2019
DOI: 10.3390/fi11040089
|View full text |Cite
|
Sign up to set email alerts
|

Social Engineering Attacks: A Survey

Abstract: The advancements in digital communication technology have made communication between humans more accessible and instant. However, personal and sensitive information may be available online through social networks and online services that lack the security measures to protect this information. Communication systems are vulnerable and can easily be penetrated by malicious users through social engineering attacks. These attacks aim at tricking individuals or enterprises into accomplishing actions that benefit att… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
186
0
8

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
1
1

Relationship

2
7

Authors

Journals

citations
Cited by 332 publications
(196 citation statements)
references
References 54 publications
2
186
0
8
Order By: Relevance
“…Until the early-2000s, traditional methods were popularly employed by organizations as a means of keeping their employees abreast of various social engineering attacks. These traditional methods typically included onsite training and awareness camps, screensavers, posters, manual reminders or in some cases, online e-learning courses [9]. However, the major problem with these traditional awareness methods was that they were not interactive and dynamic.…”
Section: Discussion 31 Traditional Awareness Programsmentioning
confidence: 99%
“…Until the early-2000s, traditional methods were popularly employed by organizations as a means of keeping their employees abreast of various social engineering attacks. These traditional methods typically included onsite training and awareness camps, screensavers, posters, manual reminders or in some cases, online e-learning courses [9]. However, the major problem with these traditional awareness methods was that they were not interactive and dynamic.…”
Section: Discussion 31 Traditional Awareness Programsmentioning
confidence: 99%
“…3 are the output of each random trees. These trees are combined to form the aggregated estimation to train the forest using: 9 d ( , 9 ) = g [ 9 ( , , 9 )] (7) where is the expectation with respect to the random parameter, conditionally, on and the data set 9 . Once the forest is trained, each tree can predict independently to output values using the following equation:…”
Section: ) Random Forestmentioning
confidence: 99%
“…It will be enabled by cognitive radio, making these networks open to new attacks, including primary user emulation attacks [5] and spectrum sensing data falsification [6]. Thus, it is important to explore the cybersecurity implications of 5G systems [7,8]. Jammers create an unwanted denial of service by transmitting radio signals that flood the communication channels aiming at decreasing SNR of legitimate users thereby interrupting their communication.…”
Section: Introductionmentioning
confidence: 99%
“…The scope of social engineers starts from message manipulation to disrupt organizational working structure and extends to the exploitation of firms' infrastructure [15]. The scope of physical social engineering attacks encompasses retaining first-hand information from a specific user, whereas, the scope of social-based attacks extends to exploitation of emotional and psychological vulnerabilities of a user [16][17][18][19].…”
Section: Scope Of Social Engineeringmentioning
confidence: 99%