(18-22) Social Engineering A Technique For Handling Human Behaviour
(18-22) Social Engineering A Technique For Handling Human Behaviour
Volume 5 Issue 1
Abstract
Social engineering uses human behavior instead of technical measures for exploring systems,
differentdata, thingsthat are of any profitable use. This piece of research gives a briefing on
how human mind is capable of invading into crucial systems or capturing useful information
regarding people or organizations. Certain defense mechanisms and preventive measures are
also covered in this paper. Social engineering is a human behavior based technique for
hacking & luring people for sneaking into someone’s security system. Since social
engineering relies heavily on human behavior, no hardware or equipment can be made to
stop the losses, which arise as a result of human interaction. Therefore, certain good
practices are suggested.Moreover, the purpose is to create awareness and study the impact of
social engineering on the society.
interrogates in such a way that sufferer‘s also may lead to sudden decisions being
identity is confirmed and through this they taken due to fear of an untoward incident.
assemble the crucial data. The striker
begins by developing as a co-worker, Playing on user’s Sympathy: The social
police, tax officials who have the authority engineer may make-believe to be an
to know things. [4]. employee from outside, perhaps from the
phone company or the company's ISP-
TYPES OF SOCIAL ENGINEERING Internet service provider. Nature of people
SKILLS is to help a person who is in trouble [9].
Following are the few Skills to exploits
user to get access to your system. Creating Confusion: Another trick
involves first creating a problem and then
Impersonating Staff: This is an art of taking advantage of it. It can be as simple
discovering situation to convince a target, as setting off a fire alarm so that everyone
which can be a person or a computer to will vacate the area quickly, without
release information or perform an action. locking down his or her computers. Social
This is conducted mostly via telephone or engineers can then use a logged-on session
emails. Most influential and danger hoax to do their dirty work [10] [14].
for attainment of physical access to any
system is to pretend to be somebody from Reverse Social Engineering: An even
inside the corporation. Some users may trickier practice of social engineering take
gave their password to a "unfamiliar place when a social engineer gets and
person‖ on a phone call, thinking him to be makes others to ask him or her questions
the member of IT staff. This is specifically instead of questioning them. These social
true if the caller indicates that their engineers usually have to do a lot of
account may be restricted/disabled and that planning, preparation, scheduling,
they might not be able to access important forecasting, research and investigation to
e-mails or access needed network shares if pull it off, placing themselves in a position
they do not cooperate. It is the most time of seeming authority or expertise [11].
consuming attack as it requires
investigation and research to get data and Mail: The use of an interesting subject line
information regarding target to establish triggers and activates an emotion that may
the legality in the mind of target[8][9]. leads to accidental participation from the
social engineer. There are two common
Intimidation Strategies: In this case, the forms. The first involves malicious code;
social engineer tries to pretend as this code is usually hidden within a file
somebody important like a big boss from attached to an email. The intention is
headquarters, an inspector from the explained in an International journal of
government, a top client of the company, computer [5] [12] for improving QoS of
or someone else who can assault fear into routing protocols in Mobile ad hoc
the heart of regular employees. He or she networks.
comes storming/raid in, or calls the victim
up, already screaming, yelling, angry, Dumpster Diving: Someone from the
irritated or annoyed. They may also company throwing away junk mail or
threaten the employee to fire if they do not routine mail / letter of the company
get the information they need [9] [14] [17]. without ripping the document. If the mail
contained personal information, or credit
Hoaxing: A hoax is an effort or attempt to card offers, that dumpster diver could use
trick and pretend the individuals into to carry out identity theft. Dumpster diver
trusting somewhat ―false‖ are ―real‖. It also searches for information like company