Exploring Social Engineering Attacks Involving Insights From Case Studies

Exploring Social Engineering Attacks Involving Insights From Case Studies

Shirisha Kakarla (Sreenidhi Institute of Science and Technology, India), Geeta Kakarla (Sreenidhi Institute of Science and Technology, India), Shirina Samreen (Majmaah University, Saudi Arabia), and Sukanya Vuppala (University College of Engineering, Osmania University, India)
DOI: 10.4018/979-8-3693-6665-3.ch002
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The social engineering attack is one of the most common forms of cyber-attacks. Attackers are using psychological tricks and more covert tactics to coerce victims into disclosing private information that belongs to them or that has been approved by authorities. Social skills are commonly employed to manipulate people by tricking, revealing, and acting upon them. This chapter discuss many types of social engineering assaults, the methodology for analyzing these attacks and data gathering methods utilized as case studies. This chapter also encompass the consequences, implications, legal and regulatory concerns, as well as strategies to mitigate them, such as awareness initiatives, security protocols, and technology remedies with contingency measures that are regularly utilized. The chapter finishes by providing insights and recommendations for organizations to enhance their security measures against social engineering assaults. It highlights the importance of maintaining constant awareness and adjusting cyber security defenses as necessary.
Chapter Preview

Complete Chapter List

Search this Book:
Reset