You are on page 1of 12

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/354849736

SOCIAL ENGINEERING AND ITS IMPORTANCE

Research · October 2021

CITATIONS READS
0 2,034

1 author:

Faisal Ahmed Ghauri


Capitol Technology University
6 PUBLICATIONS   0 CITATIONS   

SEE PROFILE

All content following this page was uploaded by Faisal Ahmed Ghauri on 26 September 2021.

The user has requested enhancement of the downloaded file.


SOCIAL ENGINEERING AND ITS
IMPORTANCE
Faysal A.Ghauri #1
#
EC-Council University, USA
1 iam@faysalghauri.com

Abstract— Social engineering is a significant threat to Purpose


information security. This paper examines how an attack It is clear that social engineering is a significant threat to
occurs, who poses a threat, who the targets are, and how the information security, both for businesses and individuals, and
episodes can be prevented. that preventing and thwarting these attacks is of the utmost
The hacker is often portrayed as a young man driven by importance. Despite a high level of awareness of the threats to
curiosity and getting kicked out of manipulating and information security, how to prevent them from affecting one's
stealing information. The social engineer also possesses the person or organization, how to achieve security in networks,
ability to manage people in a way that the traditional wired and wireless, how to secure hardware and software,
hacker lacks. Many plays on the recipient's compassion, physically and logically. One threat is sometimes mentioned as
gratitude, loyalty, or respect for authority to gain trust. As one of the significant threats to our information security
technological security is strengthened, more people will without being preventable practically and clearly [3]. Therefore,
likely use people rather than technology to attack. Many this thesis will investigate social engineering. I want to examine
companies use technical solutions to prevent attacks, but it the importance of Social Engineering, how these attacks are
is often forgotten that technological security is ineffective if carried out, how the engineer chooses who to contact and why.
misused by staff. Since the target of the social engineer is I want to know how these attacks are best prevented if they can
often those who have not been trained in security awareness, be stopped completely. In terms of employee training, how do
therefore all staff must be prepared. you train so that everyone understands the risks and the
importance of maintaining information security?

I. INTRODUCTION & BACKGROUND II. LITERATURE REVIEW

There are many threats to information security. These threats Social engineering is a method of stealing important
can be Physical, such as theft or sabotage of hardware. Or more information from individuals by taking advantage of
Catastrophic, such as floods and fires. Information security is psychological gaps or errors in human behavior. Originally a
also threatened by hackers who want to destroy or gain access computer security term, social hacking is the Act of gaining
to information that should be inaccessible to them. These access to identities and passwords without malware.[4]
threats are often talked about and known by IT professionals Social engineering techniques are becoming more sophisticated
and ordinary IT users alike. Hardware and software are secured and aim to exploit gaps in user behavior, both digital and actual.
with authentication to deny unauthorized access to the system. It picks up information without the user's knowledge and uses
But what is often overlooked, and perhaps a more significant it to increase the information needed for an attack. In the digital
threat, is the potential threat posed by employees. [1] Most space, where smartphones have become an integral part of our
damage to information security is caused by employees, daily lives, users tend to be less security conscious. The misuse
knowingly or unknowingly, directly by the employee or with of technology created by technological innovation often leads
the employee as a tool within the organization. to damage.
Social engineering is a term used to describe the form of Attackers use any means to obtain the information they need to
manipulation increasingly used to gain unauthorized access to achieve their goals. [5] This can range from fraudulent use of
information by manipulating employees or individuals into accounts to commit financial fraud, to impersonating a member
giving out passwords and other sensitive data used by the social of an organization to disrupt the organizational structure, to
engineer to gain access. A typical example is pretending to be using the information they have obtained to make threats. The
IT support and "secure the system we need your password."[2] threat of social engineering has been increasing steadily over
In summary, this work will present the following: the years.
 The approach of an attack
 The attack's occurrence and potential harm
 Profiling the engineer
 Who are the targets of a social engineer?
 Methods to prevent social engineering
Figure 2: Types of Manipulation

