Human-to-human contact is now faster and easier due to advancements in digital communication technology. However, if social networks and other internet services do not have adequate security measures in place, they risk disclosing private and sensitive information online. Malicious people can readily compromise communication networks using social engineering techniques. These attacks are designed to deceive individuals or groups into doing activities that benefit the criminals or giving them access to sensitive information such as social security numbers, passwords, and medical records. One of the most serious threats to network security is social engineering, which takes advantage of people's innate trust. This page contains a thorough overview of social engineering attacks, including their classifications, detection methods, and mitigation strategies.

Hacking Using Social Engineering Detection and Prevention Methods

Mostarda, Leonardo;
2025

Abstract

Human-to-human contact is now faster and easier due to advancements in digital communication technology. However, if social networks and other internet services do not have adequate security measures in place, they risk disclosing private and sensitive information online. Malicious people can readily compromise communication networks using social engineering techniques. These attacks are designed to deceive individuals or groups into doing activities that benefit the criminals or giving them access to sensitive information such as social security numbers, passwords, and medical records. One of the most serious threats to network security is social engineering, which takes advantage of people's innate trust. This page contains a thorough overview of social engineering attacks, including their classifications, detection methods, and mitigation strategies.
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11391/1608476
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact