An Overview of Social Engineering

Social engineering preys on the fact that humans are the weakest link in information security. This article explains the social engineering model, outlines the two categories of social engineering attacks, and discusses techniques for preventing and mitigating social engineering.

7. Challenges and Future Directions

Companies are investing large amounts of money and resources to establish effective strategies against social engineering attacks. However, existing detection methods have fundamental limitations and countermeasures are inefficient in coping with the ever-growing number of social engineering attacks. Human-based techniques are limited by humans’ subjective decisions. Technology-based techniques can be also limited as the technological vulnerabilities may be exploited. These attacks are evolving day after day and attackers are becoming smarter and stronger. Thus, there is a great need for more effective detection and countermeasure techniques to detect and minimize the impact of these attacks.

Because humans are a challenge for the security of any network, it important to develop training programs for employees and most importantly for K-12 students. Training students at early age can minimize the number of victims in the future. Moreover, countries have to invest in cyber security education. Currently, there is a handful of universities in the United States of America that provide quality programs in cybersecurity. Thus, there are numerous jobs in this cyber-security field that are not filled because of the lack of graduates.