Preventing Social Engineering Attacks With Behavior Driven Authentication in Digital Workspaces

Authors

  • Maree Girdwood Cybersecurity Analyst, Australia. Author

Keywords:

Social Engineering, Behavior-Driven Authentication, Cybersecurity, Digital Workspace, User Behavior Analytics, Phishing Prevention, Anomaly Detection, Access Control

Abstract

Social engineering attacks remain one of the most dangerous vectors in cybersecurity, exploiting human behavior rather than system vulnerabilities. As workforces transition to digital and hybrid models, traditional security protocols are no longer sufficient. This paper explores the use of behavior-driven authentication (BDA) to prevent such attacks in digital workspaces. By analyzing users' behavioral biometrics and contextual patterns, BDA systems can detect anomalies and mitigate unauthorized access attempts. This approach, when integrated into digital workspace security architectures, offers a resilient barrier against evolving social engineering threats.

References

Salahdine F., Kaabouch N. Social engineering attacks: A survey. Future Internet 11, 4, 89 (2019).

Tsinganos N., Sakellariou G., Fouliras P. Towards an automated recognition system for chat-based social engineering attacks. Proc. of the 13th Int. Conf. on Global Security, Safety & Sustainability 105, 47–55 (2018).

Gardner B., Thomas V. Building an Information Security Awareness Program: Defending Against Social Engineering and Technical Threats. Syngress, Burlington 1, 1–195 (2014).

Beuran R., Pham C., Tan Y. Teaching social engineering through phishing exercises. Proc. of Int. Conf. on Cyber Security and Protection of Digital Services 1, 218–223 (2016).

Borowiec Ł., Demidowski K., Pecka M. The analysis of social engineering methods in attacks on authentication systems. Advances in Web Technologies and Applications 7, 110–118 (2023).

Hijji M., Alam G. A multivocal literature review on growing social engineering based cyber-attacks/threats during the COVID-19 pandemic. IEEE Access 9, 71550–71571 (2021).

Zaoui M., Yousra B., Yassine S., Yassine M. A comprehensive taxonomy of social engineering attacks and defense mechanisms. IEEE Access 10, 125638–125659 (2022).

Chandra J.V., Challa N., Pasupuleti S.K. Intelligence-based defense system to protect from advanced persistent threat. Indian J. of Science and Technology 8, 27, 1–8 (2015).

Lado M.J. Cybersecurity Essentials: Protecting Your Digital Life, Data, and Privacy. CyberSecure Press 1, 1–278 (2019).

Sillanpää M. Social engineering against security policy. Theseus.fi 1, 1–37 (2019).

Salahdine F., Kaabouch N. A review of social engineering attack detection models. Journal of Cyber Intelligence and Cybersecurity 3, 2, 112–123 (2019).

Beuran R., Pham C., Tan Y. Cybersecurity education and training for the human factor. Cyber Security and Education Journal 2, 1, 45–59 (2016).

Borowiec Ł., Demidowski K., Pecka M. Behavioral mitigation strategies in digital authentication. Web Technologies Journal 5, 2, 78–90 (2023).

Tsinganos N., Sakellariou G. Recognition of social engineering dialogues using chat behavior analytics. ACM Conf. Proc. 1, 1, 82–87 (2018).

Gardner B. Defending against social engineering and technical threats. Syngress Books 1, 1–195 (2014).

Downloads

Published

2025-11-19

How to Cite

Maree Girdwood. (2025). Preventing Social Engineering Attacks With Behavior Driven Authentication in Digital Workspaces. ISCSITR- INTERNATIONAL JOURNAL OF CYBER SECURITY (ISCSITR-IJCS) ISSN (Online): 3067-7254, 6(6), 1-7. https://iscsitr.in/index.php/ISCSITR-IJCS/article/view/ISCSITR-IJCS_2025_06_06_001