IEEE Account
- Change Username/Password
- Update Address
Purchase Details
- Payment Options
- Order History
- View Purchased Documents
Profile Information
- Communications Preferences
- Profession and Education
- Technical Interests
- US & Canada: +1 800 678 4333
- Worldwide: +1 732 981 0060
- Contact & Support
- About IEEE Xplore
- Accessibility
- Terms of Use
- Nondiscrimination Policy
- Privacy & Opting Out of Cookies
A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.
- DOI: 10.33847/2686-8296.6.1_3
- Corpus ID: 270841538
Social Engineering Attacks: How to Prevent
- Lilit Manukyan , Mariam Gevorgyan
- Published in Journal of Digital Science 27 June 2024
- Computer Science, Psychology
8 References
Social engineering attacks during the covid-19 pandemic, on the anatomy of social engineering attacks—a literature‐based dissection of successful attacks, the role of employees' information security awareness on the intention to resist social engineering, phishing for phishing awareness, virtuous human hacking: the ethics of social engineering in penetration-testing, virtual human role players for studying social factors in organizational decision making, review of security engineering: a guide to building dependable distributed systems, 2nd edition by ross j. anderson, cybersecurity, social engineering, artificial intelligence, technological addictions: societal challenges for the coming decade, related papers.
Showing 1 through 3 of 0 Related Papers
Social Engineering Attacks: Recent Advances and Challenges
- Conference paper
- First Online: 03 July 2021
- Cite this conference paper
- Nikol Mashtalyar 9 ,
- Uwera Nina Ntaganzwa 9 ,
- Thales Santos 9 ,
- Saqib Hakak 9 &
- Suprio Ray 9
Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 12788))
Included in the following conference series:
- International Conference on Human-Computer Interaction
3035 Accesses
10 Citations
The world’s technological landscape is continuously evolving with new possibilities, yet also evolving in parallel with the emergence of new threats. Social engineering is of predominant concern for industries, governments and institutions due to the exploitation of their most valuable resource, their people. Social engineers prey on the psychological weaknesses of humans with sophisticated attacks, which pose serious cybersecurity threats to digital infrastructure. Social engineers use deception and manipulation by means of human computer interaction to exploit privacy and cybersecurity concerns. Numerous forms of attacks have been observed, which can target a range of resources such as intellectual property, confidential data and financial resources. Therefore, institutions must be prepared for any kind of attack that may be deployed and demonstrate willingness to implement new defense strategies. In this article, we present the state-of-the-art social engineering attacks, their classification and various mitigation strategies.
This is a preview of subscription content, log in via an institution to check access.
Access this chapter
Subscribe and save.
- Get 10 units per month
- Download Article/Chapter or eBook
- 1 Unit = 1 Article or 1 Chapter
- Cancel anytime
- Available as PDF
- Read on any device
- Instant download
- Own it forever
- Available as EPUB and PDF
- Compact, lightweight edition
- Dispatched in 3 to 5 business days
- Free shipping worldwide - see info
Tax calculation will be finalised at checkout
Purchases are for personal use only
Institutional subscriptions
Similar content being viewed by others
Social Engineering as the Art of Deception in Cyber-Attacks: A Mapping Review
Overview of Social Engineering Protection and Prevention Methods
A Study on Social Engineering Attacks in Cybersecurity
Wang, Z., Sun, L., Zhu, H.: Defining social engineering in cybersecurity. IEEE Access 8 , 85094–85115 (2020)
Article Google Scholar
Salahdine, F., Kaabouch, N.: Social engineering attacks: a survey. Future Internet 11 (4), 89 (2019)
Albladi, S.M., Weir, G.R.S.: User characteristics that influence judgment of social engineering attacks in social networks. Hum.-Cent. Comput. Inf. Sci. 8 (1), 1–24 (2018). https://doi.org/10.1186/s13673-018-0128-7
Williams, E.J., Hinds, J., Joinson, A.N.: Exploring susceptibility to phishing in the workplace. Int. J. Hum. Comput. Stud. 120 , 1–13 (2018)
Breda, F., Barbosa, H., Morais, T.: Social engineering and cyber security. In: Proceedings of International Technology, Education and Development Conference (2017)
Google Scholar
Kumar, A., Chaudhary, M., Kumar, N.: Social engineering threats and awareness: a survey. Eur. J. Adv. Eng. Tech. 2 (11), 15–19 (2015)
MathSciNet Google Scholar
