Access Millions of academic & study documents

Social engineering attacks a survey

Content type
User Generated
Showing Page:
1/17

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/17

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/17

Sign up to view the full document!

lock_open Sign Up
Showing Page:
4/17

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 17 pages?
Access Now
Unformatted Attachment Preview
future internet Review Social Engineering Attacks: A Survey Fatima Salahdine * and Naima Kaabouch School of Electrical Engineering and Computer Science, University of North Dakota, Grand Forks, ND 58202, USA; naima.kaabouch@und.edu * Correspondence: fatima.salahdine@und.edu; Tel.: +1-701-777-4460 Received: 15 February 2019; Accepted: 27 March 2019; Published: 2 April 2019   Abstract: The advancements in digital communication technology have made communication between humans more accessible and instant. However, personal and sensitive information may be available online through social networks and online services that lack the security measures to protect this information. Communication systems are vulnerable and can easily be penetrated by malicious users through social engineering attacks. These attacks aim at tricking individuals or enterprises into accomplishing actions that benefit attackers or providing them with sensitive data such as social security number, health records, and passwords. Social engineering is one of the biggest challenges facing network security because it exploits the natural human tendency to trust. This paper provides an in-depth survey about the social engineering attacks, their classifications, detection strategies, and prevention procedures. Keywords: social engineering attacks; cyber security; phishing; vishing; spear phishing; scams; baiting; robocalls 1. Introduction Social engineering attacks are rapidly increasing in t ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Indeed
4.5
Sitejabber
4.4