期刊文献+

Systematic Review on Social Engineering: Hacking by Manipulating Humans

Systematic Review on Social Engineering: Hacking by Manipulating Humans
下载PDF
导出
摘要 Despite the availability of advanced security software and hardware mechanisms available, still, there has been a breach in the defence system of an organization or individual. Social engineering mostly targets the weakest link in the security system </span><i style="font-family:"font-size:10pt;"><span style="font-size:12px;font-family:Verdana;">i.e.</span></i><span style="font-family:Verdana;font-size:12px;"> “Humans” for gaining access to sensitive information by manipulating human psychology. Social engineering attacks are arduous to defend as such attacks are not easily detected by available security software or hardware. This article surveys recent studies on social engineering attacks with discussion on the social engineering phases and categorizing the various attacks into two groups. The main aim of this survey is to examine the various social engineering attacks on individuals and countermeasures against social engineering attacks are also discussed. Despite the availability of advanced security software and hardware mechanisms available, still, there has been a breach in the defence system of an organization or individual. Social engineering mostly targets the weakest link in the security system </span><i style="font-family:"font-size:10pt;"><span style="font-size:12px;font-family:Verdana;">i.e.</span></i><span style="font-family:Verdana;font-size:12px;"> “Humans” for gaining access to sensitive information by manipulating human psychology. Social engineering attacks are arduous to defend as such attacks are not easily detected by available security software or hardware. This article surveys recent studies on social engineering attacks with discussion on the social engineering phases and categorizing the various attacks into two groups. The main aim of this survey is to examine the various social engineering attacks on individuals and countermeasures against social engineering attacks are also discussed.
作者 Chandra Sekhar Bhusal Chandra Sekhar Bhusal(School of Science, Engineering and Information Technology, Federation University, Ballarat, Australia)
机构地区 School of Science
出处 《Journal of Information Security》 2021年第1期104-114,共11页 信息安全(英文)
关键词 Direct Human Interaction PHISHING Social Engineering Phases Preventive Measures Direct Human Interaction Phishing Social Engineering Phases Preventive Measures
  • 相关文献

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部