Hakak, S., Khan, W.Z., Imran, M., Choo, K.-K.R., Shoaib, M.: Have you been a victim of COVID-19-related cyber incidents? Survey, taxonomy, and mitigation strategies. IEEE Access 8 , 124134–124144 (2020)
FBI. Federal agencies warn of emerging fraud schemes related to COVID-19 vaccines. [Online]. Available: https://www.fbi.gov/news/pressrel/press-releases/federal-agencies-warn-of-emerging-fraud-schemes-related-to-covid-19-vaccines
Alzahrani, A.: Coronavirus social engineering attacks: issues and recommendations. Int. J. Adv. Comput. Sci. Appl. 11 (5), 9 (2020). https://doi.org/10.14569/IJACSA.2020.0110523
Article MathSciNet Google Scholar
Google. Protecting businesses against cyber threats during COVID-19 and beyond. [Online]. Available: https://cloud.google.com/blog/products/identity-security/protecting-against-cyber-threats-during-covid-19-and-beyond
Szurdi, J., Starov, O., McCabe, A., Chen, Z., Duan, R.: Studying how cybercriminals prey on the COVID-19 pandemic. [Online]. Available: https://unit42.paloaltonetworks.com/how-cybercriminals-prey-on-the-covid-19-pandemic/
Albladi, S.M., Weir, G.R.: Predicting individuals’ vulnerability to social engineering in social networks. Cybersecur. 3 (1), 1–19 (2020)
Lansley, M., Kapetanakis, S., Polatidis, N.: SEADer++ v2: detecting social engineering attacks using natural language processing and machine learning. In: 2020 International Conference on Innovations in Intelligent Systems and Applications (INISTA), pp. 1–6. IEEE (2020)
Basit, A., Zafar, M., Liu, X., Javed, A.R., Jalil, Z., Kifayat, K.: A comprehensive survey of AI-enabled phishing attacks detection techniques. Telecommun. Syst. 76 (1), 139–154 (2020). https://doi.org/10.1007/s11235-020-00733-2
Abreu, J.V.F., Fernandes, J.H.C., Gondim, J.J.C., Ralha, C.G.: Bot development for social engineering attacks on Twitter. arXiv preprint arXiv:2007.11778 (2020)
Smith, A., Papadaki, M., Furnell, S.M.: Improving awareness of social engineering attacks. In: Dodge, R.C., Futcher, L. (eds.) WISE 2009/2011/2013. IAICT, vol. 406, pp. 249–256. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-39377-8_29
Chapter Google Scholar
Saleem, J., Hammoudeh, M.: Defense methods against social engineering attacks. In: Daimi, K. (ed.) Computer and Network Security Essentials, pp. 603–618. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-58424-9_35
Zulkurnain, A.U., Hamidy, A., Husain, A.B., Chizari, H.: Social engineering attack mitigation. Int. J. Math. Comput. Sci. 1 (4), 188–198 (2015)
Bullée, J.-W., Montoya, L., Pieters, W., Junger, M., Hartel, P.H.: The persuasion and security awareness experiment: reducing the success of social engineering attacks. J. Exp. Criminol. 11 , 97–115 (2015)
Parthy, P.P., Rajendran, G.: Identification and prevention of social engineering attacks on an enterprise. In: 2019 International Carnahan Conference on Security Technology (ICCST), pp. 1–5. IEEE (2019)
Aldawood, H.A., Skinner, G.: A critical appraisal of contemporary cyber security social engineering solutions: measures, policies, tools and applications. In: 2018 26th International Conference on Systems Engineering (ICSEng), pp. 1–6. IEEE (2018)
Aldawood, H., Skinner, G.: An academic review of current industrial and commercial cyber security social engineering solutions. In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, pp. 110–115 (2019)
Campbell, C.C.: Solutions for counteracting human deception in social engineering attacks. Inf. Technol. People 32 (5), 1130–1152 (2019)
Heartfield, R., Loukas, G., Gan, D.: You are probably not the weakest link: towards practical prediction of susceptibility to semantic social engineering attacks. IEEE Access 4 , 6910–6928 (2016)
Google. Improving malicious document detection in gmail with deeplearning (2020). [Online]. Available: https://security.googleblog.com/2020/02/improving-malicious-document-detection.html . Accessed 16 January 2021
World Health Organisation. How to report misinformation online (2020). [Online]. Available: https://www.who.int/campaigns/connecting-the-world-to-combat-coronavirus/how-to-report-misinformation-online . Accessed 16 January 2021
W.H.O. Coronavirus disease (COVID-19) advice for the public: mythbusters (2020). [Online]. Available: https://www.who.int/emergencies/diseases/novel-coronavirus-2019/advice-for-public/myth-busters . Accessed 16 January 2021
U.Gov. (2020) Go viral! a 5 minute game that helps protect you against COVID-19 misinformation. [Online]. Available: https://www.goviralgame.com/en?utm_source=EO&utm_medium=SocialMedia&utm_campaign=goviral&utm_content=Eng . Accessed 16 January 2021
WHO. Countering misinformation with the government of the United Kingdom (2020). [Online]. Available: https://www.who.int/news-room/feature-stories/detail/countering-misinformation-about-covid-19 . Accessed 16 January 2021