Scareware
It's a type of malware that an attacker uses to scare users via
alarming messages, pop-ups that say you own a virus or your
account is compromised. This leads to cyber security software
Figure 1: Social Engineering Attacks Categories
that compromises the personal information of the user to buy or
download free of charge. [10]
The reality is that social engineering techniques are very
diverse and are used in a variety of combinations. They are Peeping Toms (Shoulder Hacking)
applied in a very clever and resourceful way to increase their There is also a long-standing practice of a third party posing as
accuracy.[6] This section will broadly categorize the various a member of the company to look at your computer screen
methods of social engineering that have been identified so far while working on your laptop in a public place such as a café,
and explain the unique techniques for each category. either from behind your shoulder or when you leave your seat.
[11]
Various Methods of Social Engineering
Trashing
Internal Intrusion Trashing is a technique of stolen information by use of bins.
It is too early to conclude that access is safe because it is Typical waste instances include obtaining client data from
restricted by ID cards or fingerprint recognition. For example, printed materials, private papers, outdated business cards, and
criminals could use a found or forged ID card, hide behind an binding notes with IDs and passwords tossed in the rubbish bin.
employee, or impersonate a cleaner or collector. Criminals who Another option is to rob storage media (for example, hard
enter this way will steal the information they need to achieve drives, DVDs) from the garbage containers and take stored
their goals and take money or other assets. [7] information. [12].
Spoofing Impersonation
Fictitious billing and bank transfer scams, where a person It is the practice of impersonating another person to extract or
pretends to be someone else to obtain information or money, change information. Examples of identity theft include
are typical examples of social engineering. For example, a
person might pretend to be a business partner or a boss and ask 1. Impersonating the System Administrator and Deceiving
for login details over the phone or pretend to be a system the User.
administrator or contract provider. [8] They may even claim to In this case, the user does not suspect the system administrator
be the police and ask for personal information. because the system administrator can manage the user's
password and is trusted as an expert of the system. [13] A
Baiting similar situation can be seen in the relationship between user
As the name indicates, the attacker uses his natural curiosity to support and users of Internet service providers.
explore further by using free or exclusive offers to manipulate
the individual. Malware is usually sent to the target user by an 2. Impersonate a User to Fool the System Administrator
attacker. The distribution of infected equipment, such as However, System administrators have a relatively high level of
leaving USB in public places, including libraries or parking security awareness and are not easy to deceive. [14] Some
areas, is one of the baiting methods. Another way is to send e- examples are as follows:
mails with free content details. [9]
Impersonate a Novice User Targeting the System Administrator's Subordinates at
As an expert administrator pretending to be a novice user, there Lunchtime
is no more difficult job than teaching. The trick is to take System administrators themselves are a relatively tough nut to
advantage of this and pretend to be a novice user and say, "I'm crack. However, it is a very different story for their
having trouble logging in" or something similar to that effect, subordinates, who are usually supporting. This is because such
to make the administrator think that it's just a temporary a person is very likely to do something wrong or do something
password and get it over with. wrong that should not be done. And in some cases, they may
even be happy to help you with a task that they are generally
Impersonating a Supervisor from Another Department not given.
Even if it is another department, it is hard to disobey someone
higher than you. This psychology can be exploited by Deliberately Contacting a Different Department
pretending to be the boss of another department and shouting at If you call the main telephone number or the department to
them in an intimidating manner. [15] For example, "Your login which the person belongs and ask about them, it is natural that
is not working," "I'm having trouble logging in." In such a they will try to transfer the call to you. However, what if you
situation, only a severe system administrator would say that he call a neighboring department? In many cases, the person who
would follow the rules and not give out the password verbally. tries to move the call to the person in question is relatively
pleasant. Still, in many cases, the person who tries to transfer
Impersonate a Female Employee the call to the person in question is too lazy to take
In general, not only are women less likely to be suspected than responsibility for the call, or to remind the person that the phone
men, but if the manager is a man, he is likely to be more helpful number is wrong, or in some cases, because it is physically
than if a man makes the request. Some people take advantage impossible to transfer the call. In some cases, the caller may be
of this and pretend to be female employees. However, not tempted to hang up instead of moving the ring because it is not
everyone can do a female voice on the phone, so you may have physically possible. It is possible to exploit this psychology by
to use a voice changer or other techniques such as e-mail or chat deliberately calling other departments to extract information
to make contact. about the target person.

Impersonate an External Third Party Phone Spoofing


Common sense tells us that it is unlikely that anyone would leak Most of the above spoofing is done over the phone, as it is
confidential information to an outsider so easily. However, easier to spoof someone as you cannot see their face, only their
even if it does not reach the point of directly asking for the voice. [17]
password, it is easy to ask for the name, etc., and it is possible
to realize illegal access based on such information. The Disguise and Deception
following are some examples. For example, he was impersonating a cleaner, which often
involved breaking into premises.
Impersonate a Member of the Public Service
It is relatively easy to trust an external third party, especially E-mail Spoofing
when a public service member. This trustworthiness can be This is a method of forging the sender of an e-mail. In some
used against them to extract information from them. cases, it is possible to completely impersonate someone else by
forging mail header information and eavesdropping on the
Pretending to be a Client, Potential Client, etc. return address.
It is not uncommon for people to be so concerned about
upsetting a current client that they will divulge important
information if they are asked. In addition, if they think that the
person might be a future customer, they will try to answer the
questions as much as possible to get ahead. This can also be
used to find out the name of the manager.

Pretending to be a Real Customer


In this case, it is instrumental in complaining. It is challenging
for a company, especially one that manufactures and sells Figure 3: Impersonation Example
consumer products, to know its customers. Therefore, there is
no way of verifying that they are customers. A further
Misuse of Social Networking Sites
technique is to become a regular complainant and communicate
We acquire extensive information about the target's behavioral
with them to get to know them and extract information from
patterns, interests, and preferences by monitoring the postings
them. [16]
on social networking sites. In other circumstances, they contact
the destination using a false account, trust the target and
confirm the timing of the missing target via e-mail. [18] This 2. Fake Website
time they are burglarizing or stalking the prey. The user is taken to a fake website and asked to enter a
password. This is similar to Web Spoofing.

3. Trojan Horse
A system in which a program is somehow placed in a user's
computer guides the user to enter authentication information
to obtain that information.

