Downloads: 3 | Views: 172 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Informative Article | Data & Knowledge Engineering | India | Volume 7 Issue 7, July 2018 | Popularity: 5 / 10
Defending Against Social Engineering: Techniques and Best Practices
Srikanth Mandru
Abstract: Social engineering remains a formidable threat to cybersecurity, exploiting human psychology to circumvent technical defenses and access sensitive information. This paper provides a thorough examination of social engineering techniques, including phishing, pretexting, baiting, and tailgating, each analyzed for their effectiveness and impact. Detailed case studies of high - profile social engineering attacks illustrate the devastating consequences and underscore the critical need for comprehensive defense strategies. The paper outlines best practices for mitigating social engineering threats, advocating for a multi - layered approach that combines employee training, technological defenses, and robust organizational policies. Employee awareness and training programs are emphasized as essential components in recognizing and thwarting social engineering attempts. Technological solutions, such as email filters and authentication protocols, are discussed for their role in reinforcing defenses. Additionally, the paper explores the importance of regulatory compliance and adherence to industry standards in protecting against social engineering attacks. The final section discusses future research directions and emerging trends, highlighting advancements in artificial intelligence, machine learning, and blockchain technology as potential game - changers in social engineering defense. This comprehensive analysis aims to equip organizations with the knowledge and tools necessary to effectively combat social engineering, safeguarding their information assets against one of the most insidious forms of cyber threats.
Keywords: social engineering, cybersecurity threats, employee training, defense strategies, phishing attacks
Edition: Volume 7 Issue 7, July 2018
Pages: 1556 - 1563
DOI: https://www.doi.org/10.21275/SR24820055304
Make Sure to Disable the Pop-Up Blocker of Web Browser