International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Downloads: 2 | Views: 110 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article | Data & Knowledge Engineering | India | Volume 7 Issue 7, July 2018 | Rating: 4.9 / 10


Defending Against Social Engineering: Techniques and Best Practices

Srikanth Mandru [2]


Abstract: Social engineering remains a formidable threat to cybersecurity, exploiting human psychology to circumvent technical defenses and access sensitive information. This paper provides a thorough examination of social engineering techniques, including phishing, pretexting, baiting, and tailgating, each analyzed for their effectiveness and impact. Detailed case studies of high - profile social engineering attacks illustrate the devastating consequences and underscore the critical need for comprehensive defense strategies. The paper outlines best practices for mitigating social engineering threats, advocating for a multi - layered approach that combines employee training, technological defenses, and robust organizational policies. Employee awareness and training programs are emphasized as essential components in recognizing and thwarting social engineering attempts. Technological solutions, such as email filters and authentication protocols, are discussed for their role in reinforcing defenses. Additionally, the paper explores the importance of regulatory compliance and adherence to industry standards in protecting against social engineering attacks. The final section discusses future research directions and emerging trends, highlighting advancements in artificial intelligence, machine learning, and blockchain technology as potential game - changers in social engineering defense. This comprehensive analysis aims to equip organizations with the knowledge and tools necessary to effectively combat social engineering, safeguarding their information assets against one of the most insidious forms of cyber threats.


Keywords: social engineering, cybersecurity threats, employee training, defense strategies, phishing attacks


Edition: Volume 7 Issue 7, July 2018,


Pages: 1556 - 1563



Rate this Article


Select Rating (Lowest: 1, Highest: 10)

5

Your Comments

Characters: 0

Your Full Name:


Your Valid Email Address:


Verification Code will appear in 2 Seconds ... Wait

Top