
Research Article
Social Engineering Attacks on the Cyber-Physical System: Human Cyber and Physical Impacts
@INPROCEEDINGS{10.1007/978-3-031-81570-6_20, author={Robert Makila Beni}, title={Social Engineering Attacks on the Cyber-Physical System: Human Cyber and Physical Impacts}, proceedings={Towards new e-Infrastructure and e-Services for Developing Countries. 15th International Conference, AFRICOMM 2023, Bobo-Dioulasso, Burkina Faso, November 23--25, 2023, Proceedings, Part I}, proceedings_a={AFRICOMM}, year={2025}, month={2}, keywords={Social Engineering Cybersecurity Cyber-physical Systems Cyber-Physical-Human Systems Human Factor Industrial control systems}, doi={10.1007/978-3-031-81570-6_20} }
- Robert Makila Beni
Year: 2025
Social Engineering Attacks on the Cyber-Physical System: Human Cyber and Physical Impacts
AFRICOMM
Springer
DOI: 10.1007/978-3-031-81570-6_20
Abstract
Technological advancements have created new issues in IT security. Cyber-physical infrastructures, which mix physical elements with interconnected IT systems, have emerged as a major trend in industries such as transportation, energy, health, and public safety. However, the integration of the physical and digital worlds has generated new security threats, including social engineering attacks. Cybercriminals employ social engineering to trick users and obtain personal information or access privileges to computer systems. Social engineering attacks are frequently carried out using communication channels such as social networks, e-mails, and phone conversations. This study intends to investigate how social engineering attacks can be carried out in a cyber-physical-human environment. We will investigate the impact of cyber-physical-human infrastructures, cybercriminals’ attack strategies, the effects of these attacks, and measures of prevention. The significance of this research stems from the fact that cyber-physical infrastructures are increasingly being employed in crucial scenarios where a breach in security could have fatal implications. It is therefore critical to understand the dangers associated with these infrastructures and to put adequate safeguards in place to protect them against social engineering attacks.