Social Engineering

Authors(3) :-Syed Nasir Abas, Shuvam Bhimrajkar, C. K. Raina

A common thought individuals have regarding cyber attackers is that they solely use advanced hacking tools and technology to interrupt into people’s computers, accounts and mobile devices. This can be merely not true. Cyber attackers have learned that one in every of the best ways in which to steal your info or hack your pc is by merely reprimand and deceptive you. During this story, we'll find out how these varieties of human attacks (called social engineering attacks) work and what you'll be able to do to safeguard yourself. Social network s area unit a number of t h e largest and quickest growing on line services these days. Facebook, for instance has been hierarchical because the second most visited sit e on t h e Internet, and has been reportage growth rates as high as third per week. One in every of t h e key options of social network sis t h e support they supply for locating new friends. For ex ample, social networks might attempt to mechanically establish that u look for currently one another so as to propose relationship recommendations. This paper presents Associate in Nursing tried survey of the present state of Social Engineering – together with the social context of the development, a quick history of notable social engineering attacks and their impact, a structured summary of social engineering attacks and customary ways, a discussion of assorted defense ways and, finally, discusses some open challenges within the topic.

Authors and Affiliations

Syed Nasir Abas
Computer Science Department, Adesh Institute of Technology, Chandigarh, Kharar, Punjab, India
Shuvam Bhimrajkar
Computer Science Department, Adesh Institute of Technology, Chandigarh, Kharar, Punjab, India
C. K. Raina
Computer Science Department, Adesh Institute of Technology, Chandigarh, Kharar, Punjab, India

Social Engineering, Unidirectional Communication, Social Engineering Attack ,social engineering prevention, people awareness

  1. Anderson, Ross J. (2008). Security engineering: a guide to building dependable distributed systems (2nd ed.). Indianapolis, IN: Wiley. p. 1040. ISBN 978-0-470-06852-6.Chapter 2, page 17
  2. Lim, Joo S., et al. "Exploring the Relationship between Organizational Culture and Information Security Culture." Australian Information Security Management Conference.
  3. Anderson, D., Reimers, K. and Barretto, C. (March 2014). Post-Secondary Education Network Security: Results of Addressing the End-User Challenge.publication date Mar 11, 2014 publication description INTED2014 (International Technology, Education, and Development Conference)
  4. Schlienger, Thomas; Teufel, Stephanie (2003). "Information security culture-from analysis to change". South African Computer Journal. 31: 46-52.
  5. Jaco, K: "CSEPS Course Workbook" (2004), unit 3, Jaco Security Publishing.
  6. The story of HP pretexting scandal with discussion is available at Davani, Faraz (14 August 2011). "HP Pretexting Scandal by Faraz Davani". Scribd. Retrieved 15 August2011.
  7. "Pretexting: Your Personal Information Revealed", Federal Trade Commission
  8. Fagone, Jason. "The Serial Swatter". New York Times. Retrieved 25 November 2015.
  9. "Train For Life". Web.archive.org. 5 January 2010. Archived from the original on 5 January 2010. Retrieved 9 August 2012.
  10. "The Real Dangers of Spear-Phishing Attacks". FireEye. 2016. Retrieved 9 October2016.
  11. "Chinese Espionage Campaign Compromises Forbes.com to Target US Defense, Financial Services Companies in Watering Hole Style Attack". invincea.com. 10 February 2015. Retrieved 23 February 2017.
  12. "Social Engineering, the USB Way". Light Reading Inc. 7 June 2006. Archived from the original on 13 July 2006. Retrieved 23 April 2014.
  13. "Archived copy" (PDF). Archived from the original (PDF) on 11 October 2007. Retrieved 2 March 2012.
  14. Conklin, Wm. Arthur; White, Greg; Cothren, Chuck; Davis, Roger; Williams, Dwayne (2015). Principles of Computer Security, Fourth Edition (Official Comptia Guide). New York: McGraw-Hill Education. pp. 193-194. ISBN 978-0071835978.
  15. Raywood, Dan (4 Aug 2016). " BHUSA Dropped USB Experiment Detailed". info security. Retrieved 28 July 2017.
  16. Leyden, John (18 April 2003). "Office workers give away passwords". Theregister.co.uk. Retrieved 11 April 2012.
  17. "Passwords revealed by sweet deal". BBC News. 20 April 2004. Retrieved 11 April2012.
  18. Treglia, J., & Delia, M. (2017). Cyber Security Inoculation. Presented at NYS Cyber Security Conference, Empire State Plaza Convention Center, Albany, NY, June 3-4.
  19. Mitnick, K., & Simon, W. (2005). "The Art Of Intrusion". Indianapolis, IN: Wiley Publishing.
  20. Allsopp, William. Unauthorised access: Physical penetration testing for it security teams. Hoboken, NJ: Wiley, 2009. 240-241.

Publication Details

Published in : Volume 2 | Issue 6 | November-December 2017
Date of Publication : 2017-12-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 1109-1114
Manuscript Number : CSEIT1726291
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Syed Nasir Abas, Shuvam Bhimrajkar, C. K. Raina, "Social Engineering", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, pp.1109-1114, November-December-2017. |          | BibTeX | RIS | CSV

Article Preview