Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ ZENODOarrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
ZENODO
Article . 2019
License: CC BY
Data sources: Datacite
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
ZENODO
Article . 2019
License: CC BY
Data sources: ZENODO
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
ZENODO
Article . 2019
License: CC BY
Data sources: Datacite
versions View all 2 versions
addClaim

Social Engineering: A Technique for Managing Human Behavior

Authors: Bansla, Neetu; Kunwar, Swati; Khushboo Gupta;

Social Engineering: A Technique for Managing Human Behavior

Abstract

{"references": ["Francois Mouton, Mercia M. Malany, Louise Leenen and H.S. Venterz, \"Social Engineering Attack Framework\", IEEE/2014", "Aisha SuliamanAlazri, \"The Awareness of Social engineering in Information Revolution: Techniques and Challenges\", IEEE/2015", "Osuagwu E. U. and Chukwudebe G. A, Salihu T., Chukwudebe V. N., \"Mitigating Social Engineering for Improved Cyber security\", IEEE/2015", "M. NazreenBanu et al, \"A Comprehensive Study of Phishing Attacks\"/ (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 4 , 2013, 783-786", "Chirillo, John. \"Hack Attacks Denied\" A Complete Guide to Network Lockdowns for UNIX, Windows, and Linux, Second Edition\". Second Edition\". John Wiley & Sons, Inc. 2002", "Heur, Richard. \"Theft and Dumpster diving\". Defense Security Service Academy. March 1996. URL: http://www.mbay.net/~heuer/T3method/Theft.htm", "Hillary, Bob. \"SANs Security Essentials\". SANS Conference. July 2003", "Robinson, Jarvis. \"Internal Threat-Risks and Countermeasures\". Version 1.0. November 15, 2001. URL: http://www.sans.org/rr/papers/60/475.pdf", "Hu, Jim. \"AOL boosts email security after attack.\" CNET News. September 21, 2000. URL: http://news.com.com/2102-1023_3-242092.html?tag=st_util_print", "CERT Coordination Center. \"CERT Advisory CA=1991-04 Social Engineering\". September 18, 1997. URL: http://www.cert.org/advisories/CA-1991-04.html", "Granger, Sarah. \"Social Engineering Fundamentals, Part II: Combat Strategies\". Security Focus. January 9,2002. URL: http://www.securityfocus.com/printable/infocus/1533", "Granger, Sarah. \"Social Engineering Fundamentals, Part I: Hacker Tactics\". December 18, 2001", "National Cooperative Education Statistics Task Force. \"Protecting Your System Physical Security\" 2002. URL: http://nces.ed.gov/pubs98/safetech/chapter5.asp (4 April 2003)", "Mitnick, Kevin. The Art of Deception \u2013 Controlling \"The Human Element Security\". Indianapolis: Wiley Publishing Inc., 2002", "Gaudin, Sharon. \"How To Thwart The Social Engineers\" 10 May 2002. URL: http://itmanagement.earthweb.com/secu/article.php/1041161 (11 March 2003)", "Burton, Graeme. \"Companies exposed to 'social engineers' \u2014 Mitnick\" 4 September 2002. URL: http://www.infoconomy.com/pages/news-andgossip/group66338.adp (11 March 2003)"]}

Social engineering uses human behavior instead of technical measures for exploring systems, different data, things that are of any profitable use. This piece of research gives a briefing on how human mind is capable of invading into crucial systems or capturing useful information regarding people or organizations. Certain defense mechanisms and preventive measures are also covered in this paper. Social engineering is a human behavior based technique for hacking & luring people for sneaking into someone’s security system. Since social engineering relies heavily on human behavior, no hardware or equipment can be made to stop the losses, which arise as a result of human interaction. Therefore, certain good practices are suggested.Moreover, the purpose is to create awareness and study the impact of social engineering on the society.

Keywords

Social engineering, data, human, information, http://matjournals.com/Engineering-Journals.html

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    4
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Top 10%
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
    OpenAIRE UsageCounts
    Usage byUsageCounts
    visibility views 15
    download downloads 119
  • 15
    views
    119
    downloads
    Powered byOpenAIRE UsageCounts
Powered by OpenAIRE graph
Found an issue? Give us feedback
visibility
download
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
views
OpenAIRE UsageCountsViews provided by UsageCounts
downloads
OpenAIRE UsageCountsDownloads provided by UsageCounts
4
Top 10%
Average
Average
15
119
Green