Figure 4: Ransom Attacks (justprivacy.org)

Figure 5: Phishing Cases by Year


Cases of Social Engineering
The damage caused by social engineering is increasing every
year. In 2017, a major airline was tricked by an e-mail claiming Web Spoofing
to be from a business partner and defrauded 380 million dollars. In essence, this is a method of gaining access to a fake website,
In 2018, the names and mobile phone numbers of 52 interns at which in some way appears to be the real thing, and obtaining
a public hospital were compromised by an attacker posing as a the information entered there. [21] It is also a form of reverse
doctor. In 2018, a significant crypto-asset (virtual currency) engineering. It is a fake website and, therefore, a form of
exchange leaked crypto-assets because an attacker sent impersonation, but it is also a form of reverse engineering as it
malware-laden e-mails to employees after building trust with is achieved through the user's actions.
them through frequent e-mails and phone calls over the Some examples of how to get people to visit a fake site include:
previous six months. [19] This is a typical social engineering
technique. 1. False DNS information
2. Use of misleading URLs or domain names
Reverse Social Engineering 3. To make you press an incorrect URL in your e-mail.
In social engineering, the social engineer approaches the target 4. Registering this false information in famous search engines.
in some way to achieve the goal. On the other hand, reverse 5. Creating fake links and deceiving users with counterfeit
social engineering is a type of social engineering in which some URLs.
mechanism is set up beforehand, and the target takes action of
their own volition to achieve the goal. Some examples are as There are also ways of getting people to enter information via
follows: the web without pretending to be a fake where the real thing
exists. [22] Here are some examples:
1. Fake Emergency Contact Details
A fake e-mail is sent to the system administrator saying that the i. When you open a page, a JAVA script (e.g., a web browser)
emergency contact details for a hardware or software prompts you to enter your ID and password in a dialog box, as
maintenance company have changed and will be contacted in if the provider were doing this for you to obtain information.
the event of a problem. Because they think it is the maintenance
company and are in the middle of a problem, they are sure to ii. Set up a website with the sweepstakes, let people apply, and
tell you anything you want to know. [20] In this case, they may get information.
wait for trouble and attack the system from the outside, for
example, by disabling it. iii. In addition to obtaining some personal information,
A similar trick is to give a fake business passwords for free e-mail services are easy to guess because the
card with a fake mobile phone as the contact number. person is likely to use the same password elsewhere. Not only
does this provide some personal information, but it also makes
it easier to guess the password for the free e-mail service as the Laws Regarding Social Engineering Attacks
person is likely to use the same password elsewhere. Social engineering is mainly fraud, determined by Article 415
of the Australian Criminal Code, 1860 (in a short period of
Social Engineering and Its Importance CPI). It says that when anyone intends to deceive another
The different forms of social engineering attacks and the person is dishonest or fraudulently induced anyone to deliver
aforementioned tactics, such as DNS spoofing, web spoofing, any property or to save any ownership such a person to do or
etc., are evident. Security is needed where danger occurs. So, jump to do the Act that the person would not do if they were
the attacks on social engineering enhance a feeling of gadget not deceived, therefore making it impair or cause damage to
safety indirectly. [23] Measures are as vital as security as such a person in the body, mind, reputation or property. [25]
precautions to identify assaults and to adopt the following
advice to detect these attacks at the institutional and individual
levels:

1. All employees should be adequately trained.


2. Spread the word of security attacks.
3. Software to protect against cyber-attacks should be promoted.
4. Social engineering attacks need to be identified.
5. Websites with the authenticated certificate should be used.
6. Users must think twice before sharing credentials.
7. Should verify the authenticity of websites before proceeding
to the payment.

Figure 7: Coin Miner Malware (McAfee Labs)

Backing Deception to Gain Property


One constant component is a disappointment to obtain property
or penetration in all kinds of social engineering attacks. These
sorts are generally internet deception tactics, and other false
papers are also utilized for these deception activities, including
bonds, agreements, trademarks for established brands, etc.,
together with identity impersonation. [26] Forging documents
attracts the penal provision defined in Section 463 of the IPC,
which states that the preparing of false documents, which
include electronic records to commit fraud against any person
or the general public for any damage or injury, fraud as a claim
to the title, supporting claims, divisions of property or entering
into express or implied contents of the document.