Shafi, M., et al.: 5g: a tutorial overview of standards, trials, challenges, deployment, and practice. IEEE J Sel. Areas Commun. 35 (6), 1201–1221 (2017)
Cresci, S.: A decade of social bot detection. Commun. ACM 63 (10), 72–83 (2020)
Heidari, M., Jones, J.H.: Using bert to extract topic-independent sentiment features for social media bot detection. In: 11th IEEE Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON), vol. 2020, pp. 0542–0547. IEEE (2020)
Kudugunta, S., Ferrara, E.: Deep neural networks for bot detection. Inf. Sci. 467 , 312–322 (2018)
Wu, W., Alvarez, J., Liu, C., Sun, H.-M.: Bot detection using unsupervised machine learning. Microsyst. Technol. 24 (1), 209–217 (2018)
Abou Daya, A., Salahuddin, M.A., Limam, N., Boutaba, R.: A graph-based machine learning approach for bot detection. In: IFIP/IEEE Symposium on Integrated Network and Service Management (IM), vol. 2019, pp. 144–152. IEEE (2019)
Huh, J.-H., Seo, Y.-S.: Understanding edge computing: engineering evolution with artificial intelligence. IEEE Access 7 , 164229–164245 (2019)
Xia, P., et al.: Don’t fish in troubled waters! characterizing coronavirus-themed cryptocurrency scams (2020)
Weber, K., Schütz, A., Fertig, T., Müller, N.: Exploiting the human factor: social engineering attacks on cryptocurrency users 07 , 650–668 (2020)
Khan, W.Z., Ahmed, E., Hakak, S., Yaqoob, I., Ahmed, A.: Edge computing: a survey. Future Gener. Comput. Syst. 97 , 219–235 (2019)
Hakak, S., Ray, S., Khan, W.Z., Scheme, E.: A framework for edge-assisted healthcare data analytics using federated learning. In: IEEE International Workshop on Data Analytics for Smart Health (DASH) 2020. IEEE BigData (2020)
Hakak, S., Khan, W.Z., Gilkar, G.A., Haider, N., Imran, M., Alkatheiri, M.S.: Industrial wastewater management using blockchain technology: architecture, requirements, and future directions. IEEE Internet of Things Mag. 3 (2), 38–43 (2020)
Download references
Author information
Authors and affiliations.
Faculty of Computer Science, University of New Brunswick, Fredericton, Canada
Nikol Mashtalyar, Uwera Nina Ntaganzwa, Thales Santos, Saqib Hakak & Suprio Ray
You can also search for this author in PubMed Google Scholar
Corresponding authors
Correspondence to Nikol Mashtalyar , Uwera Nina Ntaganzwa , Thales Santos , Saqib Hakak or Suprio Ray .
Editor information
Editors and affiliations.
San Jose State University, San Jose, CA, USA
Abbas Moallem
Rights and permissions
Reprints and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper.
Mashtalyar, N., Ntaganzwa, U.N., Santos, T., Hakak, S., Ray, S. (2021). Social Engineering Attacks: Recent Advances and Challenges. In: Moallem, A. (eds) HCI for Cybersecurity, Privacy and Trust. HCII 2021. Lecture Notes in Computer Science(), vol 12788. Springer, Cham. https://doi.org/10.1007/978-3-030-77392-2_27
Download citation
DOI : https://doi.org/10.1007/978-3-030-77392-2_27
Published : 03 July 2021
Publisher Name : Springer, Cham
Print ISBN : 978-3-030-77391-5
Online ISBN : 978-3-030-77392-2
eBook Packages : Computer Science Computer Science (R0)
Share this paper
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative
- Publish with us
Policies and ethics
- Find a journal
- Track your research
An Expert System as an Awareness Tool to Prevent Social Engineering Attacks in Public Organizations
International Journal on Cybernetics & Informatics (IJCI) Vol. 12, No.5, October 2023
10 Pages Posted: 5 Sep 2023
Waldson Rodrigues Cardoso
Universidade Federal de Sergipe
João Marco Silva
University of Minho
Admilson de Ribamar Lima Ribeiro
Date Written: October 5, 2023
This article highlights the development of an awareness tool in the form of an expert system to prevent social engineering attacks in public organizations. Social engineering attacks have significant consequences for organizations, resulting in security breaches, loss of confidential information, and reputation damage. While protective measures such as awareness training and security policies have been implemented, there is still room for improvement. The tool under development will empower users to identify and avoid psychological manipulation techniques used by attackers, thereby strengthening information security and mitigating associated risks. It addresses key concepts in information security and includes interactive modules based on learning theories, as well as artificial intelligence capabilities to identify vulnerabilities. Once developed and validated, it is expected that this tool will significantly contribute to awareness and protection against social engineering attacks in public organizations, enhancing information security and reducing risks.
