International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 9 Issue 3, March 2020

Evaluation of Human Behavior Weaknesses in Social Engineering

Said Masihullah Hashimi, Komal

Security breach and hacking techniques has been available in numerous ways in this rapidly developing era of technology in order to gain access to desired information. The human approach of this phenomenon is often termed as ‘Social Engineering’ and it is probably the most difficult one to be dealt with. This paper describes Social Engineering non-technical approaches used to exploit human behavior and will point out or those behavior weaknesses that can be compromised and taken advantage of it to pull out a scam or breach a network security.

Keywords: Social Engineering, Impersonation, Eavesdropping, Piggybacking, Dumpster diving

Edition: Volume 9 Issue 3, March 2020

Pages: 608 - 610


How to Cite this Article?

Said Masihullah Hashimi, Komal, "Evaluation of Human Behavior Weaknesses in Social Engineering", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SR20224005026, Volume 9 Issue 3, March 2020, 608 - 610

67 PDF Views | 68 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Social Engineering'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 3, March 2020

Pages: 608 - 610

Evaluation of Human Behavior Weaknesses in Social Engineering

Said Masihullah Hashimi, Komal

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 279 - 285

Graphical Password Authentication Techniques: A Review

Aakansha Gokhale, Vijaya Waghmare

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 802 - 806

An Enhanced Countermeasure Technique for Deceptive Phishing Attack

K. Selvan, Dr. M. Vanitha

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 412 - 414

Secure Authentication and Cyber Crime Mitigation for Social Networking Sites

Anjitha T, Harsha V

Share this article



Similar Articles with Keyword 'Impersonation'

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013

Pages: 234 - 237

Analysis And Detection Of Black Hole Attack In MANET

Swati Saini, Vinod Saroha

Share this article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 3, March 2020

Pages: 608 - 610

Evaluation of Human Behavior Weaknesses in Social Engineering

Said Masihullah Hashimi, Komal

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1572 - 1577

Analysis of Various Malicious Node Detection Techniques: A Review

Priyanka, Mukesh Dalal

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1235 - 1237

Single Sign-on Secure Password Mechanism for Distributed Computer Networks

Deepali M. Devkate, N. D. Kale

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2319 - 2324

Public Integrity Checking for Dynamic Data Sharing among Multi Groups

Athulya Prabhakaran, Nithya VP

Share this article



Similar Articles with Keyword 'Eavesdropping'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 570 - 575

CaRP For User Authentication System Using Mobile Interface

Walanjkar Dipika Dattatraya, V. S. Nandedkar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 3, March 2020

Pages: 608 - 610

Evaluation of Human Behavior Weaknesses in Social Engineering

Said Masihullah Hashimi, Komal

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1295 - 1299

A Review on Security Attacks in Mobile Ad-hoc Networks

Amandeep Kaur, Dr. Amardeep Singh

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1045 - 1051

Detecting Sinkhole and Selective Forwarding Attack in Wireless Sensor Networks

Umashri Karkikatti, Dr. Nalini N

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2214 - 2220

A Comprehensive Survey on: Quantum Cryptography

Pranav Verma, Ritika Lohiya

Share this article



Similar Articles with Keyword 'Piggybacking'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 3, March 2020

Pages: 608 - 610

Evaluation of Human Behavior Weaknesses in Social Engineering

Said Masihullah Hashimi, Komal

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2512 - 2516

Distributed Cache Invalidation Method using Extended Adaptive Time to Live Mechanism for Cache Consistency in Wireless Mobile Network

Sonali S. Shukla, Yashwant Ingle

Share this article
Top