Figure 6: Social Engineering Stats According to Nerds


Support
These are some of the steps to avoid social engineering assaults
from being done by users. These attacks threaten society by
altering its members' economic structure. [24] The only
essential role that Social Engineering performs is giving a sense
of security in the cyber world. Otherwise, it just plays a
negative part, as these attacks cannot be removed due to
unpredictable developments in the cyber world.
Figure 8: Social Engineering 2020 Insights
Preparation by Unfair and Fraudulent Intentions of False Acquire Information
Documents A social engineer has to do a lot of pre-work before the attack,
In addition, IPC section 464 defines the preparation of false finding out the jargon and common vocabulary of the targeted
documents. False documents are produced with dishonest and organization. Often this information is freely downloadable
fraudulent intentions that may include seal, sign, document from the Internet or easily accessible on the company's website
execution, the transmission of or part of an electronic record, or intranet. [31] Suppose the organization has been security-
the annexation of an electronic signature, marks the conscious enough to protect such information. In that case, it
authenticity of an item or marks made in the name of a fictional can often be accessed through social engineering by
individual claiming it to be a natural person. [27] In different switchboard operators or administrators, as it appears harmless
sections, chatting, impersonation, and forgery are penalized, and is considered not to be used for mischief. However, the
depending on the situation and the facts. information is hazardous because it allows the engineer to
appear to be someone in the company, therefore, be trusted.
III. METHODOLOGY More sensitive information can be disclosed.
Another way to obtain information is dumpster diving. By
Since the questions are theoretical rather than practical, it is searching the company's dumpster, one can find a lot of
natural to seek the answers to the questions in the literature valuable information. Internal telephone directories, computer
relevant to the subject. In my choice of literature, I have tried manuals, employee information, notes, and drawings can be
to create a broad literature base to get as wide a knowledge base found in the garbage. [32] Even if the organization has
as possible. [28] For this reason, I have chosen a book written procedures for destroying confidential and perhaps even
by a well-known and notorious hacker and books that give internal communication, a lot of information is considered
widely differing approaches to hacking, from a harmless. Still, it could be exploited by a social engineer, such
historical/philosophical/biological strategy to a description of as letterheads and signatures, memos, and notes.
hacking as national warfare/terrorism. Newspaper articles Social networks are also widely used by social engineers to
provide additional information on social engineering, obtain information about employees and the company and then
indicating the prevalence and possible impact of attacks. to use that information to gain the sympathy and trust of the
recipient. [33].
Social Engineering Attacks Overview
To understand social engineering as a method of Planning the Attack
misappropriating information or services and as a threat to The preparations are described by an industrial spy and
personal and public information security, I begin by examining professional social engineer as follows:
the attack process and the methods used to gain the recipient's
trust. "You have to plan. Find out what buttons to push to get
them to line up, find out what they want, what they need.
First of all, it is essential to distinguish between the two types Plan the attack. Be patient, do your homework. Figure out
of attacks that occur. Large-scale rapid attacks include e-mail what role you're going to play and learn to replicate. Don't
or website scams. These attacks are characterized by many walk in the door until you're ready."
people being contacted, and the fraudster spends no time
building a relationship or doing research to appear credible. [29] The engineer then maps the organization itself, internal
Examples of this type of attack are spam messages advertising numbers and departments, software used, names of people and
that the recipient has won something or has been selected for information resources, and other information that could be
an offer and only needs to provide their details to receive the useful in an attack. At this stage, he finds a suitable identity and
prize. For most of us, quick attacks are often accessible to see role to play in the episode. Even this information is accessed
through and distinguish from legitimate messages as often they through social engineering by employees accustomed to
are hastily written or poorly translated. The aim of these attacks providing information to whoever needs it and perhaps state
is not to fool everyone who is contacted, but that it is enough reasonably legitimate identities and reasons. [34] If the
for someone to be fooled occasionally for the attack to succeed. engineer presents his question or request as entirely honest, the
[30] recipient rarely has reason to question this. Moreover, the
Slow-focused attacks are scams that target a specific company engineer is often pleasant and plays on the recipient's
or individual. The attack is carefully planned and well prepared. willingness to help.
Unlike the fast attacks, the slow attacks are much more
challenging to see through and require that everyone contacted Implementing the Attack
is completely fooled for the fraud to succeed. The quick attacks "to act in such a way and in such a direction as to benefit
can be considered relatively easy to protect against. A little oneself and, so that one does not realize that he or she has
common sense and a reasonable dose of suspicion should be been deceived is the greatest gain of all."
enough to protect yourself. Therefore, this work concentrates
on the focused attacks. Finally, the attack takes place in one or more stages. The most
common method for all scenes of the episode, from information
gathering to attack, is telephone calls, and of course, the It is essential not to forget that social engineering is often only