Keywords: Social Engineering Attacks, Information Security, Expert System, Awareness, Mitigation
Suggested Citation: Suggested Citation
Waldson Rodrigues Cardoso (Contact Author)
Universidade federal de sergipe ( email ).
Cidade Universitária Prof. Jose Aloisio de Campos Jardim Rosa Elze, Av. Marechal Rondon Sao Cristovao, Sergipe 491000-000 Brazil
University of Minho ( email )
Braga, 4700 Portugal
Do you have a job opening that you would like to promote on SSRN?
Paper statistics, related ejournals, information systems & economics ejournal.
Subscribe to this fee journal for more curated articles on this topic
Applied Computing eJournal
Electrical engineering ejournal, psychology research methods ejournal.
Social Engineering Attacks Prevention: A Systematic Literature Review
Chat with Paper
The Commonalities in Social Engineering Attacks through E-Commerce Shopping Platforms & Online Gaming Programs
Advanced technique for causing immediate threats to prevent social engineering attacks, social engineering attack types and prevention techniques- a survey, cybersecurity in cyber–physical power systems, security of cryptocurrencies: a view on the state-of-the-art research and current developments, social engineering detection using neural networks, an eye for deception: a case study in utilizing the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks, social engineering and the dangers of phishing, finite state machine for the social engineering attack detection model: seadm, utility analysis on privacy-preservation algorithms for online social networks: an empirical study, related papers (5), innovations of phishing defense: the mechanism, measurement and defense strategies, a survey of network attacks based on protocol vulnerabilities, improving distributed vulnerability assessment model of cybersecurity, social engineering attacks: a survey, trending questions (3).
- Human firewalls effective in preventing social engineering attacks. - No direct comparison with traditional security measures provided.
To avoid social engineering attacks, utilize prevention methods like health campaigns, human as security sensor frameworks, user-centric frameworks, and user vulnerability models, as suggested in the literature review.
The provided paper does not mention any limitations of agent-based models in detecting and preventing social engineering attacks.
Analysing Social Engineering Attacks and its Impact
- December 2023
- Bournemouth University
Discover the world's research
- 25+ million members
- 160+ million publication pages
- 2.3+ billion citations
- Recruit researchers
- Join for free
- Login Email Tip: Most researchers use their institutional email address as their ResearchGate login Password Forgot password? Keep me logged in Log in or Continue with Google Welcome back! Please log in. Email · Hint Tip: Most researchers use their institutional email address as their ResearchGate login Password Forgot password? Keep me logged in Log in or Continue with Google No account? Sign up
IMAGES
VIDEO
COMMENTS
We found the protocol to effectively prevent social engineering attacks, such as health campaigns, the vulnerability of social engineering victims, and co-utile protocol, which can manage information sharing on a social network.
The current research explains user studies, constructs, evaluation, concepts, frameworks, models, and methods to prevent social engineering attacks.
This paper proposes a systematic approach to generate countermeasures based on a typical social engineering attack process. Specifically, we systematically ‘attack’ each step of social engineering attacks to prevent, mitigate, or eliminate them, resulting in 62 countermeasures.
The paper examines various social engineering techniques employed by attackers, the impacts of successful attacks on organizations and individuals, and mitigation strategies to prevent or...
Social engineering has emerged as a leading threat vector, exploiting the weakest link in the security chain—human psychology. This paper explores the various facets of social engineering attacks, their impact on individuals and organizations, and robust prevention strategies.
Through an in-depth analysis of social engineering attacks, this paper aims to raise awareness about the evolving threat landscape and provides actionable strategies for effective prevention. Nowadays social engineering attacks are incredibly important for all mobile and computer users.
Social engineering attacks are an urgent security threat, with the number of detected attacks rising each year. In 2011, a global survey of 853 informa-tion technology professionals revealed that 48% of large companies have experi-enced 25 or more social engineering attacks in the past two years [1].
This section presents a review of relevant studies related to social engineering in organizations. These studies address the threats and trends of social engineering, mitigation strategies, educational tools, and models to increase awareness and resistance against social engineering attacks.
We found the protocol to effectively prevent social engineering attacks, such as health campaigns, the vulnerability of social engineering victims, and co-utile protocol, which can manage information sharing on a social network. We present this systematic literature review to recommend ways to prevent social engineering attacks.
To summarise, this study aims to improve knowledge, defence, and avoidance of social engineering assaults by providing a comprehensive viewpoint on these attacks. Discover the world's...