An Enhanced Analysis of Social Engineering in Cyber Security Research Challenges, Countermeasures: A Survey

Authors

  • Muhammad Umar Adil Department of Information Security, Faculty of Computer Science & IT Superior University Lahore, 54000, Pakistan.
  • Sajjad Ali Department of Information Security, Faculty of Computer Science & IT Superior University Lahore, 54000, Pakistan.
  • Ali Haider DELL SecureWorks, Pakistan.
  • M. Aetsam Javed Department of Computer Science, Faculty of Computer Science & IT Superior University Lahore, 54000, Pakistan, Pakistan.
  • Hamayun Khan Department of Computer Science, Faculty of Computer Science & IT Superior University Lahore, 54000, Pakistan, Pakistan.

DOI:

https://doi.org/10.62019/abbdm.v4i4.274

Keywords:

: Social Engineering, Cybersecurity, Human Vulnerabilities, Technological Weaknesses, Social Engineering Attacks, Psychological Underpinnings, Organizational Impact, Individual Impact, Countermeasures, Vishing, Voice Mining.

Abstract

The improvements in digital communication have made communication between humans very instant. However, personal and sensitive information may be available online through social networks and online services that lack the security measures to protect this information. Social engineering attacks are inevitable and imperil the integrity, security, and confidentiality of the information used on social media platforms. Prominent technologies, such as blockchain, artificial intelligence (AI), and proactive access controls, were adopted in the literature to confront the social engineering attacks on social media. Social engineering has emerged as a significant threat in the realm of cybersecurity, exploiting human vulnerabilities rather than technological weaknesses. This review paper explores the various forms of social engineering attacks, their psychological underpinnings, and their impact on organizations and individuals. Furthermore, it examines current countermeasures and highlights gaps in existing approaches, proposing directions for future research and development in mitigating social engineering threats. Lastly, we shed light on the open issues and research challenges of social engineering attacks where research gaps still exist and require further investigation.  

Downloads

Published

2024-12-28

How to Cite

An Enhanced Analysis of Social Engineering in Cyber Security Research Challenges, Countermeasures: A Survey. (2024). The Asian Bulletin of Big Data Management , 4(4), 321-331. https://doi.org/10.62019/abbdm.v4i4.274

Similar Articles

1-10 of 181

You may also start an advanced similarity search for this article.

Most read articles by the same author(s)