Internet and e-mail. Physically visiting the organization is often a means to reach the information or system the engineer wants
considered risky and is avoided if possible. Meeting someone to access, and rarely the goal itself. It is a way to get in and get
physically makes it that much easier to determine whether they access to get what you want quickly. As technical security
are telling the truth or lying. [35] We can see facial expressions, improves, the social attack route is likely to be used more often
body language combined with the voice tone, inflection, and than purely technical hacking. Manipulating people is
other non-vocabulary communication, and it is much harder for becoming easier in comparison to the increasingly secure
the engineer to be trustworthy. technical solutions being used.
A skilled social engineer can find out virtually anything in an
organization, even what all employees consider unthinkable to IV. ANALYSIS RESULTS
disclose to a stranger who is not part of the organization. [36]
The engineer accomplishes this by posing as different people The methodology has changed in recent years for more
depending on the information sought and using other methods significant and targeted attacks such as industrial espionage.
to get people to disclose the information sought. From working on a broad front and attacking in many places,
intelligence has changed its approach to carefully identifying
Building Trust certain people of interest.
An essential part of social engineering is that what is requested The mapping aims to find a way to reach the person, a loophole
must be perceived as a reasonable request by the person the or weakness in their habits or the information resources they
engineer is pretending to be, lest the recipient is suspicious. It are responsible for. This may involve, for example, placing a
is a matter of distorting the truth and presenting a lie as truth to Trojan on a frequently visited website. [40]
create a distorted basis for the recipient's decision so that what The weakest link in information security is always people. No
should be impossible appears perfectly reasonable. [37] Once matter how many secure systems, firewalls, authentication
trust has been established, it is simply a matter of maintaining methods, IPS/IDS systems are installed, they are all of no use
it. Most people rarely change their minds despite the warning unless the person who will manage and work around these
lights. systems and security products has been trained in their proper
Suppose the recipient still seems to become suspicious. In that use and handling. Employees who lack training and
case, the engineer must manage to reassure and give a understanding of information security and how the
reasonable explanation so that the suspicion subsides, and then organization's information assets are protected risk sabotage
it may be wise to end the call as soon as possible. If the victim information security by disclosing information to social
becomes suspicious, there is a risk that they will spread the engineers. These employees can often be new hires or
word to colleagues who will become more suspicious of strange temporary workers who have not been informed about what
phone calls and charming strangers with questions. All of this information can be disclosed to whom and long-standing staff
means that social engineers must be highly perceptive people- who have not received the necessary training. Lower-level
watchers to become proficient in their occupation. [38] Hearing employees may constitute the latter group and are therefore
whether the person feels trust or suspicion for the social often targeted by the social engineer. [41] Because they lack
engineer can determine whether the attack succeeds or fails. training in information security, they do not recognize the
One tactic is to ask a personal question to determine the social engineer's tricks as hoaxes. Still, they perceive them as
recipient's level of cooperation and suspicion. lovely, authoritative, but friendly people, and they often want
Commonly, the social engineer asks for information that seems to assist the engineer.
relatively innocuous to the recipient but combined with other
information the engineer receives in another call. It poses a
significant threat to the organization's information security. It
allows the engineer to access the information he wants. One
trick to hide the questions you want to be answered is to ask
them in combination with other wholly innocent and
unimportant questions. In an attempt to hide the questions
asked, some trivial questions are often asked at the end. If the
recipient later thinks back on the conversation, the latter
questions are likely remembered.
Another tactic is to gain the trust of a person in the company by
working with them over a long period to build trust, and then
let the deceived person on the inside do what you want. [39] In
this way, the social engineer runs a minimal risk of being
caught if they have managed the contact well and ensured that Figure 9: Phishing Attacks in 2018
the connection could not be traced.
It is also essential to train staff to understand the value of login
information and different codes. They must be treated as
sensitive information that is not disclosed. A policy should also
be put in place that information will not be released until the Attach privacy filter to display and turn on privacy function
request can be confirmed and the identity of the enquirer By attaching a privacy filter to the display of your computer or
verified. Staff should be trained to ask themselves what the smartphone, you can reduce the left and right viewing angles.
information could be used for by a malicious person before This will help to prevent prying eyes from behind. If the
disclosing information to someone they do not know personally product has a privacy function that narrows the viewing angle,
and are sure they are who they say they are. They must also be you can achieve the same effect by turning on the privacy
trained not to carry out commands of which they do not know function.
the effects. Making this a practice prevents and hinders the
social engineer. Never leave vital information on your desk unattended
If you go documents with IDs, passwords, or customer
Occurrence and Harmfulness information printed on them on your desk, there is a risk that a
To assess whether or not social engineering is a threat to third party may see them. Ensure that essential documents are
