Unmasking the Evolution of Social Engineering in Cybersecurity: Techniques, Vulnerabilities, and Countermeasures

Authors

  • Dr. Paravathi C Associate Professor, Department of Computer Science and Engineering, BGS College of Engineering and Technology, Bangalore, INDIA
  • Dhanyashree G Student, Department of Computer Science and Design, BGS College of Engineering and Technology, Bangalore, INDIA
  • Yeshaswini R Student, Department of Computer Science and Design, BGS College of Engineering and Technology, Bangalore, INDIA
  • Lisha S Student, Department of Computer Science and Design, BGS College of Engineering and Technology, Bangalore, INDIA

DOI:

https://doi.org/10.5281/zenodo.10686537

Keywords:

Attack Techniques, Cybersecurity, Multi-Factor Authentication, Phishing Scams, Social Engineering

Abstract

This research explores the historical evolution, tactics, and classifications of social engineering in the realm of cyber security. Tracing its roots back to the 1990s when attackers would exploit human vulnerabilities through phone calls, the paper highlights the shift towards sophisticated techniques targeting individuals to transfer substantial sums or disclose sensitive information. The term "social engineering" was coined in 1894, gaining prominence in cybersecurity in the 1990s and evolving with the proliferation of the internet. The attackers meticulously research their targets, utilizing human-based and computer-based social engineering tactics.
The classification section delineates human-based social engineering techniques, including impersonation, posing as an important user, using a third person, calling technical support, shoulder surfing, and dumpster diving. Computer-based social engineering involves fake emails, email attachments, pop-up windows, and other deceptive practices. The paper delves into various types of social engineering attacks, such as manipulating conversations, piggybacking, tracking, baiting, phishing, smishing, Trojan horse attacks, water hole attacks, and reverse social engineering.
The document emphasizes the need for self-protection measures, providing guidelines to recognize and thwart social engineering attacks. It also discusses real-time examples like email phishing scams and suggests multi-factor authentication as a potential solution. In conclusion, the research underscores the significance of understanding and combating social engineering, offering insights into its dynamics and countermeasures to fortify cybersecurity in an ever-evolving digital landscape.

Downloads

Download data is not yet available.

Published

2024-02-21

How to Cite

Dr. Paravathi C, Dhanyashree G, Yeshaswini R, & Lisha S. (2024). Unmasking the Evolution of Social Engineering in Cybersecurity: Techniques, Vulnerabilities, and Countermeasures. International Journal of Engineering and Management Research, 14(1), 65–70. https://doi.org/10.5281/zenodo.10686537

Most read articles by the same author(s)