A Comprehensive Study of Social Engineering - The Art of Mind Hacking

Authors(3) :-Pummy Dhiman, Sheikh Abdul Wajid, Farah Fayaz Quraishi

The objective of this research is to presents and demonstrates what social engineering is and how one can use this to hack the human mind for capturing useful information about organizations or individuals and how they can be prevented. A questionnaire has conducted accordingly to determine the awareness of social engineering. Since there is neither hardware nor software available to install in human being to protect against social engineering, it is essential that good practices be implemented. This work contains some current scientific, technical and psychological information on the topic of social engineering today.

Authors and Affiliations

Pummy Dhiman
Assistant professor, College of Creative Studies,vidya jyoti eduversity,Derabassi Punjab, India
Sheikh Abdul Wajid
Lecturer , PG Department of Computer Sciences, University of Kashmir, Srinagar, India
Farah Fayaz Quraishi
Research Scholar, PG Department of Computer Sciences, University of Kashmir, Srinagar, India

Social Engineering, Phishing, Information Security

  1. T. Bakhshi, M.Papadaki and S.M.Furnell," A Practical Assessment of Social Engineering Vulnerabilities", Human Aspects of Information Security & Assurance (HAISA 2008)
  2. Anshul Kumar, MansiChaudhary and Nagresh Kumar," Social Engineering Threats and Awareness: A Survey", European Journal of Advances in Engineering and Technology, 2015
  3. Anshul Kumar1, Nagresh Kumar,"Social Engineering: Attack, Prevention and Framework", International Journal for Research in Applied Science & Engineering Technology (IJRASET), February 2016
  4. Megha Gupta and Sameer Agrawal." A SURVEY ON SOCIAL ENGINEERING AND THE ART OF DECEPTION", International Journal of Innovations in Engineering and Technology (IJIET), June 2012
  5. Abdullah Algarni and YueXu," Social Engineering in Social Networking Sites: Phase-Based and Source-Based Models", International Journal of e-Education, e-Business, e-Management and e-Learning, December 2013
  6. A.Karakasiliotis, S.M.Furnell and M.Papadaki," Assessing end-user awareness of social engineering and phishing",Australian Information Warfare and SecurityConference, 2006
  7. www.us-cert.gov/ncas/tips/ST04-014
  8. Christopher Hadnagy," Social Engineering- The art of Human Hacking",Wiley Publishing Inc.
  9. www.hyphenet.com/what-is-social-engineering/
  10. www.webroot.com/in/en/home/resources/tips/online-shopping-banking/secure-what-is-social-engineering
  11. www.social-engineer.org
  12. www.social-engineer.org/wiki/archives/CommonAttacks/CommonAttacks-ClassicSE.html
  13. www.cnet.com/news/protecting-yourself-from-vishing-attacks/
  14. Peltier, T., “Social Engineering: Concepts and Solutions" Information Systems Security, publish 2006.
  15. C. Anubhav, S. Dharmendra,B. Monark,S. Vrijendra ," A Comprehensive Study of Social Engineering Based Attacks in India to Develop a Conceptual Model", International Journal of Information & Network Security (IJINS), June 2012ss

Publication Details

Published in : Volume 2 | Issue 6 | November-December 2017
Date of Publication : 2017-12-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 543-548
Manuscript Number : CSEIT1726179
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Pummy Dhiman, Sheikh Abdul Wajid, Farah Fayaz Quraishi, "A Comprehensive Study of Social Engineering - The Art of Mind Hacking", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, pp.543-548, November-December-2017.
Journal URL : http://ijsrcseit.com/CSEIT1726179

Article Preview

Follow Us

Contact Us