Draft Outline
Draft Outline
Abstract
Introduction
Thesis Statement
Reiterate the thesis: This research explores the intricate tactics of social
engineering, emphasizes the psychological principles that underpin these
manipulative strategies, and evaluates the effectiveness of training and
awareness programs.
Discuss the Toyota Boshoku Corporation attack and its financial impact as a
case study in BEC attacks. Reference Lindsey (2019) to highlight how
simple tactics can lead to substantial financial loss.
Cover how attackers use tailgating and other in-person methods to gain
unauthorized access. Introduce hypothetical scenarios and reference cases
where tailgating has compromised secure areas.
Discuss the direct financial losses, as in the Toyota case, and the long-term
reputational harm organizations suffer post-breach. Reference Khachunts
(2022) on the organizational impacts of social engineering attacks.
Explain how social engineering attacks can lead to non-compliance with data
protection regulations and result in legal ramifications.
Conclusion
References
1. Chapagain, D., Kshetri, N., Aryal, B., & Dhakal, B. (2024). SEAtech:
Deception techniques in social engineering attacks: An analysis of
emerging trends and countermeasures.
https://doi.org/10.48550/arXiv.2408.02092
2. Happ, C., Melzer, A., & Steffgen, G. (2016). Trick with treat: Reciprocity
increases the willingness to communicate personal data. Computers in
Human Behavior, 61, 372–377.
https://doi.org/10.1016/j.chb.2016.03.026
5. Ferreyra, N. E. D., Aïmeur, E., Hage, H., Heisel, M., & van Hoogstraten,
C. G. (2020). Persuasion meets AI: Ethical considerations for the design
of social engineering countermeasures. Proceedings of the 12th
International Joint Conference on Knowledge Discovery, Knowledge
Engineering and Knowledge Management, 204–211.
https://doi.org/10.5220/0010142402040211