Downloads: 173
Research Paper | Computer Science & Engineering | India | Volume 9 Issue 3, March 2020
Evaluation of Human Behavior Weaknesses in Social Engineering
Said Masihullah Hashimi | Komal [70]
Abstract: Security breach and hacking techniques has been available in numerous ways in this rapidly developing era of technology in order to gain access to desired information. The human approach of this phenomenon is often termed as ‘Social Engineering’ and it is probably the most difficult one to be dealt with. This paper describes Social Engineering non-technical approaches used to exploit human behavior and will point out or those behavior weaknesses that can be compromised and taken advantage of it to pull out a scam or breach a network security.
Keywords: Social Engineering, Impersonation, Eavesdropping, Piggybacking, Dumpster diving
Edition: Volume 9 Issue 3, March 2020,
Pages: 608 - 610
Similar Articles with Keyword 'Social Engineering'
Downloads: 121
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 279 - 285Graphical Password Authentication Techniques: A Review
Aakansha Gokhale | Vijaya Waghmare
Downloads: 135
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015
Pages: 802 - 806An Enhanced Countermeasure Technique for Deceptive Phishing Attack
K. Selvan | Dr. M. Vanitha [2]