Assessing and Addressing Social Engineering Attacks

No Thumbnail Available

Date

2025-06-17

Journal Title

Journal ISSN

Volume Title

Publisher

Saudi Digital Library

Abstract

In recent years, phishing scams have become one of the most common methods used to target individuals, affecting millions of users globally every year. Cybercriminals now use multiple platforms such as social media, text messages, emails, and voice calls to target victims. Thus, Attackers play on emotions like fear, urgency, or curiosity to pressure people into acting quickly without thinking. This study looked at why people fall for these scams. By surveying 123 participants, we discovered gaps in how people spot phishing attempts and what makes some more vulnerable than others. The outcomes provide evidence-based recommendations for mitigating phishing threats, equipping institutions and governance bodies with recommendations to enhance public resilience against phishing attacks.

Description

This research is driven by the critical necessity to address the threat of phishing attacks in our increasingly digitized world. As cybercriminals refine their tactics, phishing campaigns have grown more advanced and widespread, indiscriminately targeting individuals across the globe. The consequences of such attacks are severe, ranging from reputational harm and financial losses to the compromise of sensitive personal data. These risks underscore the imperative for robust, adaptive cybersecurity solutions to counteract phishing’s evolving threat landscape. Central to this study is the exploration of human centric vulnerabilities specifically, discrepancies in user awareness, behavior, and risk perception. By analyzing these gaps, the research aims to empower individuals with evidence-based strategies to fortify cyber resilience. Strengthening user decisions, fostering a safer digital ecosystem for future generations.

Keywords

Social Engineering, Cybercrime, Phishing Attacks, Governance bodies, Cyber Risks

Citation

Endorsement

Review

Supplemented By

Referenced By

Copyright owned by the Saudi Digital Library (SDL) © 2025