information security and how significant this threat is, one must not left on your desk but stored in a lockable cabinet before
look at its prevalence and potential harm. leaving. [45]
Likely, many social engineering incidents that occur are never
detected [42]. Many organizations choose not to report those Shred documents before throwing them away to prevent
seen, as disclosure could damage customer trust, resulting in information from being read.
even more significant losses than the breach itself. The likely If you throw your documents straight into the bin, there is a risk
large number of unreported cases makes it difficult to figure out that the contents will be stolen and deciphered. Some people
the prevalence of social engineering. consider it OK to tear a paper a couple of times by hand, but
Social engineering is rarely the target of an attack but merely a that level of shredding is almost useless. Shredders that can
means to reach the information or service sought. Therefore, shred to a macroscopic level and confidential document
like most information security attacks, a social engineering collection services that pick up a certain number of documents
attack's potential impact and scale can range from devastating at a time will eliminate such concerns.
to barely noticeable. A breach that is not publicized and did not
involve the theft or sabotage of critical information will have Ensure that storage media is erased before disposal
minimal impact on the affected organization. Apart from the Unwanted storage media should be securely erased using
fact that the organization should conduct an internal special software. For example, hard disk drives should be
investigation and review its security, the breach is unlikely to physically destroyed with a hammer before removal. Each
have repercussions. [43] However, a violation that becomes medium has its storage mechanism, and if you understand this
public knowledge may result in the organization not being and take the appropriate measures, you will be less likely to
considered trustworthy and secure to engage or work with, have information stolen from your discarded storage media. [46]
leading to the loss of suppliers, partners, and customers. Such a
loss is difficult to overcome and may lead to bankruptcy. Do not use social networking sites to reveal information
Information theft can mean that the company's goods (e.g., about your activities or your company
software code, drawings) are leaked and can be used by You should be aware that posting information on social
competitors. If the company loses the ability to sell its product, networking sites, such as your plans for the future or
it also loses revenue, leading to bankruptcy in the worst case, information about your company, is no different from shouting
unless it can develop a new product. in a public place. If it becomes clear that you are not there, you
may be vulnerable to burglary. Or, if you are open about your
Effective measures against social engineering interests, tastes, and behavior, you may be stalked. There is also
There is no end to the damage caused by social engineering. the possibility of someone guessing your password based on the
The theft and stalking of individuals, as well as large information you have collected. There have been cases where
corporations, is becoming a significant threat. However, the people have used their spouse's wedding anniversary as a PIN
following measures can significantly reduce the risk of being code, only to have it quickly spotted.
victimized.
Beware of direct messages on social networking sites
Do not give your ID or password to anyone over the phone Beware of direct messages from strangers on social networking
Posing as your boss or business partner is becoming more sites. Even if it's a direct message from someone you've
common. Telephone calls should be treated with caution as they exchanged a few words with, don't be tempted to open the link
are voice-only, and the caller cannot be identified. If you need in the statement. This is especially true these days when
to communicate IDs and passwords to someone remotely, it is hijacking accounts to send out spam is a common practice. If
advisable to use a combination of methods, e.g., ID over the you do need to open it, you should only do so if you have good
phone and password by e-mail. [44] security software installed on your computer. [47]
Need for awareness of Social Engineering Attacks 1. Following Section 70A of the Information Technology Act,
Social engineering exploits human psychological a National Protection Center for Critical Information
vulnerabilities to achieve its goals. There is no doubt that social Infrastructure is created.
engineering attacks will continue to increase in the future, both 2. Issue of cyberthreats and countermeasures warnings and
for individuals and employees. All seven of the measures above notices by CERT-In.
have one thing in common: They are all dangerous and require 3. Issue the guidance on the primary duties and responsibilities
constant vigilance. of the Chief Information Security Officer (CISOs) in protecting
applications/infrastructure and compliance.
Social engineering, in particular, is a method of catching people 4. Provision before and subsequently at regular intervals for
off guard. As long as people do not act on their initiative, there audits of government websites and apps.
will be vulnerable points somewhere. Therefore, if you have 5. Security auditing organizations to assist and audit the
access to security software and other safety tools, you should execution of best practices in information security.
actively consider using them. [48] The more time and 6. Crisis management plan design for cyber assaults and cyber
opportunities we spend using services in the digital space, the terrorism.
greater the risk of being victimized by social engineering. We 7. Conduct regular cyber security and simulated exercises to
need to be aware of this risk and how we can act accordingly. test governmental and critical sector enterprises' security stance
and preparation.
Bringing the provisions of the Information Technology Act 8. Conducting frequent training programs on information
of 2000 to light infrastructure security and cyber threats for network/system
The Informatics Act of 2000, Sections 65 to 66D, deals with administrators and heads of government and critical sector
