2019
DOI: 10.5120/ijca2019919411
|View full text |Cite
|
Sign up to set email alerts
|

A Taxonomy for Social Engineering Attacks via Personal Devices

Abstract: Social engineering attacks are a major threat to organizations and individuals as digitization and connectivity through the internet increase. This study aims to review scholarly research analyzing the topic of social engineering and further chart the evolution of the threat. The review identifies methods of such attacks on various platforms and devices and discusses motivations behind social engineering attacks. Finally, the paper analyzes the nature and impact of social engineering attacks and presents a tax… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 41 publications
0
2
0
Order By: Relevance
“…The proposed taxonomy identifies various channels through which social engineering attacks can be performed, including instant messaging applications, email, social networks, physical actions, cloud services, voice-over-IP, and websites. The authors of [46] analyzed the vulnerabilities present in various personal devices, including mobile devices, desktops, and tablets. They proposed a taxonomy that classifies social engineering attacks based on the specific devices employed.…”
Section: A Taxonomies Of Se Attacksmentioning
confidence: 99%
“…The proposed taxonomy identifies various channels through which social engineering attacks can be performed, including instant messaging applications, email, social networks, physical actions, cloud services, voice-over-IP, and websites. The authors of [46] analyzed the vulnerabilities present in various personal devices, including mobile devices, desktops, and tablets. They proposed a taxonomy that classifies social engineering attacks based on the specific devices employed.…”
Section: A Taxonomies Of Se Attacksmentioning
confidence: 99%
“…Theoretical framework for SEA Theoretical framework for SEA by evaluating features of SEA-based on extant theories in the cognitive science. Koyun & Al Janabi (2017) [12] Aldawood & Skinner (2019) [13] Many studies focused on natural language processing (NLP) to detect potential SEAs. [14] proposed a chat-based SEA recognition by evaluation of specific purpose written text on social engineering domain.…”
Section: Internationalmentioning
confidence: 99%
“…PAGE 103 [10] broadly classified into Phishing, Baiting, Pretexting and Tailgating. Conceptual researches to provide an overview and taxonomy to classify SEA on knowledge workers [11], types and channel of attacks [12], and analysed identified methods of threats [13]. [4] 2.…”
Section: Introductionmentioning
confidence: 99%