ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Evaluation of Human Behavior Weaknesses in Social Engineering

Journal: International Journal of Science and Research (IJSR) (Vol.9, No. 3)

Publication Date:

Authors : ;

Page : 608-610

Keywords : Social Engineering; Impersonation; Eavesdropping;

Source : Downloadexternal Find it from : Google Scholarexternal


Security breach and hacking techniques has been available in numerous ways in this rapidly developing era of technology in order to gain access to desired information. The human approach of this phenomenon is often termed as ‘Social Engineering’ and it is probably the most difficult one to be dealt with. This paper describes Social Engineering non-technical approaches used to exploit human behavior and will point out or those behavior weaknesses that can be compromised and taken advantage of it to pull out a scam or breach a network security.

Last modified: 2021-06-27 15:59:27