A Comprehensive Study of Social Engineering - The Art of Mind Hacking

Authors

  • Pummy Dhiman  Assistant professor, College of Creative Studies,vidya jyoti eduversity,Derabassi Punjab, India
  • Sheikh Abdul Wajid  Lecturer , PG Department of Computer Sciences, University of Kashmir, Srinagar, India
  • Farah Fayaz Quraishi  Research Scholar, PG Department of Computer Sciences, University of Kashmir, Srinagar, India

Keywords:

Social Engineering, Phishing, Information Security

Abstract

The objective of this research is to presents and demonstrates what social engineering is and how one can use this to hack the human mind for capturing useful information about organizations or individuals and how they can be prevented. A questionnaire has conducted accordingly to determine the awareness of social engineering. Since there is neither hardware nor software available to install in human being to protect against social engineering, it is essential that good practices be implemented. This work contains some current scientific, technical and psychological information on the topic of social engineering today.

References

  1. T. Bakhshi, M.Papadaki and S.M.Furnell," A Practical Assessment of Social Engineering Vulnerabilities", Human Aspects of Information Security & Assurance (HAISA 2008)
  2. Anshul Kumar, MansiChaudhary and Nagresh Kumar," Social Engineering Threats and Awareness: A Survey", European Journal of Advances in Engineering and Technology, 2015
  3. Anshul Kumar1, Nagresh Kumar,"Social Engineering: Attack, Prevention and Framework", International Journal for Research in Applied Science & Engineering Technology (IJRASET), February 2016
  4. Megha Gupta and Sameer Agrawal." A SURVEY ON SOCIAL ENGINEERING AND THE ART OF DECEPTION", International Journal of Innovations in Engineering and Technology (IJIET), June 2012
  5. Abdullah Algarni and YueXu," Social Engineering in Social Networking Sites: Phase-Based and Source-Based Models", International Journal of e-Education, e-Business, e-Management and e-Learning, December 2013
  6. A.Karakasiliotis, S.M.Furnell and M.Papadaki," Assessing end-user awareness of social engineering and phishing",Australian Information Warfare and SecurityConference, 2006
  7. www.us-cert.gov/ncas/tips/ST04-014
  8. Christopher Hadnagy," Social Engineering- The art of Human Hacking",Wiley Publishing Inc.
  9. www.hyphenet.com/what-is-social-engineering/
  10. www.webroot.com/in/en/home/resources/tips/online-shopping-banking/secure-what-is-social-engineering
  11. www.social-engineer.org
  12. www.social-engineer.org/wiki/archives/CommonAttacks/CommonAttacks-ClassicSE.html
  13. www.cnet.com/news/protecting-yourself-from-vishing-attacks/
  14. Peltier, T., “Social Engineering: Concepts and Solutions" Information Systems Security, publish 2006.
  15. C. Anubhav, S. Dharmendra,B. Monark,S. Vrijendra ," A Comprehensive Study of Social Engineering Based Attacks in India to Develop a Conceptual Model", International Journal of Information & Network Security (IJINS), June 2012ss

Downloads

Published

2017-12-31

Issue

Section

Research Articles

How to Cite

[1]
Pummy Dhiman, Sheikh Abdul Wajid, Farah Fayaz Quraishi, " A Comprehensive Study of Social Engineering - The Art of Mind Hacking, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, pp.543-548, November-December-2017.