations through political pressure, espionage, or litigation. By creating cultures of trust or mistrust, organizational leaders can be persuaded to declassify information or make changes that allow such adversaries to gain access to things that are unavailable to them. Through time and strategy, cybercriminals can weaken cybersecurity defense capabilities and awareness. Organizations people trust may use social engineering against consumers through online advertisements, cookies, and spyware to gather data, like IP addresses, location histories, and browsing preferences, for gain and profit. This study highlights areas where social engineering tools are designed into devices and activities to influence behavior in personal and professional settings.
Reference55 articles.
1. Social Robot Interactions for Social Engineering: Opportunities and Open Issues
2. Cloud Computing Adoption in Critical Infrastructures-Status Quo and Elements of a Research Agenda.;M.Adelmeyer;Proceedings of the Multikonferenz Wirtschaftsinformatik,2018
3. Afesorgbor, S. K., van Bergeijk, P., & Demena, B. A. (2021). Does COVID-19 threaten globalization? International Institute of Social Studies (ISS). ISS working papers. General series No. 683
4. Algarni, A., Xu, Y., Chan, T., & Tian, G. (2013). Toward understanding social engineering.
5. Threat Analysis and Distributed Denial of Service (DDoS) Attack Recognition in the Internet of Things (IoT)