Social Engineering Attacks and Defenses in the Physical World vs. Cyberspace: A Contrast Study

Social engineering attacks are phenomena that are equally applicable to both the physical world and cyberspace. These attacks in the physical world have been studied for a much longer time than their counterpart in cyberspace. This motivates us to investigate how social engineering attacks in the ph...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Rodriguez, Rosana Montañez, Atyabi, Adham, Shouhuai
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Rodriguez, Rosana Montañez
Atyabi, Adham
Shouhuai
description Social engineering attacks are phenomena that are equally applicable to both the physical world and cyberspace. These attacks in the physical world have been studied for a much longer time than their counterpart in cyberspace. This motivates us to investigate how social engineering attacks in the physical world and cyberspace relate to each other, including their common characteristics and unique features. For this purpose, we propose a methodology to unify social engineering attacks and defenses in the physical world and cyberspace into a single framework, including: (i) a systematic model based on psychological principles for describing these attacks; (ii) a systematization of these attacks; and (iii) a systematization of defenses against them. Our study leads to several insights, which shed light on future research directions towards adequately defending against social engineering attacks in cyberspace.
doi_str_mv 10.48550/arxiv.2203.04813
format Article
fullrecord <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_2203_04813</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2203_04813</sourcerecordid><originalsourceid>FETCH-LOGICAL-a673-eff16aceea566185cd269417fb9e47a4b6ebf99417e3302d64b44d8c5d35c25c3</originalsourceid><addsrcrecordid>eNotj11LwzAYRnPjhUx_gFe-f6C1aT7aelfq_ICBwgbeWdLkzRas6UjisP_ebXr1wAPnwCHkhhY5r4Uo7lT4cYe8LAuWF7ym7JJ8rCft1AhLv3UeMTi_hTYlpT8jKG_gAS36iBGch7RDeNvN0ekj8D6F0cAh5tDNA4a4VxrvoYVu8imomGCdvs18RS6sGiNe_--CbB6Xm-45W70-vXTtKlOyYhlaS-WRRyWkpLXQppQNp5UdGuSV4oPEwTanBxkrSiP5wLmptTBM6FJotiC3f9pzYL8P7kuFuT-F9udQ9guwik4t</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Social Engineering Attacks and Defenses in the Physical World vs. Cyberspace: A Contrast Study</title><source>arXiv.org</source><creator>Rodriguez, Rosana Montañez ; Atyabi, Adham ; Shouhuai</creator><creatorcontrib>Rodriguez, Rosana Montañez ; Atyabi, Adham ; Shouhuai</creatorcontrib><description>Social engineering attacks are phenomena that are equally applicable to both the physical world and cyberspace. These attacks in the physical world have been studied for a much longer time than their counterpart in cyberspace. This motivates us to investigate how social engineering attacks in the physical world and cyberspace relate to each other, including their common characteristics and unique features. For this purpose, we propose a methodology to unify social engineering attacks and defenses in the physical world and cyberspace into a single framework, including: (i) a systematic model based on psychological principles for describing these attacks; (ii) a systematization of these attacks; and (iii) a systematization of defenses against them. Our study leads to several insights, which shed light on future research directions towards adequately defending against social engineering attacks in cyberspace.</description><identifier>DOI: 10.48550/arxiv.2203.04813</identifier><language>eng</language><subject>Computer Science - Cryptography and Security ; Computer Science - Human-Computer Interaction</subject><creationdate>2022-03</creationdate><rights>http://creativecommons.org/licenses/by/4.