15
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Social Engineering Attacks: A Survey

      ,
      Future Internet
      MDPI AG

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          The advancements in digital communication technology have made communication between humans more accessible and instant. However, personal and sensitive information may be available online through social networks and online services that lack the security measures to protect this information. Communication systems are vulnerable and can easily be penetrated by malicious users through social engineering attacks. These attacks aim at tricking individuals or enterprises into accomplishing actions that benefit attackers or providing them with sensitive data such as social security number, health records, and passwords. Social engineering is one of the biggest challenges facing network security because it exploits the natural human tendency to trust. This paper provides an in-depth survey about the social engineering attacks, their classifications, detection strategies, and prevention procedures.

          Related collections

          Most cited references50

          • Record: found
          • Abstract: not found
          • Article: not found

          Advanced social engineering attacks

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Security and privacy challenges in smart cities

              Bookmark
              • Record: found
              • Abstract: found
              • Article: found
              Is Open Access

              Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes

              The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or “things” to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in terms of the confidentiality, authenticity, and integrity of the data sensed, collected, and exchanged by the IoT objects. These challenges make smart homes extremely vulnerable to different types of security attacks, resulting in IoT-based smart homes being insecure. Therefore, it is necessary to identify the possible security risks to develop a complete picture of the security status of smart homes. This article applies the operationally critical threat, asset, and vulnerability evaluation (OCTAVE) methodology, known as OCTAVE Allegro, to assess the security risks of smart homes. The OCTAVE Allegro method focuses on information assets and considers different information containers such as databases, physical papers, and humans. The key goals of this study are to highlight the various security vulnerabilities of IoT-based smart homes, to present the risks on home inhabitants, and to propose approaches to mitigating the identified risks. The research findings can be used as a foundation for improving the security requirements of IoT-based smart homes.
                Bookmark

                Author and article information

                Contributors
                (View ORCID Profile)
                Journal
                Future Internet
                Future Internet
                MDPI AG
                1999-5903
                April 2019
                April 02 2019
                : 11
                : 4
                : 89
                Article
                10.3390/fi11040089
                08f1ee92-5e6e-4fbc-bb7e-a927ecd439fb
                © 2019

                https://creativecommons.org/licenses/by/4.0/

                History

                Comments

                Comment on this article