社会工程(安全)
利用
计算机安全
脆弱性(计算)
安全工程
计算机科学
妥协
网络钓鱼
风险分析(工程)
信息安全
业务
保安服务
网络安全策略
政治学
万维网
互联网
法学
作者
Murtaza Ahmed Siddiqi,Wooguil Pak,Moquddam A. Siddiqi
出处
期刊:Applied sciences
[Multidisciplinary Digital Publishing Institute]
日期:2022-06-14
卷期号:12 (12): 6042-6042
被引量:62
摘要
As cybersecurity strategies become more robust and challenging, cybercriminals are mutating cyberattacks to be more evasive. Recent studies have highlighted the use of social engineering by criminals to exploit the human factor in an organization’s security architecture. Social engineering attacks exploit specific human attributes and psychology to bypass technical security measures for malicious acts. Social engineering is becoming a pervasive approach used for compromising individuals and organizations (is relatively more convenient to compromise a human compared to discovering a vulnerability in the security system). Social engineering-based cyberattacks are extremely difficult to counter as they do not follow specific patterns or approaches for conducting an attack, making them highly effective, efficient, easy, and obscure approaches for compromising any organization. To counter such attacks, a better understanding of the attack tactics is highly essential. Hence, this paper provides an in-depth analysis of the approaches used to conduct social engineering-based cyberattacks. This study discusses human vulnerabilities employed by criminals in recent security breaches. Further, the paper highlights the existing approaches, including machine learning-based methods, to counter social engineering-based cyberattacks.
科研通智能强力驱动
Strongly Powered by AbleSci AI