2023
DOI: 10.20428/jst.v27i2.2055
|View full text |Cite
|
Sign up to set email alerts
|

The Effect of Using Social Engineering for Cybersecurity on the Internet of Things Environment

Abstract: Although the Internet of Things (IoT) developers view human users as the weakest cybersecurity link and potentially a deciding factor in IoT security, IoT devices are exposed to a variety of security flaws and vulnerabilities, which most social engineers take advantage of to launch several data-collection attacks. For various purposes, this study looked at improving data security on MySQL databases and web pages by using TSL encryption protocols and the two algorithms (RSA & AES) that correlate with the In… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 8 publications
0
1
0
Order By: Relevance
“…These include implementing strong authentication mechanisms, educating users about phishing techniques, and enhancing the security of IoT devices and networks [19,23]. Additionally, social engineering attacks, which are often used in phishing attacks, can be countered through awareness campaigns and training programs to educate users about the risks and tactics used by attackers [24,25].…”
Section: Introductionmentioning
confidence: 99%
“…These include implementing strong authentication mechanisms, educating users about phishing techniques, and enhancing the security of IoT devices and networks [19,23]. Additionally, social engineering attacks, which are often used in phishing attacks, can be countered through awareness campaigns and training programs to educate users about the risks and tactics used by attackers [24,25].…”
Section: Introductionmentioning
confidence: 99%