2021
DOI: 10.1109/access.2021.3051633
|View full text |Cite
|
Sign up to set email alerts
|

Social Engineering in Cybersecurity: Effect Mechanisms, Human Vulnerabilities and Attack Methods

Abstract: Social engineering attacks have posed a serious security threat to cyberspace. However, there is much we have yet to know regarding what and how lead to the success of social engineering attacks. This paper proposes a conceptual model which provides an integrative and structural perspective to describe how social engineering attacks work. Three core entities (effect mechanism, human vulnerability and attack method) are identified to help the understanding of how social engineering attacks take effect. Then, be… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
36
0
2

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 85 publications
(38 citation statements)
references
References 66 publications
0
36
0
2
Order By: Relevance
“…In general, human vulnerabilities in social engineering fall into four aspects: 1) cognition and knowledge, 2) behavior and habit, 3) emotion and feeling, and 4) psychological vulnerabilities. And the psychological vulnerabilities can be further divided into three levels: 1) human nature, 2) personality trait and 3) individual character from the evolution perspective of human wholeness to individuation [15]. Following is a non-exhaustive list of human vulnerabilities, which contains 43 instances of these six categories.…”
Section: Human Vulnerabilitymentioning
confidence: 99%
“…In general, human vulnerabilities in social engineering fall into four aspects: 1) cognition and knowledge, 2) behavior and habit, 3) emotion and feeling, and 4) psychological vulnerabilities. And the psychological vulnerabilities can be further divided into three levels: 1) human nature, 2) personality trait and 3) individual character from the evolution perspective of human wholeness to individuation [15]. Following is a non-exhaustive list of human vulnerabilities, which contains 43 instances of these six categories.…”
Section: Human Vulnerabilitymentioning
confidence: 99%
“…Figure 1 shows the systematization of immunization means [7,[19][20][21]. There are two modes of immunization: prophylactic and probabilistic.…”
Section: Means Modes and Mechanisms Of Immunizationmentioning
confidence: 99%
“…We can classify human vulnerabilities into acquired vulnerabilities (e.g., lack of security awareness and noncompliance) and innate ones (e.g., bounded attention and rationality) based on whether they can be mitigated through short-term training and security rules. Many works (e.g., [11], [13], [26]) have emphasized the urgency and necessity to reduce acquired human vulnerability and proposed human-assistive strategies. However, few works have focused on mitigation strategies for innate vulnerabilities.…”
Section: B Feint Attacks and Human Attentional Modelsmentioning
confidence: 99%