IEEE Account

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

  • DOI: 10.33847/2686-8296.6.1_3
  • Corpus ID: 270841538

Social Engineering Attacks: How to Prevent

  • Lilit Manukyan , Mariam Gevorgyan
  • Published in Journal of Digital Science 27 June 2024
  • Computer Science, Psychology

8 References

Social engineering attacks during the covid-19 pandemic, on the anatomy of social engineering attacks—a literature‐based dissection of successful attacks, the role of employees' information security awareness on the intention to resist social engineering, phishing for phishing awareness, virtuous human hacking: the ethics of social engineering in penetration-testing, virtual human role players for studying social factors in organizational decision making, review of security engineering: a guide to building dependable distributed systems, 2nd edition by ross j. anderson, cybersecurity, social engineering, artificial intelligence, technological addictions: societal challenges for the coming decade, related papers.

Showing 1 through 3 of 0 Related Papers

Social Engineering Attacks: Recent Advances and Challenges

  • Conference paper
  • First Online: 03 July 2021
  • Cite this conference paper

how to prevent social engineering attacks research paper

  • Nikol Mashtalyar 9 ,
  • Uwera Nina Ntaganzwa 9 ,
  • Thales Santos 9 ,
  • Saqib Hakak 9 &
  • Suprio Ray 9  

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 12788))

Included in the following conference series:

  • International Conference on Human-Computer Interaction

3035 Accesses

10 Citations

The world’s technological landscape is continuously evolving with new possibilities, yet also evolving in parallel with the emergence of new threats. Social engineering is of predominant concern for industries, governments and institutions due to the exploitation of their most valuable resource, their people. Social engineers prey on the psychological weaknesses of humans with sophisticated attacks, which pose serious cybersecurity threats to digital infrastructure. Social engineers use deception and manipulation by means of human computer interaction to exploit privacy and cybersecurity concerns. Numerous forms of attacks have been observed, which can target a range of resources such as intellectual property, confidential data and financial resources. Therefore, institutions must be prepared for any kind of attack that may be deployed and demonstrate willingness to implement new defense strategies. In this article, we present the state-of-the-art social engineering attacks, their classification and various mitigation strategies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save.

  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
  • Available as EPUB and PDF
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

how to prevent social engineering attacks research paper

Social Engineering as the Art of Deception in Cyber-Attacks: A Mapping Review

how to prevent social engineering attacks research paper

Overview of Social Engineering Protection and Prevention Methods

how to prevent social engineering attacks research paper

A Study on Social Engineering Attacks in Cybersecurity

Wang, Z., Sun, L., Zhu, H.: Defining social engineering in cybersecurity. IEEE Access 8 , 85094–85115 (2020)

Article   Google Scholar  

Salahdine, F., Kaabouch, N.: Social engineering attacks: a survey. Future Internet 11 (4), 89 (2019)

Albladi, S.M., Weir, G.R.S.: User characteristics that influence judgment of social engineering attacks in social networks. Hum.-Cent. Comput. Inf. Sci. 8 (1), 1–24 (2018). https://doi.org/10.1186/s13673-018-0128-7

Williams, E.J., Hinds, J., Joinson, A.N.: Exploring susceptibility to phishing in the workplace. Int. J. Hum. Comput. Stud. 120 , 1–13 (2018)

Breda, F., Barbosa, H., Morais, T.: Social engineering and cyber security. In: Proceedings of International Technology, Education and Development Conference (2017)

Google Scholar  

Kumar, A., Chaudhary, M., Kumar, N.: Social engineering threats and awareness: a survey. Eur. J. Adv. Eng. Tech. 2 (11), 15–19 (2015)

MathSciNet   Google Scholar  

Hakak, S., Khan, W.Z., Imran, M., Choo, K.-K.R., Shoaib, M.: Have you been a victim of COVID-19-related cyber incidents? Survey, taxonomy, and mitigation strategies. IEEE Access 8 , 124134–124144 (2020)

