Social Engineering: A Technique for Managing Human Behavior
Authors/Creators
- 1. Assistant Professor, Department of CSE, VCE, Meerut, UP, India
- 2. Assistant Professor, Department of AS, VCE, Meerut, UP, India
Description
Social engineering uses human behavior instead of technical measures for exploring systems, different data, things that are of any profitable use. This piece of research gives a briefing on how human mind is capable of invading into crucial systems or capturing useful information regarding people or organizations. Certain defense mechanisms and preventive measures are also covered in this paper. Social engineering is a human behavior based technique for hacking & luring people for sneaking into someone’s security system. Since social engineering relies heavily on human behavior, no hardware or equipment can be made to stop the losses, which arise as a result of human interaction. Therefore, certain good practices are suggested.Moreover, the purpose is to create awareness and study the impact of social engineering on the society.
Files
(18-22)Social Engineering A Technique for Handling Human Behaviour.pdf
Files
(320.1 kB)
| Name | Size | Download all |
|---|---|---|
|
md5:b695418a4362fe8926fa5a984852fdac
|
320.1 kB | Preview Download |
Additional details
References
- Francois Mouton, Mercia M. Malany, Louise Leenen and H.S. Venterz, "Social Engineering Attack Framework", IEEE/2014
- Aisha SuliamanAlazri, "The Awareness of Social engineering in Information Revolution: Techniques and Challenges", IEEE/2015
- Osuagwu E. U. and Chukwudebe G. A, Salihu T., Chukwudebe V. N., "Mitigating Social Engineering for Improved Cyber security", IEEE/2015
- M. NazreenBanu et al, "A Comprehensive Study of Phishing Attacks"/ (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 4 , 2013, 783-786
- Chirillo, John. "Hack Attacks Denied" A Complete Guide to Network Lockdowns for UNIX, Windows, and Linux, Second Edition". Second Edition". John Wiley & Sons, Inc. 2002
- Heur, Richard. "Theft and Dumpster diving". Defense Security Service Academy. March 1996. URL: http://www.mbay.net/~heuer/T3method/Theft.htm
- Hillary, Bob. "SANs Security Essentials". SANS Conference. July 2003
- Robinson, Jarvis. "Internal Threat-Risks and Countermeasures". Version 1.0. November 15, 2001. URL: http://www.sans.org/rr/papers/60/475.pdf
- Hu, Jim. "AOL boosts email security after attack." CNET News. September 21, 2000. URL: http://news.com.com/2102-1023_3-242092.html?tag=st_util_print
- CERT Coordination Center. "CERT Advisory CA=1991-04 Social Engineering". September 18, 1997. URL: http://www.cert.org/advisories/CA-1991-04.html
- Granger, Sarah. "Social Engineering Fundamentals, Part II: Combat Strategies". Security Focus. January 9,2002. URL: http://www.securityfocus.com/printable/infocus/1533
- Granger, Sarah. "Social Engineering Fundamentals, Part I: Hacker Tactics". December 18, 2001
- National Cooperative Education Statistics Task Force. "Protecting Your System Physical Security" 2002. URL: http://nces.ed.gov/pubs98/safetech/chapter5.asp (4 April 2003)
- Mitnick, Kevin. The Art of Deception – Controlling "The Human Element Security". Indianapolis: Wiley Publishing Inc., 2002
- Gaudin, Sharon. "How To Thwart The Social Engineers" 10 May 2002. URL: http://itmanagement.earthweb.com/secu/article.php/1041161 (11 March 2003)
- Burton, Graeme. "Companies exposed to 'social engineers' — Mitnick" 4 September 2002. URL: http://www.infoconomy.com/pages/news-andgossip/group66338.adp (11 March 2003)
Subjects
- Computer Science / IT Journals
- http://matjournals.com/Engineering-Journals.html