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,776,881</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/2203.04813$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.2203.04813$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Rodriguez, Rosana Montañez</creatorcontrib><creatorcontrib>Atyabi, Adham</creatorcontrib><creatorcontrib>Shouhuai</creatorcontrib><title>Social Engineering Attacks and Defenses in the Physical World vs. Cyberspace: A Contrast Study</title><description>Social engineering attacks are phenomena that are equally applicable to both the physical world and cyberspace. These attacks in the physical world have been studied for a much longer time than their counterpart in cyberspace. This motivates us to investigate how social engineering attacks in the physical world and cyberspace relate to each other, including their common characteristics and unique features. For this purpose, we propose a methodology to unify social engineering attacks and defenses in the physical world and cyberspace into a single framework, including: (i) a systematic model based on psychological principles for describing these attacks; (ii) a systematization of these attacks; and (iii) a systematization of defenses against them. Our study leads to several insights, which shed light on future research directions towards adequately defending against social engineering attacks in cyberspace.</description><subject>Computer Science - Cryptography and Security</subject><subject>Computer Science - Human-Computer Interaction</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotj11LwzAYRnPjhUx_gFe-f6C1aT7aelfq_ICBwgbeWdLkzRas6UjisP_ebXr1wAPnwCHkhhY5r4Uo7lT4cYe8LAuWF7ym7JJ8rCft1AhLv3UeMTi_hTYlpT8jKG_gAS36iBGch7RDeNvN0ekj8D6F0cAh5tDNA4a4VxrvoYVu8imomGCdvs18RS6sGiNe_--CbB6Xm-45W70-vXTtKlOyYhlaS-WRRyWkpLXQppQNp5UdGuSV4oPEwTanBxkrSiP5wLmptTBM6FJotiC3f9pzYL8P7kuFuT-F9udQ9guwik4t</recordid><startdate>20220309</startdate><enddate>20220309</enddate><creator>Rodriguez, Rosana Montañez</creator><creator>Atyabi, Adham</creator><creator>Shouhuai</creator><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20220309</creationdate><title>Social Engineering Attacks and Defenses in the Physical World vs. Cyberspace: A Contrast Study</title><author>Rodriguez, Rosana Montañez ; Atyabi, Adham ; Shouhuai</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a673-eff16aceea566185cd269417fb9e47a4b6ebf99417e3302d64b44d8c5d35c25c3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Computer Science - Cryptography and Security</topic><topic>Computer Science - Human-Computer Interaction</topic><toplevel>online_resources</toplevel><creatorcontrib>Rodriguez, Rosana Montañez</creatorcontrib><creatorcontrib>Atyabi, Adham</creatorcontrib><creatorcontrib>Shouhuai</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Rodriguez, Rosana Montañez</au><au>Atyabi, Adham</au><au>Shouhuai</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Social Engineering Attacks and Defenses in the Physical World vs. Cyberspace: A Contrast Study</atitle><date>2022-03-09</date><risdate>2022</risdate><abstract>Social engineering attacks are phenomena that are equally applicable to both the physical world and cyberspace. These attacks in the physical world have been studied for a much longer time than their counterpart in cyberspace. This motivates us to investigate how social engineering attacks in the physical world and cyberspace relate to each other, including their common characteristics and unique features. For this purpose, we propose a methodology to unify social engineering attacks and defenses in the physical world and cyberspace into a single framework, including: (i) a systematic model based on psychological principles for describing these attacks; (ii) a systematization of these attacks; and (iii) a systematization of defenses against them. Our study leads to several insights, which shed light on future research directions towards adequately defending against social engineering attacks in cyberspace.</abstract><doi>10.48550/arxiv.2203.04813</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier DOI: 10.48550/arxiv.2203.04813
ispartof
issn
language eng
recordid cdi_arxiv_primary_2203_04813
source arXiv.org
subjects Computer Science - Cryptography and Security
Computer Science - Human-Computer Interaction
title Social Engineering Attacks and Defenses in the Physical World vs. Cyberspace: A Contrast Study
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-05T17%3A12%3A21IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Social%20Engineering%20Attacks%20and%20Defenses%20in%20the%20Physical%20World%20vs.%20Cyberspace:%20A%20Contrast%20Study&rft.au=Rodriguez,%20Rosana%20Monta%C3%B1ez&rft.date=2022-03-09&rft_id=info:doi/10.48550/arxiv.2203.04813&rft_dat=%3Carxiv_GOX%3E2203_04813%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true