Reference Hub5
Cybersecurity Risks, Vulnerabilities, and Countermeasures to Prevent Social Engineering Attacks

Cybersecurity Risks, Vulnerabilities, and Countermeasures to Prevent Social Engineering Attacks

Nabie Y. Conteh, Paul J. Schmick
ISBN13: 9781799865049|ISBN10: 1799865045|ISBN13 Softcover: 9781799865056|EISBN13: 9781799865063
DOI: 10.4018/978-1-7998-6504-9.ch002
Cite Chapter Cite Chapter

MLA

Conteh, Nabie Y., and Paul J. Schmick. "Cybersecurity Risks, Vulnerabilities, and Countermeasures to Prevent Social Engineering Attacks." Ethical Hacking Techniques and Countermeasures for Cybercrime Prevention, edited by Nabie Y. Conteh, IGI Global, 2021, pp. 19-31. https://doi.org/10.4018/978-1-7998-6504-9.ch002

APA

Conteh, N. Y. & Schmick, P. J. (2021). Cybersecurity Risks, Vulnerabilities, and Countermeasures to Prevent Social Engineering Attacks. In N. Conteh (Ed.), Ethical Hacking Techniques and Countermeasures for Cybercrime Prevention (pp. 19-31). IGI Global. https://doi.org/10.4018/978-1-7998-6504-9.ch002

Chicago

Conteh, Nabie Y., and Paul J. Schmick. "Cybersecurity Risks, Vulnerabilities, and Countermeasures to Prevent Social Engineering Attacks." In Ethical Hacking Techniques and Countermeasures for Cybercrime Prevention, edited by Nabie Y. Conteh, 19-31. Hershey, PA: IGI Global, 2021. https://doi.org/10.4018/978-1-7998-6504-9.ch002

Export Reference

Mendeley
Favorite

Abstract

The broad objective of this study is to evaluate the vulnerabilities of an organization's information technology infrastructure, which include hardware and software systems, transmission media, local area networks, wide area networks, enterprise networks, intranets, and its use of the internet to cyber intrusions. To achieve this objective, the chapter explains the importance of social engineering in network intrusions and cyber-theft and the reasons for the rapid expansion of cybercrime. The chapter also includes a complete description and definition of social engineering, the role it plays in network intrusion and cyber identity theft, a discussion of the reasons for the rise in cybercrimes, and their impact on organizations. In closing the authors recommend some preventive measures and possible solutions to the threats and vulnerabilities of social engineering. The chapter concludes that while technology has a role to play in reducing the impact of social engineering attacks, the vulnerability resides with human behavior, human impulses, and psychological predispositions.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.