Research Paper | Computer Science & Engineering | India | Volume 9 Issue 3, March 2020
Evaluation of Human Behavior Weaknesses in Social Engineering
Said Masihullah Hashimi, Komal
Security breach and hacking techniques has been available in numerous ways in this rapidly developing era of technology in order to gain access to desired information. The human approach of this phenomenon is often termed as ‘Social Engineering’ and it is probably the most difficult one to be dealt with. This paper describes Social Engineering non-technical approaches used to exploit human behavior and will point out or those behavior weaknesses that can be compromised and taken advantage of it to pull out a scam or breach a network security.
Keywords: Social Engineering, Impersonation, Eavesdropping, Piggybacking, Dumpster diving
Edition: Volume 9 Issue 3, March 2020
Pages: 608 - 610
How to Cite this Article?
Said Masihullah Hashimi, Komal, "Evaluation of Human Behavior Weaknesses in Social Engineering", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SR20224005026, Volume 9 Issue 3, March 2020, 608 - 610
156 PDF Views | 157 PDF Downloads
Similar Articles with Keyword 'Social Engineering'
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 279 - 285Graphical Password Authentication Techniques: A Review
Aakansha Gokhale, Vijaya Waghmare
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015
Pages: 802 - 806An Enhanced Countermeasure Technique for Deceptive Phishing Attack
K. Selvan, Dr. M. Vanitha
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016
Pages: 412 - 414Secure Authentication and Cyber Crime Mitigation for Social Networking Sites
Anjitha T, Harsha V
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 3, March 2020
Pages: 608 - 610Evaluation of Human Behavior Weaknesses in Social Engineering
Said Masihullah Hashimi, Komal
Similar Articles with Keyword 'Impersonation'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1572 - 1577Analysis of Various Malicious Node Detection Techniques: A Review
Priyanka, Mukesh Dalal
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016
Pages: 2319 - 2324Public Integrity Checking for Dynamic Data Sharing among Multi Groups
Athulya Prabhakaran, Nithya VP
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013
Pages: 234 - 237Analysis And Detection Of Black Hole Attack In MANET
Swati Saini, Vinod Saroha
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 1235 - 1237Single Sign-on Secure Password Mechanism for Distributed Computer Networks
Deepali M. Devkate, N. D. Kale
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 7 Issue 4, April 2018
Pages: 1042 - 1047A Secure End-To-End Protocol for Secure Transmission of SMS
Vaidehi V. Mantri, M. Y. Joshi
Similar Articles with Keyword 'Eavesdropping'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1295 - 1299A Review on Security Attacks in Mobile Ad-hoc Networks
Amandeep Kaur, Dr. Amardeep Singh
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016
Pages: 1885 - 1890A Proposed Paper for D-Scrabble Physical Layer Security Model Integrated with AI
Devansh Dave
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1045 - 1051Detecting Sinkhole and Selective Forwarding Attack in Wireless Sensor Networks
Umashri Karkikatti, Dr. Nalini N
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 570 - 575CaRP For User Authentication System Using Mobile Interface
Walanjkar Dipika Dattatraya, V. S. Nandedkar
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 2214 - 2220A Comprehensive Survey on: Quantum Cryptography
Pranav Verma, Ritika Lohiya
Similar Articles with Keyword 'Piggybacking'
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 2512 - 2516Distributed Cache Invalidation Method using Extended Adaptive Time to Live Mechanism for Cache Consistency in Wireless Mobile Network
Sonali S. Shukla, Yashwant Ingle
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 3, March 2020
Pages: 608 - 610Evaluation of Human Behavior Weaknesses in Social Engineering
Said Masihullah Hashimi, Komal