Policy evaluation, social engineering, technology, cybercrime, security companie, phishing
This briefing will evaluate the current policies available to tackle social engineering. Social engineering has become a menace in the world of technology today and affects almost everyone who uses technology. Technology has evolved rapidly over the past couple of decades, causing cybercrimes to rise. Cybercrime today affects not just individuals but organizations as well. However, individuals are more at risk of social engineering, one of the oldest forms of cybercrime in the world today. According to Whitfield (2024), damages caused by cybercrime will reach $10.5 trillion by 2025 if security companies do not take serious preventive measures to mitigate this threat. Even though there are security companies that have come up with methods to deal with some social engineering attacks, such as phishing, this threat has become prevalent among internet users as they face identity theft, which can also be defined as the act of impersonating another individual's identity to steal their personal information and use it. All social engineering techniques and strategies are harmful to human beings and organizations, as they exploit the behavior and psychology of individuals and manipulate them to gain unauthorized private and sensitive information that can be used against them in one way or another: either stealing from them or blackmailing them. Evaluating the social engineering techniques used by attackers, the policies that exist to prevent these attacks, and adopting some new policy recommendations will help enhance security in security providers regarding social engineering.
[...] https://builtin.com/articles/cyber-security-companies Zulkurnain, A. U., Hamidy, A. K. B. K., Husain, A. B., & Chizari, H. (2015). Social engineering attack mitigation. International Journal of Mathematics and Computational Science, 1(4), 188-198. [...]
[...] Policy Evaluation Briefing - Social Engineering University of Washington Introduction This briefing will evaluate the current policies available to tackle social engineering. Social engineering has become a menace in the world of technology today and affects almost everyone who uses technology. Technology has evolved rapidly over the past couple of decades, causing cybercrimes to rise. Cybercrime today affects not just individuals but organizations as well. However, individuals are more at risk of social engineering, one of the oldest forms of cybercrime in the world today. [...]
[...] This specifies that these three primary foundations are necessary for social engineering success. While there may be many other methods that can be used to steal cyber security information from individuals, cybercriminals seem to be gravitating towards social engineering-based attacks, which have become a favorite approach of theirs over the past couple of decades. Social engineering happens when attackers manage to manipulate individuals to give up sensitive information from legitimate users whom attackers carefully select. When selecting their targets, attackers consider several factors, including the amount of sensitive data they may acquire from an attack and how much value this sensitive information will have to them (Aldawood, 2020). [...]
[...] Advanced social engineering attacks. Journal of Information Security and Applications, 22, 113-122. Salahdine, F., & Kaabouch, N. (2019). Social engineering attacks: A survey. Future internet, 11(4), 89. Simeon, O. S. (2023). Preventing Social Engineering Attacks: Strategies and Best Practices. https://simeononsecurity.com/articles/understanding-social-enginnering-attacks-and-how-to-prevent-them/ Social Engineering Assessment Services. (n.d). https://rhinosecuritylabs.com/assessment-services/social-engineering/ Social Engineering Awareness Policy. (2023). https://docs.datamigrators.com/policies/social_engineering_awareness_policy Reed, C. [...]
[...] (2023) Social Engineering Statistics - 2023. Farewell Times. https://firewalltimes.com/social-engineering-statistics/ Thomas, M. (2022). What Is Social Engineering? A Look Into the Sophisticated World of Psychological Cyber Crime. https://builtin.com/articles/what-is-social-engineering The Ultimate Guide to Phishing & Social Engineering. (2024). https://www.defendify.com/blog/the-ultimate-guide-to-phishing-social-engineering/ Vigo, J. (2023). Security 360 highlights: Phishing and social engineering. https://www.jamf.com/blog/security360-social-engineering-phishing/ Whitfield, B. (2024) Top Cybersecurity Companies to Know. [...]
APA Style reference
For your bibliographyOnline reading
with our online readerContent validated
by our reading committee