Open Access iconOpen Access

REVIEW

crossmark

Phishing Attacks in Social Engineering: A Review

Kofi Sarpong Adu-Manu*, Richard Kwasi Ahiable, Justice Kwame Appati, Ebenezer Essel Mensah

Department of Computer Science, University of Ghana, Legon Accra, Ghana

* Corresponding Author: Kofi Sarpong Adu-Manu. Email: email

Journal of Cyber Security 2022, 4(4), 239-267. https://doi.org/10.32604/jcs.2023.041095

Abstract

Organisations closed their offices and began working from home online to prevent the spread of the COVID-19 virus. This shift in work culture coincided with increased online use during the same period. As a result, the rate of cybercrime has skyrocketed. This study examines the approaches, techniques, and countermeasures of Social Engineering and phishing in this context. The study discusses recent trends in the existing approaches for identifying phishing assaults. We explore social engineering attacks, categorise them into types, and offer both technical and social solutions for countering phishing attacks which makes this paper different from similar works that mainly focused on the types of attacks. We also show essential human characteristics that make users vulnerable to phishing attacks, their mitigating strategies, challenges, and future directions.

Keywords


Cite This Article

APA Style
Adu-Manu, K.S., Ahiable, R.K., Appati, J.K., Mensah, E.E. (2022). Phishing attacks in social engineering: A review. Journal of Cyber Security, 4(4), 239-267. https://doi.org/10.32604/jcs.2023.041095
Vancouver Style
Adu-Manu KS, Ahiable RK, Appati JK, Mensah EE. Phishing attacks in social engineering: A review. J Cyber Secur . 2022;4(4):239-267 https://doi.org/10.32604/jcs.2023.041095
IEEE Style
K.S. Adu-Manu, R.K. Ahiable, J.K. Appati, and E.E. Mensah "Phishing Attacks in Social Engineering: A Review," J. Cyber Secur. , vol. 4, no. 4, pp. 239-267. 2022. https://doi.org/10.32604/jcs.2023.041095



cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 616

    View

  • 368

    Download

  • 0

    Like

Share Link