Social Engineering

Abstract

There are several techniques available to a hacker for breaching the Information Security defenses of an organization. The human approach often termed ‘Social Engineering’ and is probably the most difficult one to be dealt with. This paper describes Social Engineering, common techniques used and its impact to the organization. It discusses various forms of Social Engineering, and how they exploit common human behavior. The document highlights ways and means to counter these attacks, and also emphasizes on the importance of policy enforcement and user education in mitigating the risks posed by Social Engineering.

Authors and Affiliations

Abhishek Mahajan, Akash Verma

Keywords

Related Articles

A Review Paper on Image Compression Techniques

Image compression is the process of converting original image into reduced modified image that occupies less number of bytes on the disk and transmits quickly from one place to another. The image compression not only de...

Numerical Simulation on Retrofitting in Roof Corner Joint Strengthened With FRP Using FEM Method

Repair and strengthening of damaged or vulnerable reinforced concrete structures is important in order to guarantee the safety of residents or users. Beams are important structural elements for withstanding loads, so fi...

Optimization of Association Rule Mining using FP_Growth Algorithm with GA

Frequent pattern mining is one of the active research themes in data mining which covers a broad spectrum of data mining tasks viz. Association rules, correlations, causality, ratio rules, emerging patterns etc. In this...

Wireless Controlled Sailing Robot for Oceanic Missions

Ocean exploration and navigational research by supporting expeditions with computer vision techniques have shown potential for sailing robots development to make measurements on the ocean surface. Sailing robots explore...

Voice Assistance for Visually Impaired People Using Natural Language Processing

As the use of mobile devices is expanding and affecting various aspects of human life, the number and smartphone users is dramatically increasing. Consequently, the robustness of interaction between smartphone and human...

Download PDF file
  • EP ID EP18742
  • DOI -
  • Views 289
  • Downloads 8

How To Cite

Abhishek Mahajan, Akash Verma (2014). Social Engineering. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(9), -. https://europub.co.uk./articles/-A-18742