Evaluation of Human Behavior Weaknesses in Social Engineering
Journal: International Journal of Science and Research (IJSR) (Vol.9, No. 3)Publication Date: 2020-03-05
Authors : Said Masihullah Hashimi;
Page : 608-610
Keywords : Social Engineering; Impersonation; Eavesdropping;
Abstract
Security breach and hacking techniques has been available in numerous ways in this rapidly developing era of technology in order to gain access to desired information. The human approach of this phenomenon is often termed as ‘Social Engineering’ and it is probably the most difficult one to be dealt with. This paper describes Social Engineering non-technical approaches used to exploit human behavior and will point out or those behavior weaknesses that can be compromised and taken advantage of it to pull out a scam or breach a network security.
Other Latest Articles
- Business Intelligence
- Evaluate the Effects of Silodosin and Solifenacin Combination with Silodosin Alone in Reducing DJ Stent Related Symptoms
- Two Cases of Unsuspected Presence of Foreign Body in Ear, Nose and Throat Region
- Cystic Artery Pseudoaneurysm Secondary to Xanthogranulomatous Cholecystitis: A Rare Manifestation
- Industrie 4.0 - Advanced Engineering of Smart Products and Smart Production
Last modified: 2021-06-27 15:59:27