Research Article

Non-Technical Cyber-Attacks and International Cybersecurity: The Case of Social Engineering

Volume: 23 Number: 1 January 25, 2024
EN TR

Non-Technical Cyber-Attacks and International Cybersecurity: The Case of Social Engineering

Abstract

This paper aims to provide an overview of social engineering attacks, and their impacts on cybersecurity, including national and international security, and figures out detection techniques, and major methods for countermeasure. How do social engineering attacks affect national and international security? And why is it so hard to cope with them? Seeking for answers to these questions, this paper applies qualitative research methods particularly literature review and case analysis. While qualitative research methods are predominantly employed, quantitative methods will also be utilized when deemed essential. Social engineering attacks, also referred to as online fraud, are a type of attack that typically necessitates minimal or no technical knowledge. Social engineering attacks, instead benefit from the weaknesses and mistakes of individuals, since the user is accepted as the weakest link in cybersecurity. Many studies have shown that the vast majority of successful cyber-attacks in the digital world are social engineering (SE) because countering them is more difficult than countering technical cyber-attacks. Based on the analysis of some major cyber-attacks such as the intervention in the 2016 US Presidential elections, the hacking of CIA director, John Brennan in 2015, and Stuxnet in 2010, the paper figures out that social engineering attacks have a tremendous impact on cybersecurity on the individual, institutional, societal, national, and international levels. Penetration tests and training for raising awareness are the prolific ways to mitigate social engineering attacks.

Keywords

Supporting Institution

Selçuk Üniversitesi BAP

Project Number

21409001

References

  1. Akyeşilmen, N. (2018). Siber politika ve siber güvenlik, Ankara: Orion Kitapevi.
  2. Aldawood, H. And Skinner, D. (2019). Contemporary cyber security social engineering solutions, measures, policies, tools and applications: A critical appraisal, International Journal of Security (IJS), 10(1), 1-15. https://f.hubspotusercontent30.net/hubfs/8156085/WhitePaper%20-%20IJS%20-%20Contemporary%20Cyber%20Security%20Social%20Engineering%20Solutions%5B1%5D.pdf Access date: October 30, 2022.
  3. Allen, J. (2022). Social engineering penetration testing: Attacks, methods, & steps. https://purplesec.us/social-engineering-penetration-testing/ Access date: November 13, 2022.
  4. Baezner, M and Robin, P. (2017). Hotspot analysis: Stuxnet, Zürich:Center for Security Studies (CSS). https://css.ethz.ch/content/dam/ethz/special-interest/gess/cis/center-for-securities-studies/pdfs/Cyber-Reports-2017-04.pdf Access date: November 10, 2022.
  5. Breda, F., Barbosa, H. and Morais, T. (2017). Social engineering and cybersecurity, conference: International technology, education and development conference. https://www.researchgate.net/publication/315351300_SOCIAL_ENGINEERING_AND_CYBER_SECURITY Access date: October 30, 2022.
  6. Brown, R. (2012). South Carolina offers details of data theft and warns it could happen elsewhere. https://www.nytimes.com/2012/11/21/us/more-details-of-south-carolina-hacking-episode.html Access date: November 10, 2022.
  7. CERT-UK. (2015). An introduction to social engineering, Cert-UK publicaiton, https://info.publicintelligence.net/UK-CERT-SocialEngineering.pdf Access date: October 29, 2022.
  8. Chinta, M., Alaparthi, J. And Kodali, E. (2016). A study on social engineering attacks and defense mechanisms. International Journal of Computer Science and Information Security (IJCSIS), 14 Special issues,225-231. https://archive.org/stream/IJCSISVol14SpecialIssueICETCSE2016Final/IJCSIS%20Vol%2014%20Special%20Issue%20ICETCSE%202016%20Final_djvu.txt Access date: October 30, 2022.

Details

Primary Language

English

Subjects

International Security

Journal Section

Research Article

Publication Date

January 25, 2024

Submission Date

August 19, 2023

Acceptance Date

October 10, 2023

Published in Issue

Year 2024 Volume: 23 Number: 1

APA
Akyeşilmen, N., & Alhosban, A. (2024). Non-Technical Cyber-Attacks and International Cybersecurity: The Case of Social Engineering. Gaziantep Üniversitesi Sosyal Bilimler Dergisi, 23(1), 342-360. https://doi.org/10.21547/jss.1346291
AMA
1.Akyeşilmen N, Alhosban A. Non-Technical Cyber-Attacks and International Cybersecurity: The Case of Social Engineering. GAUN-JSS. 2024;23(1):342-360. doi:10.21547/jss.1346291
Chicago
Akyeşilmen, Nezir, and Amal Alhosban. 2024. “Non-Technical Cyber-Attacks and International Cybersecurity: The Case of Social Engineering”. Gaziantep Üniversitesi Sosyal Bilimler Dergisi 23 (1): 342-60. https://doi.org/10.21547/jss.1346291.
EndNote
Akyeşilmen N, Alhosban A (January 1, 2024) Non-Technical Cyber-Attacks and International Cybersecurity: The Case of Social Engineering. Gaziantep Üniversitesi Sosyal Bilimler Dergisi 23 1 342–360.
IEEE
[1]N. Akyeşilmen and A. Alhosban, “Non-Technical Cyber-Attacks and International Cybersecurity: The Case of Social Engineering”, GAUN-JSS, vol. 23, no. 1, pp. 342–360, Jan. 2024, doi: 10.21547/jss.1346291.
ISNAD
Akyeşilmen, Nezir - Alhosban, Amal. “Non-Technical Cyber-Attacks and International Cybersecurity: The Case of Social Engineering”. Gaziantep Üniversitesi Sosyal Bilimler Dergisi 23/1 (January 1, 2024): 342-360. https://doi.org/10.21547/jss.1346291.
JAMA
1.Akyeşilmen N, Alhosban A. Non-Technical Cyber-Attacks and International Cybersecurity: The Case of Social Engineering. GAUN-JSS. 2024;23:342–360.
MLA
Akyeşilmen, Nezir, and Amal Alhosban. “Non-Technical Cyber-Attacks and International Cybersecurity: The Case of Social Engineering”. Gaziantep Üniversitesi Sosyal Bilimler Dergisi, vol. 23, no. 1, Jan. 2024, pp. 342-60, doi:10.21547/jss.1346291.
Vancouver
1.Nezir Akyeşilmen, Amal Alhosban. Non-Technical Cyber-Attacks and International Cybersecurity: The Case of Social Engineering. GAUN-JSS. 2024 Jan. 1;23(1):342-60. doi:10.21547/jss.1346291

Cited By