FBI. Federal agencies warn of emerging fraud schemes related to COVID-19 vaccines. [Online]. Available: https://www.fbi.gov/news/pressrel/press-releases/federal-agencies-warn-of-emerging-fraud-schemes-related-to-covid-19-vaccines

Alzahrani, A.: Coronavirus social engineering attacks: issues and recommendations. Int. J. Adv. Comput. Sci. Appl. 11 (5), 9 (2020). https://doi.org/10.14569/IJACSA.2020.0110523

Article   MathSciNet   Google Scholar  

Google. Protecting businesses against cyber threats during COVID-19 and beyond. [Online]. Available: https://cloud.google.com/blog/products/identity-security/protecting-against-cyber-threats-during-covid-19-and-beyond

Szurdi, J., Starov, O., McCabe, A., Chen, Z., Duan, R.: Studying how cybercriminals prey on the COVID-19 pandemic. [Online]. Available: https://unit42.paloaltonetworks.com/how-cybercriminals-prey-on-the-covid-19-pandemic/

Albladi, S.M., Weir, G.R.: Predicting individuals’ vulnerability to social engineering in social networks. Cybersecur. 3 (1), 1–19 (2020)

Lansley, M., Kapetanakis, S., Polatidis, N.: SEADer++ v2: detecting social engineering attacks using natural language processing and machine learning. In: 2020 International Conference on Innovations in Intelligent Systems and Applications (INISTA), pp. 1–6. IEEE (2020)

Basit, A., Zafar, M., Liu, X., Javed, A.R., Jalil, Z., Kifayat, K.: A comprehensive survey of AI-enabled phishing attacks detection techniques. Telecommun. Syst. 76 (1), 139–154 (2020). https://doi.org/10.1007/s11235-020-00733-2

Abreu, J.V.F., Fernandes, J.H.C., Gondim, J.J.C., Ralha, C.G.: Bot development for social engineering attacks on Twitter. arXiv preprint arXiv:2007.11778 (2020)

Smith, A., Papadaki, M., Furnell, S.M.: Improving awareness of social engineering attacks. In: Dodge, R.C., Futcher, L. (eds.) WISE 2009/2011/2013. IAICT, vol. 406, pp. 249–256. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-39377-8_29

Chapter   Google Scholar  

Saleem, J., Hammoudeh, M.: Defense methods against social engineering attacks. In: Daimi, K. (ed.) Computer and Network Security Essentials, pp. 603–618. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-58424-9_35

Zulkurnain, A.U., Hamidy, A., Husain, A.B., Chizari, H.: Social engineering attack mitigation. Int. J. Math. Comput. Sci. 1 (4), 188–198 (2015)

Bullée, J.-W., Montoya, L., Pieters, W., Junger, M., Hartel, P.H.: The persuasion and security awareness experiment: reducing the success of social engineering attacks. J. Exp. Criminol. 11 , 97–115 (2015)

Parthy, P.P., Rajendran, G.: Identification and prevention of social engineering attacks on an enterprise. In: 2019 International Carnahan Conference on Security Technology (ICCST), pp. 1–5. IEEE (2019)

Aldawood, H.A., Skinner, G.: A critical appraisal of contemporary cyber security social engineering solutions: measures, policies, tools and applications. In: 2018 26th International Conference on Systems Engineering (ICSEng), pp. 1–6. IEEE (2018)

Aldawood, H., Skinner, G.: An academic review of current industrial and commercial cyber security social engineering solutions. In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, pp. 110–115 (2019)

Campbell, C.C.: Solutions for counteracting human deception in social engineering attacks. Inf. Technol. People 32 (5), 1130–1152 (2019)

Heartfield, R., Loukas, G., Gan, D.: You are probably not the weakest link: towards practical prediction of susceptibility to semantic social engineering attacks. IEEE Access 4 , 6910–6928 (2016)

Google. Improving malicious document detection in gmail with deeplearning (2020). [Online]. Available: https://security.googleblog.com/2020/02/improving-malicious-document-detection.html . Accessed 16 January 2021

