This paper gives a systematic analysis of social engineering attacks, including their categorizations, methods of detection, and strategies for mitigating them. Digital technology has recently advanced, making human-to-human contact easier and faster than before. However, without the proper safeguards, social media platforms and internet services could reveal confidential and sensitive information. Malicious actors can easily access communication networks by employing social engineering techniques. Hackers use social engineering to obtain sensitive data from victims, such as bank account details, passwords, and medical histories, for their own gain. Social engineering poses a serious threat to network security because it preys on people’s innate tendency toward trust. The paper carefully assesses reverse social engineering (RSE) and its impact on social engineering attacks.
Comprehensive Assessment of Reverse Social Engineering to Understand Social Engineering Attacks
Ayush Bishnoi,Garv,Sagar Bishnoi,Neha Gupta
Published 2023 in 2023 5th International Conference on Smart Systems and Inventive Technology (ICSSIT)
ABSTRACT
PUBLICATION RECORD
- Publication year
2023
- Venue
2023 5th International Conference on Smart Systems and Inventive Technology (ICSSIT)
- Publication date
2023-01-23
- Fields of study
Not labeled
- Identifiers
- External record
- Source metadata
Semantic Scholar
CITATION MAP
EXTRACTION MAP
CLAIMS
- No claims are published for this paper.
CONCEPTS
- No concepts are published for this paper.
REFERENCES
Showing 1-14 of 14 references · Page 1 of 1
CITED BY
Showing 1-6 of 6 citing papers · Page 1 of 1