{"id":355,"date":"2023-02-12T09:00:14","date_gmt":"2023-02-12T14:00:14","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/brandonburke\/?p=355"},"modified":"2024-02-02T18:48:34","modified_gmt":"2024-02-02T23:48:34","slug":"article-1-predicting-social-engineering","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/brandonburke\/2023\/02\/12\/article-1-predicting-social-engineering\/","title":{"rendered":"Article 1 \u2013 Predicting Social Engineering"},"content":{"rendered":"\n<p><em>A wide range of malicious activities that are carried out through human interactions are referred to as \u201csocial engineering.\u201d It induces users to commit security breaches or divulge private information through psychological manipulation. This begs the question: can social engineering be predicted through the use of social media?<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\u201cPredicting an Individual\u2019s Vulnerability to Social Engineering in Social Networks\u201d<\/h2>\n\n\n\n<p>In 2017, 85% of all U.S. organizations were hit with some form of phishing attacks launched worldwide (Gatlan, 2019). Phishing requires human interaction to be done, compromising accounts, and compromising data. This is known as the human factor of cybersecurity. Phishing takes advantage of the human factor; however, phishing is not the only type of social engineering. There are countless methods an attacker can use to harvest user and employee credentials and data. User and employee credentials can be banking information or social networking sites such as Facebook. Researchers Samar Muslah Albladi and George R.S. Weir would research social networks and see if it was possible to predict an individuals\u2019 vulnerability to social engineering through the following questions: what is the level of involvement in the network, how much motivation to use the network, and what is competence in dealing with threats on the network are all factors that interact with one another? Albladi and Weir hypothesized that a users\u2019 characteristics in response to the questions determined their level of vulnerability of succumbing to social engineering attacks.<\/p>\n\n\n\n<p>Billions of people use social networking sites to interact with one another and share information. However, giving away information online leads to numerous operational security holes that malicious attackers can exploit to gain the credentials of a user and make monetary gain from post exploitation. Sharing more information often leads to more involvement in a social network. According to Albladi and Weir, \u201cusers with a higher level of involvement will be more susceptible to social engineering attack\u201d because users tend to be more relaxed in an environment that they are familiar with rather than being alert and aware. In addition, through the lens of a social scientist, determinism can be connected to higher levels of involvement in social networks. Determinism means behavior is caused, determined, or influenced by preceding events. For example, teenagers use social media on a daily basis for a variety of reasons. Most of the time, teenagers use social media to make and connect with friends. This results in higher social media usage, which increases the likelihood of a social engineering attack. The determinism or independent variable would be the presence of friends on the social platform. In return, the result or dependent variable would be an increase in falling for an attack. Connecting back to research of Albladi and Weir, determinism is a leading factor of how often and long people use social media on a daily basis.<\/p>\n\n\n\n<p>Motivation also plays a key role in social engineering online. In order to comprehend online user behavior, it is necessary to take into consideration users\u2019 motivations for utilizing communication technologies. Motivation is linked to empiricism. Empiricism is observations based on the human senses such as touch, smell, taste, hearing, or sight. For example, when browsing social media, data is collected and sent to the company of origin. The data is then fed through a data algorithm which gives targeted advertisements to a user. Users then see the advertisement, and it may be tempting to click on it. The advertisement acts on the motivation of a user. Furthermore, the researchers state, \u201cusers with a higher level of motivation will be more susceptible to social engineering attacks\u201d (Albladi &amp; Weir, 2020). Motivation influences a user\u2019s trust, level of involvement, and experience with cybercrime.<\/p>\n\n\n\n<p>Lastly, a user\u2019s competence is \u201cessential determinant\u201d of how a user acts online and ability to spot, identity, and avoid cybercrime such as social engineering (Albladi &amp; Weir, 2020). Albladi and Weir state, \u201cusers with a higher level of competence will be less susceptible to social engineering attacks.\u201d This is because users often feel as if they are in control of their situation when encountering cybercrime. Users are also found to be less likely to be vulnerable to being a victim of cybercrime as their behavior changes to be more aware when red flags begin to rise. To further explain, relativism can be used in the social science end to help provide support that increased competition leads to less victimization from cybercrime. Relativism is defined as all aspects and things are connected to each other. By linking relativism and competence, it can be concluded that competence is a major element of how a user can spot, identify, and avoid cybercrime and social engineering.