Said Masihullah Hashimi, Komal
Abstract: Security breach and hacking techniques has been available in numerous ways in this rapidly developing era of technology in order to gain access to desired information. The human approach of this phenomenon is often termed as ‘Social Engineering’ and it is probably the most difficult one to be dealt with. This paper describes Social Engineering non-technical approaches used to exploit human behavior and will point out or those behavior weaknesses that can be compromised and taken advantage of it to pull out a scam or breach a network security.
Keywords: Social Engineering, Impersonation, Eavesdropping, Piggybacking, Dumpster diving