Posts

Artificial intelligence for cybersecurity: Literature review and future research directions (A Review)

The article  Artificial intelligence for cybersecurity: Literature review and future research directions focuses on the evolving relationship between social engineering and newer technological developments, particularly the role of advanced systems such as AI in amplifying cyber threats. Its main strength lies in expanding the discussion beyond traditional definitions of social engineering and emphasizing how modern technologies increase the scale, realism, and personalization of attacks. This aligns with broader research showing that emerging tools enable more convincing and automated deception, making attacks more effective and harder to detect . Compared to the first article, this paper feels more contemporary and forward-looking, situating social engineering within a rapidly changing technological landscape. In terms of research quality, the article appears stronger and more developed than the first. It engages more directly with current trends and proposes conceptual framewor...

Overview of Social Engineering Attacks on Social Networks: A Review

The article “Overview of Social Engineering Attacks on Social Networks” provides a clear and accessible introduction to the topic of social engineering within online environments. Its main strength lies in its ability to synthesize key concepts such as phishing, manipulation tactics, and the role of human vulnerability into a concise overview. The authors successfully emphasize that social engineering exploits trust rather than technical weaknesses, highlighting an important perspective in cybersecurity discourse. This central argument is well-supported by general observations about the growing prevalence of attacks and their scalability, particularly through automation . Overall, the paper is well-structured and easy to follow, making it suitable as an introductory resource. However, the depth of research presented appears somewhat limited. While the article references established ideas about phishing and user manipulation, it does not engage deeply with empirical data, case studies...

🔐 Cybersecurity Resources Blog

🔐 Cybersecurity Resource Blog Introduction Cybersecurity is a rapidly evolving field that requires continuous learning, ethical responsibility, and strong technical foundations. This blog provides key resources and deep explanations of two fundamental concepts every cybersecurity professional must understand: Ethical Hacking and Cryptography . 🛡️ Ethical Hacking What is Ethical Hacking? Ethical hacking refers to the practice of intentionally probing systems, networks, or applications to identify security vulnerabilities before malicious hackers can exploit them . Unlike cybercriminals, ethical hackers operate with permission and follow legal and ethical guidelines. They are often called “white-hat hackers” , and their primary goal is to improve security by thinking and acting like attackers. Key Principles of Ethical Hacking Authorization : Ethical hackers must have explicit permission from the organization. Scope Definition : Testing must stay within agreed boundaries. Confidentia...

Reviewing research papers for Vigenère and Playfair ciphers

Vigenère Cipher Paper Review The article Message Security in Classical Cryptography Using the Vigenere Cipher Method , published in the International Journal Software Engineering and Computer Science (IJSECS) by Lembaga KITA in April 2024, examines the Vigenère cipher, a classical polyalphabetic substitution technique introduced by Blaise de Vigenère. The paper explains how the cipher works by using a repeating key to obscure letter frequency patterns, making it more secure than monoalphabetic substitution ciphers. The authors also discuss the historical significance of the Vigenère cipher and its role in classical cryptography, while connecting it to modern discussions about message confidentiality. I found this article to be fairly thorough in covering the historical background and fundamental mechanics of the Vigenère cipher. The explanations are clear and easy to follow, especially in showing how the cipher improves upon simpler substitution methods. The inclusion of both streng...

A Small Blog of Resources for Computer Cybersecurity Professionals (Social Engineering and Ethical Hacking)

Introduction Cybersecurity professionals must understand both human and technical aspects of security. Two of the most important concepts in this field are social engineering and ethical hacking. These concepts help security professionals identify weaknesses, protect systems and educate users about threats in the real world. Social Engineering Social engineering is a technique used by attackers to manipulate people into revealing confidential information or performing actions that compromise security. Instead of attacking systems directly, social engineers exploit human behavior such as trust, fear, curiosity or urgency. This makes social engineering especially dangerous because even the most secure systems can be compromised if users are deceived. A common example of social engineering is phishing. In a phishing attack, an attacker sends an email that appears to come from a trusted organization, such as a bank or employer, asking the user to click a link or provide login credential...