Preventing Social Engineering Attacks With Behavior Driven Authentication in Digital Workspaces
Keywords:
Social Engineering, Behavior-Driven Authentication, Cybersecurity, Digital Workspace, User Behavior Analytics, Phishing Prevention, Anomaly Detection, Access ControlAbstract
Social engineering attacks remain one of the most dangerous vectors in cybersecurity, exploiting human behavior rather than system vulnerabilities. As workforces transition to digital and hybrid models, traditional security protocols are no longer sufficient. This paper explores the use of behavior-driven authentication (BDA) to prevent such attacks in digital workspaces. By analyzing users' behavioral biometrics and contextual patterns, BDA systems can detect anomalies and mitigate unauthorized access attempts. This approach, when integrated into digital workspace security architectures, offers a resilient barrier against evolving social engineering threats.
References
Salahdine F., Kaabouch N. Social engineering attacks: A survey. Future Internet 11, 4, 89 (2019).
Tsinganos N., Sakellariou G., Fouliras P. Towards an automated recognition system for chat-based social engineering attacks. Proc. of the 13th Int. Conf. on Global Security, Safety & Sustainability 105, 47–55 (2018).
Gardner B., Thomas V. Building an Information Security Awareness Program: Defending Against Social Engineering and Technical Threats. Syngress, Burlington 1, 1–195 (2014).
Beuran R., Pham C., Tan Y. Teaching social engineering through phishing exercises. Proc. of Int. Conf. on Cyber Security and Protection of Digital Services 1, 218–223 (2016).
Borowiec Ł., Demidowski K., Pecka M. The analysis of social engineering methods in attacks on authentication systems. Advances in Web Technologies and Applications 7, 110–118 (2023).
Hijji M., Alam G. A multivocal literature review on growing social engineering based cyber-attacks/threats during the COVID-19 pandemic. IEEE Access 9, 71550–71571 (2021).
Zaoui M., Yousra B., Yassine S., Yassine M. A comprehensive taxonomy of social engineering attacks and defense mechanisms. IEEE Access 10, 125638–125659 (2022).
Chandra J.V., Challa N., Pasupuleti S.K. Intelligence-based defense system to protect from advanced persistent threat. Indian J. of Science and Technology 8, 27, 1–8 (2015).
Lado M.J. Cybersecurity Essentials: Protecting Your Digital Life, Data, and Privacy. CyberSecure Press 1, 1–278 (2019).
Sillanpää M. Social engineering against security policy. Theseus.fi 1, 1–37 (2019).
Salahdine F., Kaabouch N. A review of social engineering attack detection models. Journal of Cyber Intelligence and Cybersecurity 3, 2, 112–123 (2019).
Beuran R., Pham C., Tan Y. Cybersecurity education and training for the human factor. Cyber Security and Education Journal 2, 1, 45–59 (2016).
Borowiec Ł., Demidowski K., Pecka M. Behavioral mitigation strategies in digital authentication. Web Technologies Journal 5, 2, 78–90 (2023).
Tsinganos N., Sakellariou G. Recognition of social engineering dialogues using chat behavior analytics. ACM Conf. Proc. 1, 1, 82–87 (2018).
Gardner B. Defending against social engineering and technical threats. Syngress Books 1, 1–195 (2014).
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Maree Girdwood (Author)

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.





