Social Engineering Attacks: A Survey

被引:163
|
作者
Salahdine, Fatima [1 ]
Kaabouch, Naima [1 ]
机构
[1] Univ North Dakota, Sch Elect Engn & Comp Sci, Grand Forks, ND 58202 USA
关键词
social engineering attacks; cyber security; phishing; vishing; spear phishing; scams; baiting; robocalls; SECURITY;
D O I
10.3390/fi11040089
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The advancements in digital communication technology have made communication between humans more accessible and instant. However, personal and sensitive information may be available online through social networks and online services that lack the security measures to protect this information. Communication systems are vulnerable and can easily be penetrated by malicious users through social engineering attacks. These attacks aim at tricking individuals or enterprises into accomplishing actions that benefit attackers or providing them with sensitive data such as social security number, health records, and passwords. Social engineering is one of the biggest challenges facing network security because it exploits the natural human tendency to trust. This paper provides an in-depth survey about the social engineering attacks, their classifications, detection strategies, and prevention procedures.
引用
收藏
页数:17
相关论文
共 50 条
  • [41] Social Engineering for Diagnostic the Information Security Culture
    Marchand-Nino, William-Rogelio
    Guzman Fonseca, Bruno Paolo
    2019 IEEE 39TH CENTRAL AMERICA AND PANAMA CONVENTION (CONCAPAN XXXIX), 2019, : 233 - 238
  • [42] Markov Decision Process for Modeling Social Engineering Attacks and Finding Optimal Attack Strategies
    Abri, Faranak
    Zheng, Jianjun
    Namin, Akbar Siami
    Jones, Keith S.
    IEEE ACCESS, 2022, 10 : 109949 - 109968
  • [43] Using machine learning algorithms to predict individuals' tendency to be victim of social engineering attacks
    Huseynov, Farid
    Ozdenizci Kose, Busra
    INFORMATION DEVELOPMENT, 2024, 40 (02) : 298 - 318
  • [44] Social Engineering Attacks on the Cyber-Physical System: Human Cyber and Physical Impacts
    Beni, Robert Makila
    TOWARDS NEW E-INFRASTRUCTURE AND E-SERVICES FOR DEVELOPING COUNTRIES, AFRICOMM 2023, PT I, 2025, 587 : 296 - 311
  • [45] Survey: Cybersecurity Vulnerabilities, Attacks and Solutions in the Medical Domain
    Razaque, Abdul
    Amsaad, Fathi
    Khan, Meer Jaro
    Hariri, Salim
    Chen, Shujing
    Chen Siting
    Ji, Xingchen
    IEEE ACCESS, 2019, 7 : 168774 - 168797
  • [46] A survey on cybersecurity attacks and defenses for unmanned aerial systems
    Wang, Zhaoxuan
    Li, Yang
    Wu, Shihao
    Zhou, Yuan
    Yang, Libin
    Xu, Yuan
    Zhang, Tianwei
    Pan, Quan
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 138
  • [47] Attacks on Self-Driving Cars and Their Countermeasures: A Survey
    Chowdhury, Abdullahi
    Karmakar, Gour
    Kamruzzaman, Joarder
    Jolfaei, Alireza
    Das, Rajkumar
    IEEE ACCESS, 2020, 8 : 207308 - 207342
  • [48] Detection and prevention of spear phishing attacks: A comprehensive survey
    Birthriya, Santosh Kumar
    Ahlawat, Priyanka
    Jain, Ankit Kumar
    COMPUTERS & SECURITY, 2025, 151
  • [49] A Survey of Man In The Middle Attacks
    Conti, Mauro
    Dragoni, Nicola
    Lesyk, Viktor
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (03): : 2027 - 2051
  • [50] A survey on adversarial attacks and defences
    Chakraborty, Anirban
    Alam, Manaar
    Dey, Vishal
    Chattopadhyay, Anupam
    Mukhopadhyay, Debdeep
    CAAI TRANSACTIONS ON INTELLIGENCE TECHNOLOGY, 2021, 6 (01) : 25 - 45