2020
DOI: 10.1088/1757-899x/790/1/012040
|View full text |Cite
|
Sign up to set email alerts
|

A Human Dimension of Hacking: Social Engineering through Social Media

Abstract: Social engineering through social media channels targeting organizational employees is emerging as one of the most challenging information security threats. Social engineering defies traditional security efforts due to the method of attack relying on human naiveté or error. The vast amount of information now made available to social engineers through online social networks is facilitating methods of attack which rely on some form of human error to enable infiltration into company networks. While, paramount to … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 10 publications
(16 reference statements)
0
2
0
Order By: Relevance
“…They have two fold targets which are the social media users and the SMNP which they break into and control for their selfish gain [24]. On the users end, the hackers" activities make them susceptible to threats which include identity theft, evil twin, password resetting, sim cloning, brute force, fake links, phishing, information leakage, celebrity spoofing, fake account, impersonation, [25] and [26]. They also use code injection through malicious SQL script to disrupt the network.…”
Section: Literature Reviewmentioning
confidence: 99%
“…They have two fold targets which are the social media users and the SMNP which they break into and control for their selfish gain [24]. On the users end, the hackers" activities make them susceptible to threats which include identity theft, evil twin, password resetting, sim cloning, brute force, fake links, phishing, information leakage, celebrity spoofing, fake account, impersonation, [25] and [26]. They also use code injection through malicious SQL script to disrupt the network.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Before the invention of Social Media and Social Media scraping tools, the reconnaissance process was very labour-intensive, so a social engineer would be limited to targeting a small number of people at a time (Postnikoff & Goldberg, 2018). Now social engineers can gather information on hundreds of potential targets and then develop an increased number of attacks, which increases their likelihood of being successful (Wilcox & Bhattacharya, 2019) (Gharibi & Shaabi, 2012) (Weir et al, 2011).…”
Section: Humans and Their Behavioursmentioning
confidence: 99%
“…There is no technical measure that can stop a human from making a poor information security decision, and therefore more needs to be done to mitigate the risk the human creates (McIlwraith, 2006) (Schroeder, 2017(Wilcox & Bhattacharya, 2019 (American Psychological Association, 2021). The only way to mitigate this problem is to conduct research around the human firewall and better understand the decision-making process, cognition, and what influences a person's decision-making process.…”
Section: Introductionmentioning
confidence: 99%
“…They have two fold targets which are the social media users and the SMNP which they break into and control for their selfish gain [19]. On the users end, the hackers' activities make them susceptible to threats which include identity theft, evil twin, password resetting, sim cloning, brute force, fake links, phishing, information leakage, celebrity spoofing, fake account, impersonation, etc [20] [21] [22]. They also use code injection through malicious SQL script to disrupt the network.…”
Section: Security Measures For Social Media Networkmentioning
confidence: 99%