IP Wave

Share this post

User's avatar
IP Wave
#21 Social Engineering: Human Factor for Cyber Security
Copy link
Facebook
Email
Notes
More

#21 Social Engineering: Human Factor for Cyber Security

Role of Human behaviour in Cybercrime.

IP Wave's avatar
IP Wave
Sep 19, 2022

Share this post

User's avatar
IP Wave
#21 Social Engineering: Human Factor for Cyber Security
Copy link
Facebook
Email
Notes
More
Share
Image credit: Freepik

In August, India released National Crime Records Bureau data illustrating the alarming increase in cybercrime. Most notably, India recorded 52,974 incidents of cybercrime in 2021, up from 50,035 cases in 2020 and up more than 15% from 2019. (44,735 cases).

India is in the top five countries in terms of victims of cybercrime, According to the recently released Internet Crime Report by the FBI. Moreover, 48% of the people will exchange their password for a chocolate, reveals a study. Such trends highlight the need for greater education on the risks associated with cybercrime as well as effective protection strategies.

NCRB data also indicates perpetrators' motivations, with online fraud accounting for the majority of recorded offenses. This raises an important question - How prepared are we to fend off cyberattacks?

Cybercriminals are constantly developing new methods of carrying out social engineering attacks to gain access to their victims' accounts and data. Social engineering typically involves tricking unsuspecting victims into acting by providing them with convincing information via phone calls, email, or even social media platforms. An example of a social engineering attack would be an email requesting the user to update their username and password for an account they own. If the email looks authentic and seems legitimate, the user would update their account without realizing they were being duped by a scammer.

The bad news is, that cybercrime will never be going away. The good news is that you can protect yourself from these threats by using simple techniques like keeping your password safe, changing your password regularly, and never provide your personal information or login information to unknown sources via email.

Why do people fall for social engineering attacks?

Research suggests that humans are often the weakest link when it comes to protecting against cyber-attacks.

Cybercriminals exploit limitations in a user's cognitive processing to achieve successful attacks. In addition, social engineering attacks rely on human weaknesses such as credulity, greed, ignorance, curiosity, carelessness, and helpfulness. However, focusing simply on human vulnerabilities falls short of explaining how social engineering assaults work. Numerous academics use Cialdini's six principles of influence and persuasion—reciprocity, commitment and consistency, social evidence, liking, authority, and scarcity—to explain the effectiveness of social engineering assaults.

Most social engineering attacks can be carried out using relatively simple methods which do not require technical knowledge to carry out. There are many different types of social engineering attacks and they often take advantage of a person's trust or naivete to fool them into performing an action that could have devastating consequences such as opening a malicious attachment or giving hackers access to their system. To help prevent these types of attacks from occurring, you need to be aware of the different tactics that cybercriminals use to gain access to your information.

Such social engineering tactics are often successful because they exploit human vulnerabilities, including cognitive limitations. Therefore, it is important to take a more holistic approach when designing security systems against social engineering attacks. By incorporating insights from psychology, it is possible to better understand why people are susceptible to these attacks and develop more robust solutions against them.


Subscribe to IP Wave

Launched a year ago
IP Wave is a dedicated platform exploring intellectual property, innovation, and emerging technologies.

Share this post

User's avatar
IP Wave
#21 Social Engineering: Human Factor for Cyber Security
Copy link
Facebook
Email
Notes
More
Share

Discussion about this post

User's avatar
Ghibli-fication: What AI Art Cost The Earth?
Studio Ghibli has been adored for decades by animation fans for its pastel watercolor backgrounds, emotive characters, and magical stories.
Apr 5 • 
Shivani Singh
6

Share this post

User's avatar
IP Wave
Ghibli-fication: What AI Art Cost The Earth?
Copy link
Facebook
Email
Notes
More
India Needs to Pay More to Spend More
By Amogh Dev Rai - Research Director, ASIA
Mar 22 • 
IP Wave
6

Share this post

User's avatar
IP Wave
India Needs to Pay More to Spend More
Copy link
Facebook
Email
Notes
More
Bad Maps & Big Losses: How India’s Geospatial Gaps Are Breaking E-Commerce
One afternoon, despite our office being just metres from a ‘10-minute delivery’ warehouse, I found myself on a long call guiding a lost delivery agent…
Apr 9 • 
Manashjyoti Karjee
5

Share this post

User's avatar
IP Wave
Bad Maps & Big Losses: How India’s Geospatial Gaps Are Breaking E-Commerce
Copy link
Facebook
Email
Notes
More

Ready for more?

© 2025 IP Wave
Privacy ∙ Terms ∙ Collection notice
Start writingGet the app
Substack is the home for great culture

Share

Copy link
Facebook
Email
Notes
More

Create your profile

User's avatar

Only paid subscribers can comment on this post

Already a paid subscriber? Sign in

Check your email

For your security, we need to re-authenticate you.

Click the link we sent to , or click here to sign in.