Social Engineering: Hacking a Human Being through Technology
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 5
Abstract
Abstract: Social engineering is the art of extracting classified information by psychological manipulation. It is a strategical attack that depends on human interaction, a complex fraud system, tricking individuals into giving their password and bank information. It is a simple preference of criminals to exploit peoples trust rather thantechnology, since it is easier to exploithumans’ natural inclination to trust. Lack of awareness has caused for such social engineering crimes to have been overlooked and not treated as a major threat. The objective of this review paper is to lay emphasize on the human element which is the biggest threat to the security of a companyor organization and to highlight social engineering based attacks as one of the major threats to the society. The increase in the usage of such scams and con attacks on the weakest security links to information: humans, have caused major individual and occupational loss. The problem with social engineering is that it is among the mostunder researched and most effective cyber-crimes. It is viewed outside the domains of computer security since there are no technical solutions to this problem.
Authors and Affiliations
Akshat Jain , Harshita Tailang , Harsh Goswami , Soumiya Dutta , Mahipal Singh Sankhla , Rajeev Kumar
An Applied Method of Gaussian Noise by Fuzzy Filter
Abstract: The world has witnessed a major change in the way computing systems are used, especially to process images. DIP is a prominent area of research in the field of information technology that helps in process...
Mathematical Modeling of Image Steganographic System
Image based steganography is a dangerous technique of hiding secret messages in the image in such a way that no one apart from the sender and intended recipient suspects the existence of the message. It is based...
Automated system for deployment of websites and windows services to the production servers
Abstract: This paper is discussed on automated system for deployment of websites and windows services to the production servers. The aim of this paper is to develop and implement an automatic system for deployment...
“An efficient IP trace back using packetizing logging and preshared key exchange”
Abstract: Here in this work we presented a hybrid model of packet marking and logging for the IP trace backfor the node that wants to attack any node in the network. The main idea is to detect the DOS attacks in th...
Comprehensive Review: Intrusion Detection System and Techniques
Abstract: Security becomes an important challenge to secure the network from cyber attacks. Up till now, threats on the network and security are significant research issues. With increasing the amount of network, there i...