Emerging Threats and Countermeasures in Cybersecurity
by Gulshan Shrivastava, Rudra Pratap Ojha, Shashank Awasthi, Kavita Sharma, Himani Bansal
16Social Engineering Attacks: Detection and Prevention
Manpreet Kaur Aiden1, Sonia Chhabra2, Shweta Mayor Sabharwal3* and Alaa Ali Hameed4
1Maharishi University of Information Technology, Noida, India
2Sharda University, Greater Noida, India
3Galgotias University, Greater Noida, India
4Istinye University, Istanbul, Turkey
Abstract
Rapid technological advancements have made it simpler for people to connect and have made private information accessible on social networking and network platforms, some of which may not always be safe. This has made it easier for social engineering assaults to threaten and violate people’s confidentiality. Social engineering crimes are committed with the intent of duping customers and staff members into providing private information, like login credentials, while simultaneously spreading malware. Instead of employing technological devices and software, hackers find it easier to exploit people’s inherent predisposition to believe. As a result, attacks through social engineering are among the most harmful ones that compromise the confidentiality and safety of individuals and businesses. This chapter investigates attempts at social engineering, which take advantage of psychological vulnerabilities to manipulate people and organizations. It gives an overview of the different forms, purposes, and aims of social engineering. Even with conventional methods of attack, the psychological strategies employed by social engineers are explored. The various detection ...