impersonation and cheating crimes. Section 71 concerns organizations.
misrepresentation and deletion of material information for
licensing, which is cheating, and a fallacy since they are done V. RECOMMENDATIONS
in an attempt to fool. Section 68, 69, 70, and 71 also deal with
non-compliance with the government instructions and Social engineering is a significant threat to information security
notifications. Section 72 concerns leak in data, while Section in companies and organizations and individuals. As
72A concerns the entire range of assaults of social engineers technological security improves, more malicious people will
because it penalizes those whose access to personal information choose the easier way to achieve what they want using people
was obtained without another person's permission or in to gain information or access resources. To prevent this
violation of a legal contract to cause them mistaken losses or opportunity from being exploited, we must eliminate or at least
improper gains. Sections 73 and 74 concern the forgery of reduce it.
certification by electronic signatures. [49] When it comes to information security, many focus on technical
The additional territorial operations of the Act, 2000 is dealt security. Technical solutions such as firewalls, IDS,
with in Section 75 of the Information Technology Act since it authentication, encryption, restricted access, and permission
says that any computer, computer system, or network source is rules can, of course, prevent attacks and are, therefore, very
located in Australia and used for offenses outside of Australia important for the organization's information security. But
and that this person is liable for the violation of their provisions technical security is only half of the information security and
according to the IT Act 2000, irrespective of his nationality. can only protect if the technology is used correctly. Therefore,
This implies, if someone hacks a computer source and makes to ensure that technical protection covers, administrative
mistaken profits or misdemeanors, that individual is security is required in monitoring and controls, follow-up,
responsible. Section 4 of IPC also demands the extra-territorial established policies and procedures.
operation of IPC in the same manner and encompasses, in
particular, any act that someone outside Australia targets any VI. CONCLUSION
computer resource in Australia. [50] This also involves attacks
on social engineering. Following IPC provisions, such as Social engineering is essentially nothing unusual, and most, if
Sections 417 to Sections 420 for cheating and Sections 465 of not all people, use it from time to time. We play on the
Sections 477A, there are different penalties for various offenses recipient's sympathy and empathy for our situation to get our
with minimum three-month and maximum life imprisonment way or authority when we show nothing to discuss. All the
under multiple sections of both laws. The IPC provisions have methods a social engineer uses to get what he wants, we use too,
numerous penalties for multiple violations. although often quite unconsciously. It's part of the social game
that all interpersonal communication consists of. The difference
Central government steps towards cyber security awareness is that the engineer has mastered the art of social engineering
The Central Government has made specific efforts to avoid and and can use it to the full consciously and deliberately to gain
mitigate cyber security issues. [51] The following are: trust and get in our way.
One of my main goals in this study was to find suitable
prevention methods. One idea from the beginning was that it is
mainly about staff training. After studying the subject, I found
that my thought was correct. However, I was wrong in the [13]. Luo, X., Brody, R., Seazzu, A., & Burd, S. (2011, July 1).
wording. It is essentially about prevention rather than Social Engineering: The Neglected Human Factor for
prevention. Stopping an attack from happening seems Information Security Management. Information Resources
impossible. Preventing an attack in progress from continuing Management Journal (IRMJ).
and eventually succeeding is entirely possible. To do that, all
staff must be trained, not once on recruitment, but repeatedly. [14]. Thornburgh, T. (2004). Social engineering. Proceedings
The training must be designed to take the knowledge gained of the 1st Annual Conference on Information Security
from it and carry it on the job. There needs to be an Curriculum Development - InfoSecCD '04.
understanding of why it is crucial to have long, complex
passwords that are so difficult to remember (it may be wise to [15] [38]. Workman, M. (2007). Gaining Access with Social
teach ways to build strong passwords that are nevertheless easy Engineering: An Empirical Study of the Threat. Information
to remember). Participants need to know what a malicious Systems Security, 16(6), 315–331.
person can do with the company's assets and how a negative
person can exploit staff to gain access to them. Technical [16]. Byrne, R. (2020). The Importance of Cybersecurity
security solutions are fundamental to ensure information Awareness Training on Small Corporations to Reduce the Risk
security, but only when the entire workforce has a good security of a Social Engineering Attack - ProQuest.
awareness and is committed to information security can we feel
reasonably safe from attacks. [17]. Gupta, S., Singhal, A., & Kapoor, A. (2016). A literature
survey on social engineering attacks: Phishing attack. 2016
VII. REFERENCES International Conference on Computing, Communication, and
Automation (ICCCA).
[1]. Krombholz, K., Hobel, H., Huber, M., & Weippl, E. (2015).
Advanced social engineering attacks. Journal of Information [18]. Hoang, N. P., & Pishva, D. (2014). Anonymous
Security and Applications, 22, 113–122. communication and its importance in social networking. IEEE
Xplore.
[2]. Hadnagy, C. (2010). Social Engineering: The Art of
Human Hacking. In Google Books. John Wiley & Sons. [19]. Kotenko, I., Stepashkin, M., & Doynikova, E. (2011,
February 1). Security Analysis of Information Systems Taking
[3]. Peltier, T. R. (2006, November). Social Engineering: into Account Social Engineering Attacks. IEEE Xplore.
Concepts and Solutions.
[20]. Krombholz, K., Hobel, H., Huber, M., & Weippl, E.
