{"id":234,"date":"2026-05-06T02:44:36","date_gmt":"2026-05-06T02:44:36","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/mv05\/?page_id=234"},"modified":"2026-05-06T03:05:25","modified_gmt":"2026-05-06T03:05:25","slug":"case-study","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/mv05\/case-study\/","title":{"rendered":"Case Study"},"content":{"rendered":"\n<p>Analyzing Social Engineering Attacks<br>Maxwell Taylor Vinson<br>Old Dominion University<br>CYSE 201S<br>Dr. Jordan Quinn<br>April 21, 2026<br>2<br>Analyzing Social Engineering Attacks<br>Social engineering attacks are cybersecurity threats that take advantage of human<br>psychology rather than weaknesses in the technical systems. These attacks have the intention of<br>manipulating people to reveal their private information like passwords or any credentials they<br>have. Completely different on how people think about hacking, social engineering relies on<br>deception and urgency. Which is how this is a very effective and dangerous cybercrime that is<br>very common in modern society. Some common examples are phishing, spear phishing,<br>pretexting, and baiting (Lenaerts-Bergmans, 2023).<br>From a psychological perspective, these attacks will exploit things like authority bias and<br>urgency bias, which is when individuals will be more likely to interact with these scams due to<br>how legitimate they appear and how time sensitive it all is. From the social perspective, these<br>online communication methods are making these attacks much easier. Since people rely very<br>heavily on texting, emailing, and much more, it is easier for the attackers to impersonate<br>someone else. What makes a big impact is the different levels of cybersecurity awareness that<br>these individuals have and it affects their likelihood to fall for these deceptions. According to<br>ESecurity Solutions (2024), many attacks succeed since the users do not verify who is trying to<br>contact them.<br>There are solutions to this in both technical and human-based ways. For the technical side<br>we have multi-factor authentication, and spam filters for our emails. However human-based<br>would be training employees or the general public, they should know how to recognize phishing<br>emails and fake requests. Regular training and tests should be held for people to understand and<br>put into use some cybersecurity knowledge.<br>3<br>This topic shows that cybersecurity is not purely technical, it&#8217;s also about the users.<br>Strong security systems fail if the user makes a simple mistake. Combining cybersecurity with<br>social science helps explain why people are falling for these attacks and how we can try to<br>prevent them. Understanding what&#8217;s the reason for our behavior makes us improvise and try to<br>figure out effective solutions.<br>Social engineering attacks show that people can be the problem not the system itself. By<br>using both technical tools and educating the users we can reduce these threats.<br>4<br>References<br>Lenaerts-Bergmans, B. (2023, November 8). 10 types of social engineering attacks.<br>Crowdstrike.com.<br>https:\/\/www.crowdstrike.com\/en-us\/cybersecurity-101\/social-engineering\/types-of<br>-social-engineering-attacks\/<br>Social Engineering Attacks &amp; Solutions &amp; Phishing Attacks. (2024, May 28). ESecurity<br>Solutions &#8211; Cyber Security Solutions for Business.<br>https:\/\/www.esecuritysolutions.com\/cybersecurity-solutions\/social-engineering-att<br>acks\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Analyzing Social Engineering AttacksMaxwell Taylor VinsonOld Dominion UniversityCYSE 201SDr. Jordan QuinnApril 21, 20262Analyzing Social Engineering AttacksSocial engineering attacks are cybersecurity threats that take advantage of humanpsychology rather than weaknesses in the technical systems. These attacks have the intention ofmanipulating people&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/mv05\/case-study\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":32014,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/mv05\/wp-json\/wp\/v2\/pages\/234"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/mv05\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/mv05\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mv05\/wp-json\/wp\/v2\/users\/32014"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mv05\/wp-json\/wp\/v2\/comments?post=234"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/mv05\/wp-json\/wp\/v2\/pages\/234\/revisions"}],"predecessor-version":[{"id":243,"href":"https:\/\/sites.wp.odu.edu\/mv05\/wp-json\/wp\/v2\/pages\/234\/revisions\/243"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/mv05\/wp-json\/wp\/v2\/media?parent=234"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}