World Health Organisation. How to report misinformation online (2020). [Online]. Available: https://www.who.int/campaigns/connecting-the-world-to-combat-coronavirus/how-to-report-misinformation-online . Accessed 16 January 2021

W.H.O. Coronavirus disease (COVID-19) advice for the public: mythbusters (2020). [Online]. Available: https://www.who.int/emergencies/diseases/novel-coronavirus-2019/advice-for-public/myth-busters . Accessed 16 January 2021

U.Gov. (2020) Go viral! a 5 minute game that helps protect you against COVID-19 misinformation. [Online]. Available: https://www.goviralgame.com/en?utm_source=EO&utm_medium=SocialMedia&utm_campaign=goviral&utm_content=Eng . Accessed 16 January 2021

WHO. Countering misinformation with the government of the United Kingdom (2020). [Online]. Available: https://www.who.int/news-room/feature-stories/detail/countering-misinformation-about-covid-19 . Accessed 16 January 2021

Shafi, M., et al.: 5g: a tutorial overview of standards, trials, challenges, deployment, and practice. IEEE J Sel. Areas Commun. 35 (6), 1201–1221 (2017)

Cresci, S.: A decade of social bot detection. Commun. ACM 63 (10), 72–83 (2020)

Heidari, M., Jones, J.H.: Using bert to extract topic-independent sentiment features for social media bot detection. In: 11th IEEE Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON), vol. 2020, pp. 0542–0547. IEEE (2020)

Kudugunta, S., Ferrara, E.: Deep neural networks for bot detection. Inf. Sci. 467 , 312–322 (2018)

Wu, W., Alvarez, J., Liu, C., Sun, H.-M.: Bot detection using unsupervised machine learning. Microsyst. Technol. 24 (1), 209–217 (2018)

Abou Daya, A., Salahuddin, M.A., Limam, N., Boutaba, R.: A graph-based machine learning approach for bot detection. In: IFIP/IEEE Symposium on Integrated Network and Service Management (IM), vol. 2019, pp. 144–152. IEEE (2019)

Huh, J.-H., Seo, Y.-S.: Understanding edge computing: engineering evolution with artificial intelligence. IEEE Access 7 , 164229–164245 (2019)

Xia, P., et al.: Don’t fish in troubled waters! characterizing coronavirus-themed cryptocurrency scams (2020)

Weber, K., Schütz, A., Fertig, T., Müller, N.: Exploiting the human factor: social engineering attacks on cryptocurrency users 07 , 650–668 (2020)

Khan, W.Z., Ahmed, E., Hakak, S., Yaqoob, I., Ahmed, A.: Edge computing: a survey. Future Gener. Comput. Syst. 97 , 219–235 (2019)

Hakak, S., Ray, S., Khan, W.Z., Scheme, E.: A framework for edge-assisted healthcare data analytics using federated learning. In: IEEE International Workshop on Data Analytics for Smart Health (DASH) 2020. IEEE BigData (2020)

Hakak, S., Khan, W.Z., Gilkar, G.A., Haider, N., Imran, M., Alkatheiri, M.S.: Industrial wastewater management using blockchain technology: architecture, requirements, and future directions. IEEE Internet of Things Mag. 3 (2), 38–43 (2020)

Download references

Author information

Authors and affiliations.

Faculty of Computer Science, University of New Brunswick, Fredericton, Canada

Nikol Mashtalyar, Uwera Nina Ntaganzwa, Thales Santos, Saqib Hakak & Suprio Ray

You can also search for this author in PubMed   Google Scholar

Corresponding authors

Correspondence to Nikol Mashtalyar , Uwera Nina Ntaganzwa , Thales Santos , Saqib Hakak or Suprio Ray .

Editor information

Editors and affiliations.

San Jose State University, San Jose, CA, USA

Abbas Moallem

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Cite this paper.