[4]. Huber, M., Kowalski, S., Nohlberg, M., & Tjoa, S. (2009). (2013). Social engineering attacks on the knowledge worker.
Towards Automating Social Engineering Using Social Proceedings of the 6th International Conference on Security of
Networking Sites. 2009 International Conference on Information and Networks - SIN '13.
Computational Science and Engineering.
[21]. Salahdine, F., & Kaabouch, N. (2019). Social Engineering
[5]. Abraham, S., & Chengalur-Smith, I. (2010). An overview Attacks: A Survey. Future Internet, 11(4), 89.
of social engineering malware: Trends, tactics, and
implications. Technology in Society, 32(3), 183–196. [22]. Simpson, S. P., & Field, R. (1947). Social Engineering
through Law: The Need for a School of Applied Jurisprudence.
[6]. Mouton, F., Leenen, L., & Venter, H. S. (2016). Social New York University Law Quarterly Review, 22, 145.
engineering attack examples, templates, and scenarios.
Computers & Security, 59, 186–209. [23]. Bullée, J.-W. H., Montoya, L., Pieters, W., Junger, M., &
Hartel, P. (2017). On the anatomy of social engineering attacks-
[7] [8] [9] [10]. Irani, D., Balduzzi, M., Balzarotti, D., Kirda, A literature-based dissection of successful attacks. Journal of
E., & Pu, C. (2011). Reverse Social Engineering Attacks in Investigative Psychology and Offender Profiling, 15(1), 20–45.
Online Social Networks. Detection of Intrusions and Malware,
and Vulnerability Assessment, 55–74 [24]. Bullée, J.-W. H., Montoya, L., Pieters, W., Junger, M., &
Hartel, P. H. (2015). The persuasion and security awareness
[11]. Applegate, S. D. (2009). Social Engineering: Hacking the experiment: reducing the success of social engineering attacks.
Wetware! Information Security Journal: A Global Perspective, Journal of Experimental Criminology, 11(1), 97–115.
18(1), 40–46.
[25.] Gonzalez, J. J., Sarriegi, J. M., & Gurrutxaga, A. (2006).
[12]. Conteh, N. Y., & Schmick, P. J. (2021). Cybersecurity A Framework for Conceptualizing Social Engineering Attacks.
Risks, Vulnerabilities, and Countermeasures to Prevent Social Critical Information Infrastructures Security,
Engineering Attacks. Ethical Hacking Techniques and
Countermeasures for Cybercrime Prevention.
[26]. Heartfield, R., & Loukas, G. (2018). Detecting semantic Environment: Threats and Risks. Communications in
social engineering attacks with the weakest link: Computer and Information Science, 50–56.
Implementation and empirical evaluation of a human-as-a-
security-sensor framework. Computers & Security, 76, 101– [40]. Astakhova, L. V., & Medvedev, I. A. (2021). An
127. Information Tool for Increasing the Resistance of Employees
of an Organization to Social Engineering Attacks. Scientific
[27]. Heartfield, R., Loukas, G., & Gan, D. (2017, June 1). An and Technical Information Processing, 48(1), 15–20.
eye for deception: A case study utilizing the human-as-a-
security-sensor paradigm to detect zero-day semantic social [41]. Atwell, C., Blasi, T., & Hayajneh, T. (2016, April 1).
engineering attacks. IEEE Xplore. Reverse TCP and Social Engineering Attacks in the Era of Big
Data. IEEE Xplore.
[28]. Karpati, P., Sindre, G., & Matulevicius, R. (2012, April
1). Comparing Misuse Case and Mal-Activity Diagrams for [42]. Clarke, N., & Furnell, S. (2015). Proceedings of the Ninth
Modelling Social Engineering Attacks. International Journal of International Symposium on Human Aspects of Information
Secure Software Engineering (IJSSE). Security & Assurance (HAISA 2015). In Google Books.
Lulu.com.
[29]. Laribee, Barnes, Rowe, & Martell. (2006, June 1).
Analysis and Defensive Tools for Social-Engineering Attacks [43]. Fathollahi-Fard, A. M., Hajiaghaei-Keshteli, M., &
on Computer Systems. IEEE Xplore. Tavakkoli-Moghaddam, R. (2018). The Social Engineering
Optimizer (SEO). Engineering Applications of Artificial
[30]. Li, T., Wang, K., & Horkoff, J. (2019). Towards Effective Intelligence, 72, 267–293.
Assessment for Social Engineering Attacks. 2019 IEEE 27th
International Requirements Engineering Conference (RE). [44]. Ivaturi, K., & Janczewski, L. (2012). A Typology Of
Social Engineering Attacks -An Information Science
[31]. Nohlberg, M. (2018). Securing Information Assets: Perspective (p. 145).
Understanding, Measuring and Protecting against Social
Engineering Attacks. DIVA; Institutionen för data- och [45]. Maraj, A., Rogova, E., & Jakupi, G. (2020). Testing of
systemvetenskap (tills m KTH). network security systems through DoS, SQL injection, reverse
TCP, and social engineering attacks. International Journal of
[32]. Parthy, P. P., & Rajendran, G. (2019). Identification and Grid and Utility Computing, 11(1), 115.
prevention of social engineering attacks on an enterprise. 2019
International Carnahan Conference on Security Technology [46]. Mashtalyar, N., Ntaganzwa, U. N., Santos, T., Hakak, S.,
(ICCST). & Ray, S. (2021). Social Engineering Attacks: Recent
Advances and Challenges. HCI for Cybersecurity, Privacy and
[33]. Saleem, J., & Hammoudeh, M. (2017). Defense Methods Trust, 417–431.
Against Social Engineering Attacks. Computer and Network
Security Essentials, 603–618. [47]. Neupane, A., Satvat, K., Saxena, N., Stavrinos, D., &
Bishop, H. J. (2018). Do Social Disorders Facilitate Social
[34]. Sawa, Y., Bhakta, R., Harris, I. G., & Hadnagy, C. (2016, Engineering? Proceedings of the 34th Annual Computer
February 1). Detection of Social Engineering Attacks Through Security Applications Conference.
Natural Language Processing of Conversations. IEEE Xplore.
[48]. Raman, K., Baumes, S., Beets, K., & Ness, C. (2015).
[35]. Scheeres, J. W. (2008, March 1). Establishing the Human Social-Engineering and Low-Tech Attacks. Computer Security
Firewall: Reducing an Individual's Vulnerability to Social Handbook, 19.1–19.25.
Engineering Attacks. Apps.dtic.mil.
[49]. Ryan Shi, Z. (2019, January 3). Towards Thwarting Social
[36]. Smith, A., Papadaki, M., & Furnell, S. M. (2013). Engineering Attacks. DeepAI.
Improving Awareness of Social Engineering Attacks.
Information Assurance and Security Education and Training, [50] [51]. KING, D. (2007). The American State and Social
249–256. Engineering: Policy Instruments in Affirmative Action.
Governance, 20(1), 109–126.
[37]. Spinapolice, M. (2011). Mitigating the risk of social
engineering attacks. Theses.

[39]. Alavi, R., Islam, S., & Mouratidis, H. (2015). Human


Factors of Social Engineering Attacks (SEAs) in Hybrid Cloud

View publication stats

You might also like