For the topic: (Social Engineering) In cybersecurity.
Social engineering is a type of cyber attack that relies on human interaction to trick individuals into divulging sensitive information or performing actions that may compromise security. It can take many forms, including phishing, pretexting, baiting, and quid pro quo.
Here are a few examples of social engineering attacks:
Phishing: This is a type of attack where the attacker sends a fraudulent email or message that appears to be from a legitimate source, such as a bank or government agency. The message may contain a link that, when clicked, installs malware on the victim’s computer or directs the victim to a fake website where they are asked to enter sensitive information.
Pretexting: This is a type of attack where the attacker creates a fake identity or pretext to gain the trust of the victim. The attacker may pretend to be a coworker or someone in a position of authority, and use this pretext to request sensitive information or access to systems.
Baiting: This is a type of attack where the attacker offers the victim something they desire, such as free software or access to exclusive content, in exchange for sensitive information or access to systems.
Quid pro quo: This is a type of attack where the attacker offers the victim something in exchange for performing a specific action, such as clicking on a link or installing software.
To protect against social engineering attacks, it is important to be aware of these tactics and to be cautious when receiving unsolicited requests for sensitive information or access. It is also a good idea to educate employees about the risks of social engineering and to implement security measures such as two-factor authentication and strong passwords.
IEEE format should be used as the attached file format.
The following points are important:
– In the title slide, keep a space to add the university logo, two students’ names, and two instructors’ names.
– Ensure that the report and presentation files contain graphs, charts, and tables.
– Make sure that only the most important and clear information will appear in the presentation
Your article must be 8 pages at least and cannot go beyond 14 pages inclusive of references following the attached template.
You are requested to write a review, survey, or state-of-art article within the domain of the (Social Engineering) In cybersecurity
Your article has to give an overview of existing literature in a field, often identifying specific problems or issues and analyzing information from available published work on the topic with a balanced perspective.
Deliverables:
– The deliverables of the project should include:
– A project report (prepare it as per the template)
– Presentation slides
– The deliverables of the project should include:
A report with the following sections
1- Abstract: summary of problem statement presented in the papers.
2- Introduction: discuss the chosen papers proposed solution. These should be illustrated using text and diagrams.
3- Taxonomy: classification of the papers proposed solutions and comparison between them.
4- Discussion: The students have to criticize the proposed solution they also have to propose a possible solution or alternative for some of the weaknesses of the chosen papers wherever that is possible.
5- References: At least, five of your references must be from journal articles published in well publishers’ databases; IEEE, Springer, Elsevier, Wiley, and Taylor & Francis and The citation should follow the APA style, just the last 2 years’ publications)