Downloads provided by UsageCounts
{"references": ["Francois Mouton, Mercia M. Malany, Louise Leenen and H.S. Venterz, \"Social Engineering Attack Framework\", IEEE/2014", "Aisha SuliamanAlazri, \"The Awareness of Social engineering in Information Revolution: Techniques and Challenges\", IEEE/2015", "Osuagwu E. U. and Chukwudebe G. A, Salihu T., Chukwudebe V. N., \"Mitigating Social Engineering for Improved Cyber security\", IEEE/2015", "M. NazreenBanu et al, \"A Comprehensive Study of Phishing Attacks\"/ (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 4 , 2013, 783-786", "Chirillo, John. \"Hack Attacks Denied\" A Complete Guide to Network Lockdowns for UNIX, Windows, and Linux, Second Edition\". Second Edition\". John Wiley & Sons, Inc. 2002", "Heur, Richard. \"Theft and Dumpster diving\". Defense Security Service Academy. March 1996. URL: http://www.mbay.net/~heuer/T3method/Theft.htm", "Hillary, Bob. \"SANs Security Essentials\". SANS Conference. July 2003", "Robinson, Jarvis. \"Internal Threat-Risks and Countermeasures\". Version 1.0. November 15, 2001. URL: http://www.sans.org/rr/papers/60/475.pdf", "Hu, Jim. \"AOL boosts email security after attack.\" CNET News. September 21, 2000. URL: http://news.com.com/2102-1023_3-242092.html?tag=st_util_print", "CERT Coordination Center. \"CERT Advisory CA=1991-04 Social Engineering\". September 18, 1997. URL: http://www.cert.org/advisories/CA-1991-04.html", "Granger, Sarah. \"Social Engineering Fundamentals, Part II: Combat Strategies\". Security Focus. January 9,2002. URL: http://www.securityfocus.com/printable/infocus/1533", "Granger, Sarah. \"Social Engineering Fundamentals, Part I: Hacker Tactics\". December 18, 2001", "National Cooperative Education Statistics Task Force. \"Protecting Your System Physical Security\" 2002. URL: http://nces.ed.gov/pubs98/safetech/chapter5.asp (4 April 2003)", "Mitnick, Kevin. The Art of Deception \u2013 Controlling \"The Human Element Security\". Indianapolis: Wiley Publishing Inc., 2002", "Gaudin, Sharon. \"How To Thwart The Social Engineers\" 10 May 2002. URL: http://itmanagement.earthweb.com/secu/article.php/1041161 (11 March 2003)", "Burton, Graeme. \"Companies exposed to 'social engineers' \u2014 Mitnick\" 4 September 2002. URL: http://www.infoconomy.com/pages/news-andgossip/group66338.adp (11 March 2003)"]}
Social engineering uses human behavior instead of technical measures for exploring systems, different data, things that are of any profitable use. This piece of research gives a briefing on how human mind is capable of invading into crucial systems or capturing useful information regarding people or organizations. Certain defense mechanisms and preventive measures are also covered in this paper. Social engineering is a human behavior based technique for hacking & luring people for sneaking into someone’s security system. Since social engineering relies heavily on human behavior, no hardware or equipment can be made to stop the losses, which arise as a result of human interaction. Therefore, certain good practices are suggested.Moreover, the purpose is to create awareness and study the impact of social engineering on the society.
Social engineering, data, human, information, http://matjournals.com/Engineering-Journals.html
Social engineering, data, human, information, http://matjournals.com/Engineering-Journals.html
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 4 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Top 10% | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
| views | 15 | |
| downloads | 119 |

Views provided by UsageCounts
Downloads provided by UsageCounts