Manuscript Number : CSEIT1726291
Social Engineering
Authors(3) :-Syed Nasir Abas, Shuvam Bhimrajkar, C. K. Raina A common thought individuals have regarding cyber attackers is that they solely use advanced hacking tools and technology to interrupt into people’s computers, accounts and mobile devices. This can be merely not true. Cyber attackers have learned that one in every of the best ways in which to steal your info or hack your pc is by merely reprimand and deceptive you. During this story, we'll find out how these varieties of human attacks (called social engineering attacks) work and what you'll be able to do to safeguard yourself. Social network s area unit a number of t h e largest and quickest growing on line services these days. Facebook, for instance has been hierarchical because the second most visited sit e on t h e Internet, and has been reportage growth rates as high as third per week. One in every of t h e key options of social network sis t h e support they supply for locating new friends. For ex ample, social networks might attempt to mechanically establish that u look for currently one another so as to propose relationship recommendations.
This paper presents Associate in Nursing tried survey of the present state of Social Engineering – together with the social context of the development, a quick history of notable social engineering attacks and their impact, a structured summary of social engineering attacks and customary ways, a discussion of assorted defense ways and, finally, discusses some open challenges within the topic.
Syed Nasir Abas Social Engineering, Unidirectional Communication, Social Engineering Attack ,social engineering prevention, people awareness Publication Details Published in : Volume 2 | Issue 6 | November-December 2017 Article Preview
Computer Science Department, Adesh Institute of Technology, Chandigarh, Kharar, Punjab, India
Shuvam Bhimrajkar
Computer Science Department, Adesh Institute of Technology, Chandigarh, Kharar, Punjab, India
C. K. Raina
Computer Science Department, Adesh Institute of Technology, Chandigarh, Kharar, Punjab, India
Date of Publication : 2017-12-31
License: This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 1109-1114
Manuscript Number : CSEIT1726291
Publisher : Technoscience Academy