全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Systematic Review on Social Engineering: Hacking by Manipulating Humans

DOI: 10.4236/jis.2021.121005, PP. 104-114

Keywords: Direct Human Interaction, Phishing, Social Engineering Phases, Preventive Measures

Full-Text   Cite this paper   Add to My Lib

Abstract:

Despite the availability of advanced security software and hardware mechanisms available, still, there has been a breach in the defence system of an organization or individual. Social engineering mostly targets the weakest link in the security system i.e. “Humans” for gaining access to sensitive information by manipulating human psychology. Social engineering attacks are arduous to defend as such attacks are not easily detected by available security software or hardware. This article surveys recent studies on social engineering attacks with discussion on the social engineering phases and categorizing the various attacks into two groups. The main aim of this survey is to examine the various social engineering attacks on individuals and countermeasures against social engineering attacks are also discussed.

References

[1]  Winkler, I.S. and Dealy, B. (1995) Information Security Technology? Don’t Rely on It A Case Study in Social Engineering. 5th USENIX UNIX Security Symposium, Salt Lake City, 5-7 June 1995, 1.
[2]  Lohani, S. (2019) Social Engineering: Hacking into Humans. International Journal of Advanced Studies of Scientific Research, 4.
[3]  Kumar, A., Chaudhary, M. and Kumar, N. (2015) Social Engineering Threats and Awareness: A Survey. European Journal of Advances in Engineering and Technology, 2, 15-19.
[4]  Kaushalya, S.A.D.T.P., Randeniya, R.M.R.S.B. and Liyanage, A.D.S. (2018) An Overview of Social Engineering in the Context Of Information Security. 2018 IEEE 5th International Conference on Engineering Technologies and Applied Sciences (ICETAS), Bangkok, 22-23 November 2018, 1-6.
[5]  Zulkurnain, A.U., Hamidy, A.K.B.K., Husain, A.B. and Chizari, H. (2015). Social Engineering Attack Mitigation. International Journal of Mathematics and Computational Science, 1, 188-198.
[6]  Chitrey, A., Singh, D., Bag, M. and Singh, V. (2012) A Comprehensive Study of Social Engineering Based Attacks in India to Develop a Conceptual Model. International Journal of Information & Network Security, 1, 45-53.
[7]  Krombholz, K., Hobel, H., Huber, M. and Weippl, E. (2015). Advanced Social Engineering Attacks. Journal of Information Security and applications, 22, 113-122.
[8]  Weber, K., Schütz, A.E., Fertig, T. and Müller, N.H. (2020). Exploiting the Human Factor: Social Engineering Attacks on Cryptocurrency Users. In: Zaphiris, P. and Ioannou, A., Eds., Learning and Collaboration Technologies. Human and Technology Ecosystems. HCII 2020. Lecture Notes in Computer Science, Springer, Cham, 650-668.
[9]  Brook, C. (2017) Classic Ether Wallet Compromised via Social Engineering.
https://threatpost.com/classic-ether-wallet-compromised-via-social-engineering/126657/
[10]  Breda, F., Barbosa, H. and Morais, T. (2017) Social Engineering and Cyber Security. Proceedings of the International Conference on Technology, Education and Development, Valencia, 6-8 March 2017, 4204-4211.
http://dx.doi.org/10.21125/inted.2017.1008
[11]  Yasin, A., Fatima, R., Liu, L., Yasin, A. and Wang, J. (2019) Contemplating Social Engineering Studies and Attack Scenarios: A Review Study. Security and Privacy, 2, e73.
https://doi.org/10.1002/spy2.73
[12]  Parthy, P.P. and Rajendran, G. (2019) Identification and Prevention of Social Engineering Attacks on an Enterprise. 2019 International Carnahan Conference on Security Technology, Chennai, 1-3 October 2019, 1-5.
https://doi.org/10.1109/CCST.2019.8888441
[13]  Salahdine, F. and Kaabouch, N. (2019) Social Engineering Attacks: A Survey. Future Internet, 11, 89.
https://doi.org/10.3390/fi11040089
[14]  Luo, X., Brody, R., Seazzu, A. and Burd, S. (2011) Social Engineering: The Neglected Human Factor for Information Security Management. Information Resources Management Journal, 24, 1-8.
https://doi.org/10.4018/irmj.2011070101
[15]  Aldawood, H. and Skinner, G. (2018) Contemporary Cyber Security Social Engineering Solutions, Measures, Policies, Tools and Applications: A Critical Appraisal. 26th International Conference on Systems Engineering, Sydney, 8-20 December, 1-6.
https://doi.org/10.1109/ICSENG.2018.8638166
[16]  Mouton, F., Teixeira, M. and Meyer, T. (2017) Benchmarking a Mobile Implementation of the Social Engineering Prevention Training Tool. 2017 Information Security for South Africa, Johannesburg, 16-17 August 2017, 106-116.
https://doi.org/10.1109/ISSA.2017.8251782
[17]  Osuagwu, E.U., Chukwudebe, G.A., Salihu, T. and Chukwudebe, V.N. (2015) Mitigating Social Engineering for Improved Cybersecurity. 2015 International Conference on Cyberspace, Abuja, 4-7 November 2015, 91-100.
https://doi.org/10.1109/CYBER-Abuja.2015.7360515
[18]  Edwards, M., Larson, R., Green, B., Rashid, A. and Baron, A. (2017) Panning for gold: Automatically Analysing Online Social Engineering Attack Surfaces. Computers & Security, 69, 18-34.
https://doi.org/10.1016/j.cose.2016.12.013
[19]  Abdalla, I. (2018) Social Engineering Threat and Defense: A Literature Survey. Journal of Information Security, 9, 257-264.
https://doi.org/10.4236/jis.2018.94018
[20]  Francois, M., Mercia, M., Louise, L. and Venter, H.S. (2014) Social Engineering Attack Framework. 2014 Information Security for South Africa, Johannesburg, 13-14 August 2014, 1-9.
https://doi.org/10.1109/ISSA.2014.6950510
[21]  Social Engineer. The Social Engineering Framework.
https://www.social-engineer.org/framework/information-gathering/
[22]  Hoxhunt. Social Engineering—What Is It and How to Prepare for It?
https://www.hoxhunt.com/blog/social-engineering/
[23]  Thompson, S.T.C. (2006) Helping the Hacker? Library Information, Security, and Social Engineering. Information Technology and Libraries, 25, 222-225.
https://doi.org/10.6017/ital.v25i4.3355
[24]  Hitachi Systems (2019) 10 Ways Businesses Can Prevent Social Engineering Attacks.
https://www.hitachi-systems-security.com/blog/10-ways-businesses-can-prevent-social-engineering-attacks/
[25]  Whitney, L. (2020) How to Block Robocalls and Spam Calls.
https://au.pcmag.com/apple-iphone-x/57316/how-to-block-robocalls-and-spam-calls

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133