Journal of Information Security

Volume 12, Issue 1 (January 2021)

ISSN Print: 2153-1234   ISSN Online: 2153-1242

Google-based Impact Factor: 3.79  Citations  

Systematic Review on Social Engineering: Hacking by Manipulating Humans

HTML  XML Download Download as PDF (Size: 250KB)  PP. 104-114  
DOI: 10.4236/jis.2021.121005    1,176 Downloads   6,700 Views  Citations

ABSTRACT

Despite the availability of advanced security software and hardware mechanisms available, still, there has been a breach in the defence system of an organization or individual. Social engineering mostly targets the weakest link in the security system i.e. “Humans” for gaining access to sensitive information by manipulating human psychology. Social engineering attacks are arduous to defend as such attacks are not easily detected by available security software or hardware. This article surveys recent studies on social engineering attacks with discussion on the social engineering phases and categorizing the various attacks into two groups. The main aim of this survey is to examine the various social engineering attacks on individuals and countermeasures against social engineering attacks are also discussed.

Share and Cite:

Sekhar Bhusal, C. (2021) Systematic Review on Social Engineering: Hacking by Manipulating Humans. Journal of Information Security, 12, 104-114. doi: 10.4236/jis.2021.121005.

Cited by

[1] Social Engineering Attack Concepts, Frameworks, and Awareness: A Systematic Literature Review
International Journal of Computing …, 2023
[2] Soceng Warriors: Game-Based Learning to Increase Security Awareness Against Social Engineering Attacks
2022 IEEE 8th …, 2022
[3] Social Engineering Threats Towards Non-IT Students: A Case Study on Mitigation Strategies
2022
[4] Individual's motivation in responding to phishing emails: a Saudi Arabian Case Study
2022
[5] Mitigating Social Engineering Attack: A Focus on the Weak Human Link
2022 5th Information Technology for …, 2022
[6] Social Engineering: The Effects of Cybercriminals on the Human Mind
2022
[7] An Effective Blockchain-Based Defense Model for Organizations against Vishing Attacks
Applied Sciences, 2022
[8] Measuring Awareness of Social Engineering in the Educational Sector in the Kingdom of Saudi Arabia
2021
[9] A mamdani type fuzzy inference system to calculate employee susceptibility to phishing attacks
Applied Sciences, 2021
[10] Analiza kibernetičkih napada temeljenih na metodama socijalnog inženjeringa
2021

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.