Next Article in Journal
Ant Colony Optimization Task Scheduling Algorithm for SWIM Based on Load Balancing
Previous Article in Journal
An Optimal Energy-Saving Strategy for Home Energy Management Systems with Bounded Customer Rationality
Article Menu
Issue 4 (April) cover image

Export Article

Open AccessFeature PaperReview

Social Engineering Attacks: A Survey

School of Electrical Engineering and Computer Science, University of North Dakota, Grand Forks, ND 58202, USA
Author to whom correspondence should be addressed.
Future Internet 2019, 11(4), 89;
Received: 15 February 2019 / Revised: 18 March 2019 / Accepted: 27 March 2019 / Published: 2 April 2019
(This article belongs to the Special Issue Signal Processing for Next Generation Wireless Networks)
PDF [981 KB, uploaded 2 April 2019]


The advancements in digital communication technology have made communication between humans more accessible and instant. However, personal and sensitive information may be available online through social networks and online services that lack the security measures to protect this information. Communication systems are vulnerable and can easily be penetrated by malicious users through social engineering attacks. These attacks aim at tricking individuals or enterprises into accomplishing actions that benefit attackers or providing them with sensitive data such as social security number, health records, and passwords. Social engineering is one of the biggest challenges facing network security because it exploits the natural human tendency to trust. This paper provides an in-depth survey about the social engineering attacks, their classifications, detection strategies, and prevention procedures. View Full-Text
Keywords: social engineering attacks; cyber security; phishing; vishing; spear phishing; scams; baiting; robocalls social engineering attacks; cyber security; phishing; vishing; spear phishing; scams; baiting; robocalls

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).

Share & Cite This Article

MDPI and ACS Style

Salahdine, F.; Kaabouch, N. Social Engineering Attacks: A Survey. Future Internet 2019, 11, 89.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics



[Return to top]
Future Internet EISSN 1999-5903 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top