2021
DOI: 10.1007/978-3-030-90241-4_36
|View full text |Cite
|
Sign up to set email alerts
|

Social Engineering: The Art of Attacks

Abstract: The correct management of information systems security is often overlooked in technological measures and management efforts, and although there are now many tools to address security threats, the human aspect has been neglected. This paper discusses the human factors that could potentially lead to intrusions with social engineering. Social engineering is a method used by hackers to obtain access to systems by manipulating flaws in behavior known as mental preconceptions. Social engineering is a risk to securit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0
2

Year Published

2022
2022
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(14 citation statements)
references
References 12 publications
(12 reference statements)
0
12
0
2
Order By: Relevance
“…The various methods identified throughout the articles consulted in this research, as well as others that, although they were analyzed, were not described in the article, demonstrate that machine learning can indeed be a very valid tool for identifying malware on the Android OS [12], [13].…”
Section: Discussionmentioning
confidence: 99%
“…The various methods identified throughout the articles consulted in this research, as well as others that, although they were analyzed, were not described in the article, demonstrate that machine learning can indeed be a very valid tool for identifying malware on the Android OS [12], [13].…”
Section: Discussionmentioning
confidence: 99%
“…3 Human Behavior and Emerging Technologies and the actual URL in the status bar indicating that the document is a file that has to be clicked. This type of attack takes advantage of a victim's sense of curiosity using a video click as bait [14]. Once the victim clicks the video or image or post, the control of their computer is taken over by the attacker to acquire sensitive information or files.…”
Section: Methodsmentioning
confidence: 99%
“…Social engineering has emerged as a serious threat in virtual communities and is an effective way to attack information systems [13]. It is considered to be the most effective technique for attacking even the most secure system, since the weakest link of any system is the users [14]. It is one of the highest risks among other threats such as identity theft, key logger, and cyberbullying [15].…”
Section: Introductionmentioning
confidence: 99%
“…We selected DSR because it is a problem-solving approach with a clear objective to enhance human knowledge, develop innovative artifacts, and solve problems through them [14], [44], [45].…”
Section: Research Strategymentioning
confidence: 99%