Social Engineering

Abstract

There are several techniques available to a hacker for breaching the Information Security defenses of an organization. The human approach often termed ‘Social Engineering’ and is probably the most difficult one to be dealt with. This paper describes Social Engineering, common techniques used and its impact to the organization. It discusses various forms of Social Engineering, and how they exploit common human behavior. The document highlights ways and means to counter these attacks, and also emphasizes on the importance of policy enforcement and user education in mitigating the risks posed by Social Engineering.

Authors and Affiliations

Abhishek Mahajan, Akash Verma

Keywords

Related Articles

Marker Based Augmented Reality Application in Education: Teaching and Learning

Augmented Reality [AR] can create a new era when information and knowledge implemented in an interesting way in education. Augmented Reality has great potentials in education, more specifically in learning. This interes...

Review Study of Leach Protocol

WSN is a wireless Sensor Network which is a power constrained system. In WSN nodes have limited power batteries which depend upon energy efficiency. In WSN there is major issue of energy efficiency. Energy can be consum...

Laser Atmospheric Transmission Limitations in Optical Wireless Communication Systems Based on Different Transmission Levels for Short and Local areas Network Applications

This paper has presented optical wireless communication systems performance prediction based on different visibility levels for indoor, local, and wide area network applications s over wide range of the affecting parame...

3-Dimensional Sterling Conception for System Security

Apart from being liable to social engineering attacks, text primarily based secrets are either weak-and-memorable or secure-but-difficult-to-remember If the password is machine generated it's mostly sophisticated for us...

Voice Assistance for Visually Impaired People Using Natural Language Processing

As the use of mobile devices is expanding and affecting various aspects of human life, the number and smartphone users is dramatically increasing. Consequently, the robustness of interaction between smartphone and human...

Download PDF file
  • EP ID EP18742
  • DOI -
  • Views 286
  • Downloads 8

How To Cite

Abhishek Mahajan, Akash Verma (2014). Social Engineering. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(9), -. https://europub.co.uk/articles/-A-18742