<\/p>\n\n\n\n<p>To evaluate the hypothesis of users\u2019 characteristics determined their level of vulnerability of succumbing to social engineering attacks, Albladi and Weir used the Qualtrics online survey tool. The survey would ask for the participants\u2019 demographics, questions of the constructs of the proposed model, and a scenario-based experiment (Albladi &amp; Weir, 2020). Finally, the survey was sent to two universities among the students and staff. The survey would find that young adults were less susceptible compared to older adults. The survey would also reveal that there was no significant impact on gender, major, and education level. However, one significant hole in the research is testing on all age groups. From the research of Albladi and Weir, they only used two universities in the study instead of incorporating high school and middle school students to see if even younger people were more or less likely to fall for a social engineering attack. Children have less developed brains and understanding compared to a younger or older adult. This leaves whether or not children are likely to fall for social engineering techniques when using social media. In addition, the research did not include people from other countries that are less developed than the country of origin of the research. This would have provided a wider set of data to work with to conclude if education is a more important factor, rather than stating that it is not. For societal contributions, the research proved that people tend to think that they are not likely to fall for social engineering in any capacity. This is only true if the person is experienced, competent, and is not too comfortable in the online environment that they are engaging in. The research also proved that preying on people\u2019s characteristics can be effective and could even be used in spear phishing attacks to extort information or data from the target.<\/p>\n\n\n\n<p>Overall, the research proved that social engineering can prey on an individual\u2019s characteristics of social media usage, motivation, and competency. Although there was some biased objectivity on who received the survey for the research, the research concluded that people that use social media more than others, motivation, and low competency leads to exploitation of people on what they share willingly with social engineers. The research shows that human factors play a huge role in the effectiveness of social engineering.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">References<\/h2>\n\n\n\n<p>Albladi, S., &amp; Weir, G. (2020). Predicting individuals\u2019 vulnerability to social engineering in social networks. <em>Cybersecurity,<\/em> <em>3<\/em>(1), 1-19. https:\/\/doi.org\/10.1186\/s42400-020-00047-5<\/p>\n\n\n\n<p>Gatlan, S. (2019, April 16). <em>Over 80% of All Phishing Attacks Targeted U.S. Organizations<\/em>. BleepingComputer. Retrieved January 21, 2023, from https:\/\/www.bleepingcomputer.com\/news\/security\/over-80-percent-of-all-phishing-attacks-targeted-us-organizations\/<\/p>\n<a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-facebook nolightbox\" data-provider=\"facebook\" target=\"_blank\" rel=\"nofollow\" title=\"Follow us on Facebook\" href=\"https:\/\/www.facebook.com\/facebook\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"Facebook\" title=\"Follow us on Facebook\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/facebook.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-twitter nolightbox\" data-provider=\"twitter\" target=\"_blank\" rel=\"nofollow\" title=\"Follow us on Twitter\" href=\"https:\/\/twitter.com\/twitter\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"twitter\" title=\"Follow us on Twitter\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/twitter.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-linkedin nolightbox\" data-provider=\"linkedin\" target=\"_blank\" rel=\"nofollow\" title=\"Find us on Linkedin\" href=\"https:\/\/www.linkedin.com\/in\/yourid\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"linkedin\" title=\"Find us on Linkedin\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/linkedin.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-instagram nolightbox\" data-provider=\"instagram\" target=\"_blank\" rel=\"nofollow\" title=\"Check out our instagram feed\" href=\"https:\/\/instagram.com\/myusername\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"instagram\" title=\"Check out our instagram feed\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/instagram.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-flickr nolightbox\" data-provider=\"flickr\" target=\"_blank\" rel=\"nofollow\" title=\"Check out our flickr feed\" href=\"https:\/\/www.flickr.com\/photos\/myusername\/\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"flickr\" title=\"Check out our flickr feed\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/flickr.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-foursquare nolightbox\" data-provider=\"foursquare\" target=\"_blank\" rel=\"nofollow\" title=\"Check out our foursquare feed\" href=\"https:\/\/foursquare.com\/myusername\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"foursquare\" title=\"Check out our foursquare feed\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/foursquare.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-mail nolightbox\" data-provider=\"mail\" rel=\"nofollow\" title=\"Contact Us\" href=\"mailto:mail@example.com?subject=Contact%20Request\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"mail\" title=\"Contact Us\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/mail.png\" \/><\/a>","protected":false},"excerpt":{"rendered":"<p>A wide range of malicious activities that are carried out through human interactions are referred to as \u201csocial engineering.\u201d It induces users to commit security breaches or divulge private information through psychological manipulation. This begs the question: can social engineering&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/brandonburke\/2023\/02\/12\/article-1-predicting-social-engineering\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":24541,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[4],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-json\/wp\/v2\/posts\/355"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-json\/wp\/v2\/users\/24541"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-json\/wp\/v2\/comments?post=355"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-json\/wp\/v2\/posts\/355\/revisions"}],"predecessor-version":[{"id":356,"href":"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-json\/wp\/v2\/posts\/355\/revisions\/356"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-json\/wp\/v2\/media?parent=355"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-json\/wp\/v2\/categories?post=355"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-json\/wp\/v2\/tags?post=355"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}