International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 137 | Views: 346 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Case Studies | Information Technology | India | Volume 3 Issue 6, June 2014 | Popularity: 6.9 / 10


     

Profile Impostoring: A Use Case on the Rising Social Engineering Attack on Facebook Users

Cephas Mawere, Thabiso Peter Mpofu


Abstract: Social engineering attacks have taken a new twist as a growing number of people use online social networking sites to foster social relationships among each other and market products. Of interest is Facebook whose users have exponentially increased; some of these users are prominent individuals with high influence in various communities like celebrities; philanthropists; religious ministers and non- profit organizations. Data retrieval from Facebook profiles is thus becoming a major tool for business which has led to most unsuspecting users being victims of deception. Profile impostoring; also known as identity theft; is increasingly on the rise and becoming an underlying threat to information security. The cyber perpetrators are creating fake Facebook profiles of prominent individuals who have a large following. Ordinary individuals are also not at their mercy. With such high pending risk of identity theft there is need to develop methods that help Facebook fans to automatically detect deception; identify imposters and get them arrested.


Keywords: Social engineering, social networking, profile impostoring, identity theft, information security, cyber perpetrators


Edition: Volume 3 Issue 6, June 2014


Pages: 69 - 74



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Cephas Mawere, Thabiso Peter Mpofu, "Profile Impostoring: A Use Case on the Rising Social Engineering Attack on Facebook Users", International Journal of Science and Research (IJSR), Volume 3 Issue 6, June 2014, pp. 69-74, URL: https://www.ijsr.net/getabstract.php?paperid=201486, DOI: https://www.doi.org/10.21275/201486



Downloads: 357 | Views: 1000 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Information Technology, Ghana, Volume 8 Issue 6, June 2019

Pages: 64 - 69

The Use of Information and Communication Technology (ICT) in Teaching and Learning of Mathematics in Al-Faruq College of Education, Wenchi-Ghana

Abu Sulemana, Yahuza Abdul-Kadir


Downloads: 301 | Views: 558 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Information Technology, India, Volume 8 Issue 1, January 2019

Pages: 456 - 460

Analysis of Blockchain and its Working Principle

S. Banupriya, G. Renuka Devi


Downloads: 266 | Views: 407 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Information Technology, China, Volume 9 Issue 1, January 2020

Pages: 107 - 112

Network Optimization using Multi-Agent Genetic Algorithm

Sikandar Hanif


Downloads: 260 | Views: 471 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Information Technology, Malaysia, Volume 8 Issue 1, January 2019

Pages: 64 - 70

University of the Future (UotF): Redesign Business Model for Local University in Malaysia through Humanising Education and 4IR

Nor Zaiasron Bin Yahaya, Abdul Rahman Bin Ahmad Dahlan


Downloads: 254 | Views: 418 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Information Technology, India, Volume 9 Issue 1, January 2020

Pages: 477 - 479

IoT Based Smart Street Light for Energy Efficiency and Safety

Tanmay Patil, Arjun Ramendra


Top