Ruchika Lalit1, Priyanka Bhutani2, Neha Verma3* and Sarthak Marwah1
1The NorthCap University, Gurugram, India
2University School of Information, Communication and Technology (USIC and T), Guru Gobind Singh Indraprastha University (GGSIPU), India
3VIPS (Member of CSD), Guru Gobind Singh Indraprastha University (GGSIPU), India
*Corresponding Author: Neha Verma, VIPS (Member of CSD), Guru Gobind Singh Indraprastha University (GGSIPU), India.
Received: August 14, 2023; Published: August 22, 2023
As technology advances and cybersecurity measures become more sophisticated, cybercriminals are increasingly turning to social engineering tactics to gain access to sensitive information or systems. Social engineering refers to the tactic of taking advantage of human weaknesses to accomplish harmful goals, which may involve deceiving people into revealing sensitive information or breaching security measures. This approach has proven to be highly effective and is responsible for a significant portion of cyber-attacks. Unfortunately, many victims are unaware that they are being manipulated and may inadvertently sabotage the system themselves. Social engineering refers to a variety of malicious tactics that rely on human interactions to deceive and manipulate individuals into divulging confidential information or committing security breaches. Such attacks usually occur in multiple stages, starting with the perpetrator conducting research on the target to identify vulnerabilities and weaknesses in their security protocols. The attacker then gains the victim's trust by using various psychological tactics and provides incentives to encourage actions that compromise security, such as revealing sensitive data or granting unauthorized access to critical resources. It offers a formal and clear knowledge schema to comprehend, examine, reuse, and exchange social engineering domain knowledge. Cyber attackers use social engineering tactics to manipulate individuals to divulge sensitive information or to perform actions that may compromise a system's security. Throughout this paper, we explore various forms, strategies, and consequences of social engineering, which in turn supports Sustainable Development Goals (SDG-9). The paper also examines the effectiveness of different countermeasures and strategies for preventing social engineering attacks. By analyzing the latest research and real-world examples, this paper aims to increase awareness and understanding of social engineering, and help individuals and organizations better protect themselves from this growing threat.
Keywords: Social Engineering; Cyber- Attack; Cyber Security; Phishing; Baiting
Citation: Neha Verma., et al. “Social Engineering as A Tool for Cyber-Attacks". Acta Scientific Computer Sciences 5.9 (2023): 26-27.
Copyright: © 2023 Neha Verma., et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.