Social Engineering

Abstract

There are several techniques available to a hacker for breaching the Information Security defenses of an organization. The human approach often termed ‘Social Engineering’ and is probably the most difficult one to be dealt with. This paper describes Social Engineering, common techniques used and its impact to the organization. It discusses various forms of Social Engineering, and how they exploit common human behavior. The document highlights ways and means to counter these attacks, and also emphasizes on the importance of policy enforcement and user education in mitigating the risks posed by Social Engineering.

Authors and Affiliations

Abhishek Mahajan, Akash Verma

Keywords

Related Articles

Decision Making to Evaluate Interpersonal Skills Based on Similarity Checking using Artificial Intelligence

In this paper, we proposed a method to solve the problem related to the team formation and influence of the team performance among the students. Group formation could be a key aspect in computer-supported cooperative le...

Experimental Investigation on the Permanent Dryout Heat Flux and Dryout Mass Transfer Coefficient on Single Horizontal Brass Tube of an Evaporative Heat Exchanger

An investigation on the permanent dryout heat flux and permanent dryout mass transfer coefficient on single horizontal brass tube of an evaporative heat exchanger is presented in this article. The permanent dry patch ex...

Assessment of Works under Jalyukta Shivar Campaign – A Case Study of Pusad Region

JYS is the Government of Maharashtra’s program to provide water for all and make villages scarcity-free. Maharashtra has been witnessing increasing agricultural and drinking water stress in recent years. Maharashtra gov...

slugImprovement Techniques in Manufacturing Industry

In today’s increasingly competitive world, it is important to constantly improve, be it a manufacturing or service industry. Quality with quantity is a main characteristic which helps a company stay in the competition....

slugA Survey on Current Cloud Computing Trends and Related Security Issues

Cloud Computing is an emerging technology which provides services on the basis of as you pay as you go. It provides resources (e.g. CPU and storage) as general utilities that can be leased and released by users through...

Download PDF file
  • EP ID EP18742
  • DOI -
  • Views 275
  • Downloads 8

How To Cite

Abhishek Mahajan, Akash Verma (2014). Social Engineering. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(9), -. https://europub.co.uk./articles/-A-18742