Mashtalyar, N., Ntaganzwa, U.N., Santos, T., Hakak, S., Ray, S. (2021). Social Engineering Attacks: Recent Advances and Challenges. In: Moallem, A. (eds) HCI for Cybersecurity, Privacy and Trust. HCII 2021. Lecture Notes in Computer Science(), vol 12788. Springer, Cham. https://doi.org/10.1007/978-3-030-77392-2_27

Download citation

DOI : https://doi.org/10.1007/978-3-030-77392-2_27

Published : 03 July 2021

Publisher Name : Springer, Cham

Print ISBN : 978-3-030-77391-5

Online ISBN : 978-3-030-77392-2

eBook Packages : Computer Science Computer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Publish with us

Policies and ethics

  • Find a journal
  • Track your research

An Expert System as an Awareness Tool to Prevent Social Engineering Attacks in Public Organizations

International Journal on Cybernetics & Informatics (IJCI) Vol. 12, No.5, October 2023

10 Pages Posted: 5 Sep 2023

Waldson Rodrigues Cardoso

Universidade Federal de Sergipe

João Marco Silva

University of Minho

Admilson de Ribamar Lima Ribeiro

Date Written: October 5, 2023

This article highlights the development of an awareness tool in the form of an expert system to prevent social engineering attacks in public organizations. Social engineering attacks have significant consequences for organizations, resulting in security breaches, loss of confidential information, and reputation damage. While protective measures such as awareness training and security policies have been implemented, there is still room for improvement. The tool under development will empower users to identify and avoid psychological manipulation techniques used by attackers, thereby strengthening information security and mitigating associated risks. It addresses key concepts in information security and includes interactive modules based on learning theories, as well as artificial intelligence capabilities to identify vulnerabilities. Once developed and validated, it is expected that this tool will significantly contribute to awareness and protection against social engineering attacks in public organizations, enhancing information security and reducing risks.

Keywords: Social Engineering Attacks, Information Security, Expert System, Awareness, Mitigation

Suggested Citation: Suggested Citation

Waldson Rodrigues Cardoso (Contact Author)

Universidade federal de sergipe ( email ).

Cidade Universitária Prof. Jose Aloisio de Campos Jardim Rosa Elze, Av. Marechal Rondon Sao Cristovao, Sergipe 491000-000 Brazil

University of Minho ( email )

Braga, 4700 Portugal

Do you have a job opening that you would like to promote on SSRN?

Paper statistics, related ejournals, information systems & economics ejournal.

Subscribe to this fee journal for more curated articles on this topic

Applied Computing eJournal

Electrical engineering ejournal, psychology research methods ejournal.

chrome icon

Social Engineering Attacks Prevention: A Systematic Literature Review

Chat with Paper

The Commonalities in Social Engineering Attacks through E-Commerce Shopping Platforms & Online Gaming Programs

Advanced technique for causing immediate threats to prevent social engineering attacks, social engineering attack types and prevention techniques- a survey, cybersecurity in cyber–physical power systems, security of cryptocurrencies: a view on the state-of-the-art research and current developments, social engineering detection using neural networks, an eye for deception: a case study in utilizing the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks, social engineering and the dangers of phishing, finite state machine for the social engineering attack detection model: seadm, utility analysis on privacy-preservation algorithms for online social networks: an empirical study, related papers (5), innovations of phishing defense: the mechanism, measurement and defense strategies, a survey of network attacks based on protocol vulnerabilities, improving distributed vulnerability assessment model of cybersecurity, social engineering attacks: a survey, trending questions (3).

- Human firewalls effective in preventing social engineering attacks. - No direct comparison with traditional security measures provided.

To avoid social engineering attacks, utilize prevention methods like health campaigns, human as security sensor frameworks, user-centric frameworks, and user vulnerability models, as suggested in the literature review.

The provided paper does not mention any limitations of agent-based models in detecting and preventing social engineering attacks.

