Social Engineering in the Digital Age: Tactics, Impact and Countermeasures
Keywords:
social engineering, phishing, pretexting, cybersecurity, human manipulationAbstract
This article explores the phenomenon of social engineering attacks, their historical evolution, common methods, consequences, and preventive measures. Social engineering exploits human psychology to elicit the disclosure of sensitive information or grant unauthorized access. The study explains the effectiveness of these attacks by their reliance on human emotions such as fear, urgency, and curiosity. By understanding the tactics used in social engineering and implementing robust security practices, individuals and organizations can significantly reduce their exposure to such threats.
References
Van Marken, J.C. (1894). Sanoat ijtimoiy muhandisligi.
Earp, E.L. (1911). Ijtimoiy muhandis.
Kiberxavfsizlik va Infratuzilma Xavfsizligi Agentligi (CISA). (2023). Ijtimoiy muhandislik hujumlari.
Mitnik, K. (2002). Aldash san'ati: Xavfsizlikning insoniy omilini boshqarish.
Hadnagi, C. (2010). Ijtimoiy muhandislik: Insoniy hakerlik fanlari.
Rahimjonovna F. M., Xamidullayevich D. S. Raqamli Ta’lim Texnologiyalari Va Ularning Bugungi Kundagi Ahamiyati //Miasto Przyszłości. – 2024. – Т. 49. – С. 1171-1175.
Khan, Sadik, P. Krishnamoorthy, Mrinal Goswami, Fayzieva Makhbuba Rakhimjonovna, Salman Arafath Mohammed, and D. Menaga. "Quantum Computing And Its Implications For Cybersecurity: A Comprehensive Review Of Emerging Threats And Defenses."
Nanotechnology Perceptions 20 (2024): S13.
Sayfulla, Dottoyev. "Information and methodological support-as a means of intensifying the educational process. Euro-Asia Conferences, 159-161." 2021,
Mitnick, K. D., & Simon, W. L. (2011). The Art of Deception: Controlling the Human Element of Security. Wiley Publishing.
Hadnagy, C. (2018). Social Engineering: The Science of Human Hacking (2nd ed.). Wiley.