Abstract

The pervasive use of social media in small and medium enterprises has increased social engineering cyber-attacks. Enterprises that have adopted the use of social media and emails to supplement on their marketing to complete business deals have been attacked or have detected attempted attacks on their infrastructure. Others are still trapped in the social engineering racket. In this paper we identify the dynamic pattern and behavior of social engineering both from within and without the business enterprises. We used analytical method to identify the key factors and parameters that cause social engineering attacks in businesses .Causal loops are used to model the relationships of key parameters that contribute to cyber-attacks through social engineering through the patterns and behavior of social media users. Using stock and flow diagrams, we build a simulation model on Stella platform, analyze it and suggest possible solutions that business enterprises can take to implement measures through policy change. Keywords: Social Media, Attack, Engineering, Stella, Enterprise, Simulation, Model DOI: 10.7176/JIEA/11-2-10 Publication date: December 30 th 2021

Highlights

  • Among the challenges in today’s communication is the issue of social engineering and cyber security

  • Social Engineering attacks work in shortest time possible to be successful to avoid detection

  • The objectives of this paper are to identifying patterns and behaviour of social engineering attacks using causal loops

Read more

Summary

Introduction

Among the challenges in today’s communication is the issue of social engineering and cyber security. The communication paradigm that happens through the free space over which different nodes or gadgets interconnect for purposes ranging from fun, politics to business has become a security threat. The interconnection has increased innovation in technology, making social media networks a necessity in communication for business enterprises and for fun that can politically, socially and economically change communities. Multi-hop connectivity, which the social media network embraces as a communication paradigm, is an improved reliable connection with high level of efficiency over the space. This reliable connectivity is good, and a threat in that it provides faster interconnectivity for the cyber-attacks, making it almost impossible to detect the attacks

Objectives
Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call