Social Engineering
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 9
Abstract
There are several techniques available to a hacker for breaching the Information Security defenses of an organization. The human approach often termed ‘Social Engineering’ and is probably the most difficult one to be dealt with. This paper describes Social Engineering, common techniques used and its impact to the organization. It discusses various forms of Social Engineering, and how they exploit common human behavior. The document highlights ways and means to counter these attacks, and also emphasizes on the importance of policy enforcement and user education in mitigating the risks posed by Social Engineering.
Authors and Affiliations
Abhishek Mahajan, Akash Verma
Marker Based Augmented Reality Application in Education: Teaching and Learning
Augmented Reality [AR] can create a new era when information and knowledge implemented in an interesting way in education. Augmented Reality has great potentials in education, more specifically in learning. This interes...
Review Study of Leach Protocol
WSN is a wireless Sensor Network which is a power constrained system. In WSN nodes have limited power batteries which depend upon energy efficiency. In WSN there is major issue of energy efficiency. Energy can be consum...
Laser Atmospheric Transmission Limitations in Optical Wireless Communication Systems Based on Different Transmission Levels for Short and Local areas Network Applications
This paper has presented optical wireless communication systems performance prediction based on different visibility levels for indoor, local, and wide area network applications s over wide range of the affecting parame...
3-Dimensional Sterling Conception for System Security
Apart from being liable to social engineering attacks, text primarily based secrets are either weak-and-memorable or secure-but-difficult-to-remember If the password is machine generated it's mostly sophisticated for us...
Voice Assistance for Visually Impaired People Using Natural Language Processing
As the use of mobile devices is expanding and affecting various aspects of human life, the number and smartphone users is dramatically increasing. Consequently, the robustness of interaction between smartphone and human...