Cracking the Code: How Social Media and Human Behavior Shape Cybersecurity Challenges
Open Access
Article
Conference Proceedings
Authors: Foteini Markella Petropoulou, Emmanuel Varouchas
Abstract: In an era dominated by digital connectivity, where people are more connected than ever, understanding how humans can securely interact is crucial. This paper delves into the intricate relationship between social engineering and social media, unraveling the multifaceted dimensions that underscore the human aspects of cybersecurity. As technological defenses evolve, adversaries increasingly exploit the vulnerabilities inherent in human behavior (Wang et al., 2020), making it imperative to dissect the interplay between social engineering tactics and the pervasive influence of social media platforms.The study begins by scrutinizing the psychological underpinnings that make individuals susceptible to social engineering attacks, emphasizing the intricate relationship between trust, curiosity, and social connectivity (Albladi & Weir, 2020). Through a comprehensive critical analysis of real-world examples people encounter in their day-to-day lives, the paper exposes the diverse strategies employed by malicious actors to manipulate human cognition and breach organizational defenses. This examination not only dissects the intricacies of phishing, pretexting, and impersonation but also sheds light on the role of emotional triggers and cognitive biases that amplify the effectiveness of these tactics (Wang, Zhu, & Sun, 2021).A significant portion of the paper is dedicated to understanding the role social media plays when it comes to social engineering. The pervasive nature of social media platforms provides a fertile ground for threat actors to extract personal information, exploit social connections, and craft tailored attacks. The paper navigates through the intricate web of privacy erosion, information oversharing, and the amplification of social influence, emphasizing how these factors contribute to the efficacy of social engineering endeavors (Albladi & Weir, 2020).Furthermore, the study explores the role of emerging technologies, such as artificial intelligence and machine learning, in launching social engineering attacks, posing new challenges to the human-centric cybersecurity aspects. To address the ever-changing terrain of social engineering, these emerging technologies advocate for a proactive and flexible strategy that combines technological defenses with a solid understanding of human behavior.In an era dominated by digital connectivity, where individuals are more interconnected than ever, this paper elucidates the critical relationship between social engineering, social media, and cybersecurity. By dissecting psychological vulnerabilities and real-world examples, it underscores the intricate tactics employed by adversaries to exploit human behavior. Emphasizing the role of trust, curiosity, and social connectivity, the study unveils the amplifying effect of emotional triggers and cognitive biases. Focusing on social media's pervasive influence, the paper highlights how platforms contribute to privacy erosion and information exploitation. Acknowledging the challenges posed by emerging technologies, it advocates for a dynamic cybersecurity strategy grounded in both technology and an acute understanding of human behavior. ReferencesAlbladi, S. M., & Weir, G. R. S. (2020). Predicting individuals’ vulnerability to social engineering in social networks. Cybersecurity, 3(1). https://doi.org/10.1186/s42400-020-00047-5Wang, Z., Sun, L., & Zhu, H. (2020). Defining Social Engineering in Cybersecurity. IEEE Access, 8, 85094–85115. https://doi.org/10.1109/access.2020.2992807Wang, Z., Zhu, H., & Sun, L. (2021). Social Engineering in Cybersecurity: Effect Mechanisms, Human Vulnerabilities and Attack Methods. IEEE Access, 9, 11895–11910. https://doi.org/10.1109/access.2021.3051633
Keywords: Social Engineering, Social Media, Human Behaviour, Cybersecurity, Emerging Technologies, Artificial Intelligence
DOI: 10.54941/ahfe1004783
Cite this paper:
Downloads
132
Visits
334