Author:
Kushwaha Aanchal,Singh Pramod,Waoo Akhilesh A.
Abstract
Social engineering attacks involve manipulating individuals to disclose sensitive information, compromise security, or perform actions that may not be in their best interest. These attacks exploit psychological and social aspects rather than relying on technical vulnerabilities. Techniques include phishing, pretexting, baiting, and quid pro quo, targeting human susceptibility to persuasion for malicious purposes. Understanding and awareness are crucial in mitigating the risks associated with social engineering attacks.
Publisher
Granthaalayah Publications and Printers
Reference21 articles.
1. Salahdine, F.: Kaabouch, N., (2019), “Social Engineering Attacks: A Survey”, Future Internet 2019; 11(4),89, https://
2. Heartfield, R.; Loukas, G. (2015), “A taxonomy of attacks and survey of defense mechanisms for semantic social engineering attacks”, ACM Computing Survey; pp 1-39,
3. Koyun, A.; Janabi AI E., (2017), “Social engineering attacks”, Journal of Multidisciplinary Engineering Science and Technology; Volume, 4 issue.
4. Syafitri, W.; Shukur, Z.; Umi Asma’Mokhtar; Sulaiman, R.; Muhammad Azwan Ibrahim, (2022), “Social engineering attacks prevention: A systematic literature review”, IEEE Pages 39325-39343. https://doi.org/10.1109/ACCESS.2022.3162594
5. Junger, M.; Montoya, L.; Overink, FJ., (2017), “Priming and arming are not effective in preventing social engineering attacks”, computers in human behavior; Elsevier