2020
DOI: 10.5120/ijca2020919744
|View full text |Cite
|
Sign up to set email alerts
|

An Advanced Taxonomy for Social Engineering Attacks

Abstract: Rapid technological advancement has not only resulted in a change in the pace of economic development, but also led to increase in cyber-threats. A social engineering attack is one such threat where an attacker not only accesses critical information about a user through technology, but also through manipulation. Although the types of attacks are different i.e. social, physical, technical or socio-technical, the process is the same. This study creates an advanced taxonomy of social engineering attacks with the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
24
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(24 citation statements)
references
References 28 publications
0
24
0
Order By: Relevance
“…But because these attacks are conducted in person and therefore, compare to software or computer-based attacks the number of targets in humanbased attacks is limited (Krombholz, 2015). Types of Humanbased attack techniques can be shoulder sniffing, persuading or dumpster diving (Aldawood and Skinner, 2020).…”
Section: Social Engineering Techniquesmentioning
confidence: 99%
See 3 more Smart Citations
“…But because these attacks are conducted in person and therefore, compare to software or computer-based attacks the number of targets in humanbased attacks is limited (Krombholz, 2015). Types of Humanbased attack techniques can be shoulder sniffing, persuading or dumpster diving (Aldawood and Skinner, 2020).…”
Section: Social Engineering Techniquesmentioning
confidence: 99%
“…It is the process in which the attackers send messages or emails containing malicious content, but they make it look like they came from legitimate and trustworthy sources. The phishing emails and messages normally contain website links that direct victims to the website with malicious scripts (Aldawood and Skinner, 2020).…”
Section: Social Engineering Techniquesmentioning
confidence: 99%
See 2 more Smart Citations
“…The most common attacks, such as phishing, use the techniques of Social Engineering [10]. Social Engineering strategies deceive victims by taking data that are important for access to financial or other data by exploiting the trust, motives, habits, and behavior of individuals to manipulate them [11,12].…”
Section: Introductionmentioning
confidence: 99%