2021
DOI: 10.1007/978-981-16-4884-7_3
|View full text |Cite
|
Sign up to set email alerts
|

Impact of Social Engineering Attacks: A Literature Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 37 publications
0
5
0
Order By: Relevance
“…The stated characteristics of phishing emails include the sender address (47), followed by the language (35), links (34), specific content (25), urgency (20), request for data (19), salutation (28), and layout (17). Additionally, attachment (8), subject (6), spam filter (4), technical details such as error messages (3), receiving address (2), mass email (1), and gut feeling (1) were named. On average, the participants knew four characteristics.…”
Section: Study Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The stated characteristics of phishing emails include the sender address (47), followed by the language (35), links (34), specific content (25), urgency (20), request for data (19), salutation (28), and layout (17). Additionally, attachment (8), subject (6), spam filter (4), technical details such as error messages (3), receiving address (2), mass email (1), and gut feeling (1) were named. On average, the participants knew four characteristics.…”
Section: Study Resultsmentioning
confidence: 99%
“…According to Verizon's Data Breach Report 2022 [2], 82% of breaches involve the human element, with phishing being the second-most common entry point into an organization. The subsequent incidents have various impacts ranging from financial to reputational damage [8], as these attacks are often one step towards the goal within the cyber kill chain [5,22,27]. For example, MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) assigns spear-phishing the IDs T1566.001-003 (with attachment, via a link, or via a service) within the phase initial access [16].…”
Section: Introductionmentioning
confidence: 99%
“…A systematic literature review was carried out to identify and categorize the best methods for studying attacks based on social engineering on social networks. This review process includes the collection and analysis of existing research using specific evaluation criteria, which provides insights into the current state of knowledge in this particular area of study (Fuertes et al, 2022). The data from primary sources are methodically organized and examined.…”
Section: Methodsmentioning
confidence: 99%
“…Also, according to Fuertes et al, (2022), who examined the impacts of social engineering attacks; The main findings are concentrated in companies, financial institutions, and even vehicle vulnerabilities, which have caused economic losses and a decrease in the image and reputation loss damage of individuals and companies. Most of the causes are related to human behaviour, such as innocence, unconsciousness, and lack of training or capacity.…”
Section: Empirical Literature Reviewmentioning
confidence: 99%