Acta Scientific COMPUTER SCIENCES

Review Article Volume 5 Issue 9

Social Engineering as A Tool for Cyber-Attacks

Ruchika Lalit1, Priyanka Bhutani2, Neha Verma3* and Sarthak Marwah1

1The NorthCap University, Gurugram, India
2University School of Information, Communication and Technology (USIC and T), Guru Gobind Singh Indraprastha University (GGSIPU), India
3VIPS (Member of CSD), Guru Gobind Singh Indraprastha University (GGSIPU), India

*Corresponding Author: Neha Verma, VIPS (Member of CSD), Guru Gobind Singh Indraprastha University (GGSIPU), India.

Received: August 14, 2023; Published: August 22, 2023

Abstract

As technology advances and cybersecurity measures become more sophisticated, cybercriminals are increasingly turning to social engineering tactics to gain access to sensitive information or systems. Social engineering refers to the tactic of taking advantage of human weaknesses to accomplish harmful goals, which may involve deceiving people into revealing sensitive information or breaching security measures. This approach has proven to be highly effective and is responsible for a significant portion of cyber-attacks. Unfortunately, many victims are unaware that they are being manipulated and may inadvertently sabotage the system themselves. Social engineering refers to a variety of malicious tactics that rely on human interactions to deceive and manipulate individuals into divulging confidential information or committing security breaches. Such attacks usually occur in multiple stages, starting with the perpetrator conducting research on the target to identify vulnerabilities and weaknesses in their security protocols. The attacker then gains the victim's trust by using various psychological tactics and provides incentives to encourage actions that compromise security, such as revealing sensitive data or granting unauthorized access to critical resources. It offers a formal and clear knowledge schema to comprehend, examine, reuse, and exchange social engineering domain knowledge. Cyber attackers use social engineering tactics to manipulate individuals to divulge sensitive information or to perform actions that may compromise a system's security. Throughout this paper, we explore various forms, strategies, and consequences of social engineering, which in turn supports Sustainable Development Goals (SDG-9). The paper also examines the effectiveness of different countermeasures and strategies for preventing social engineering attacks. By analyzing the latest research and real-world examples, this paper aims to increase awareness and understanding of social engineering, and help individuals and organizations better protect themselves from this growing threat.

Keywords: Social Engineering; Cyber- Attack; Cyber Security; Phishing; Baiting

References

  1. Ahmed R and Dharaskar RV. “Mobile forensics: an overview, tools, future trends and challenges from law enforcement perspective”. In 6th International Conference on E-Governance, Iceg, Emerging Technologies in E-Government, M-Government(2008): 312-323.
  2. Raheja S and Munjal G. “Classification of Microsoft Office Vulnerabilities: A Step Ahead for Secure Software Development”. In: Bhoi, A., Mallick, P., Liu, CM., Balas, V. (eds) Bio-inspired Neurocomputing. Studies in Computational Intelligence. Springer, Singapore 903 (2021).
  3. Wang Z., et al. “Social engineering in cybersecurity: Effect mechanisms, human vulnerabilities and attack methods”. IEEE Access 9(2021): 11895-11910.
  4. Lohani S. “Social engineering: Hacking into humans”. International Journal of Advanced Studies of Scientific Research1 (2019).
  5. Wang Z., et al.“Social engineering in cybersecurity: a domain ontology and knowledge graph application examples”. Cybersecur 4 (2021): 31.
  6. Breda F., et al.“Social engineering and cyber security”. In INTED2017 Proceedings (2017): 4204-4211.
  7. Wenke Lee and Bo Rotoloni. “Emerging cyber threats, trends and technologies”. Technical report, Institute for Information Security and Privacy (2016).
  8. Social-engineer toolkit” (2022).
  9. Kali Linux (2022).
  10. “Social engineering: The art of human hacking, Wiley (2011).

Citation

Citation: Neha Verma., et al. “Social Engineering as A Tool for Cyber-Attacks". Acta Scientific Computer Sciences 5.9 (2023): 26-27.

Copyright

Copyright: © 2023 Neha Verma., et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.




Metrics

Acceptance rate35%
Acceptance to publication20-30 days

Indexed In




News and Events


  • Certification for Review
    Acta Scientific certifies the Editors/reviewers for their review done towards the assigned articles of the respective journals.
  • Submission Timeline for Upcoming Issue
    The last date for submission of articles for regular Issues is July 10, 2024.
  • Publication Certificate
    Authors will be issued a "Publication Certificate" as a mark of appreciation for publishing their work.
  • Best Article of the Issue
    The Editors will elect one Best Article after each issue release. The authors of this article will be provided with a certificate of "Best Article of the Issue"
  • Welcoming Article Submission
    Acta Scientific delightfully welcomes active researchers for submission of articles towards the upcoming issue of respective journals.

Contact US