Analysing Social Engineering Attacks and its Impact

  • December 2023

Akinola Olusanya at Bournemouth University

  • Bournemouth University

Oluwatosin Bukola Adeniji at Bournemouth University

Discover the world's research

  • 25+ million members
  • 160+ million publication pages
  • 2.3+ billion citations
  • Recruit researchers
  • Join for free
  • Login Email Tip: Most researchers use their institutional email address as their ResearchGate login Password Forgot password? Keep me logged in Log in or Continue with Google Welcome back! Please log in. Email · Hint Tip: Most researchers use their institutional email address as their ResearchGate login Password Forgot password? Keep me logged in Log in or Continue with Google No account? Sign up

IMAGES

  1. Five Ways To Prevent Social Engineering Attacks

    how to prevent social engineering attacks research paper

  2. Social Engineering Attacks

    how to prevent social engineering attacks research paper

  3. Understanding Social Engineering Techniques

    how to prevent social engineering attacks research paper

  4. How To Stop Social Engineering Attacks? 4 Ways to Prevent It

    how to prevent social engineering attacks research paper

  5. (PDF) Social Engineering Attacks Prevention: A Systematic Literature Review

    how to prevent social engineering attacks research paper

  6. What is Social Engineering and How Can You Protect Yourself?

    how to prevent social engineering attacks research paper

VIDEO

  1. What is Social Engineering? Attacks Categories

  2. Social Engineering Attacks: Threats and Protection Methods #SocialEngineering #CyberSecurity #Threat

  3. Hacking and Social Engineering. Science on the Edge

  4. Social Engineering Explored Demo

  5. Social Engineering in Cybersecurity

  6. Social Engineering Toolkit

COMMENTS

  1. Social Engineering Attacks Prevention: A Systematic ...

    We found the protocol to effectively prevent social engineering attacks, such as health campaigns, the vulnerability of social engineering victims, and co-utile protocol, which can manage information sharing on a social network.

  2. (PDF) Social Engineering Attacks Prevention: A Systematic ...

    The current research explains user studies, constructs, evaluation, concepts, frameworks, models, and methods to prevent social engineering attacks.

  3. Defending against social engineering attacks: A security ...

    This paper proposes a systematic approach to generate countermeasures based on a typical social engineering attack process. Specifically, we systematically ‘attack’ each step of social engineering attacks to prevent, mitigate, or eliminate them, resulting in 62 countermeasures.

  4. (PDF) Social Engineering Attacks: Techniques, Impacts, and ...

    The paper examines various social engineering techniques employed by attackers, the impacts of successful attacks on organizations and individuals, and mitigation strategies to prevent or...

  5. White Paper: Social Engineering Attacks and Prevention - SSRN

    Social engineering has emerged as a leading threat vector, exploiting the weakest link in the security chain—human psychology. This paper explores the various facets of social engineering attacks, their impact on individuals and organizations, and robust prevention strategies.

  6. Social Engineering Attacks: How to Prevent - Semantic Scholar

    Through an in-depth analysis of social engineering attacks, this paper aims to raise awareness about the evolving threat landscape and provides actionable strategies for effective prevention. Nowadays social engineering attacks are incredibly important for all mobile and computer users.

  7. Social Engineering Attacks: Recent Advances and Challenges

    Social engineering attacks are an urgent security threat, with the number of detected attacks rising each year. In 2011, a global survey of 853 informa-tion technology professionals revealed that 48% of large companies have experi-enced 25 or more social engineering attacks in the past two years [1].

  8. An Expert System As An Awareness Tool To Prevent Social ...

    This section presents a review of relevant studies related to social engineering in organizations. These studies address the threats and trends of social engineering, mitigation strategies, educational tools, and models to increase awareness and resistance against social engineering attacks.

  9. Social Engineering Attacks Prevention: A Systematic ...

    We found the protocol to effectively prevent social engineering attacks, such as health campaigns, the vulnerability of social engineering victims, and co-utile protocol, which can manage information sharing on a social network. We present this systematic literature review to recommend ways to prevent social engineering attacks.

  10. Analysing Social Engineering Attacks and its Impact

    To summarise, this study aims to improve knowledge, defence, and avoidance of social engineering assaults by providing a comprehensive viewpoint on these attacks. Discover the world's...