Computer Science – Cryptography and Security
Scientific paper
2010-06-19
International journal on applications of graph theory in wireless ad hoc networks and sensor networks 2.2 (2010) 17-23
Computer Science
Cryptography and Security
7 Pages
Scientific paper
10.5121/jgraphoc.2010.2202
There are plenty of security software in market; each claiming the best, still we daily face problem of viruses and other malicious activities. If we know the basic working principal of such malware then we can very easily prevent most of them even without security software. Hackers and crackers are experts in psychology to manipulate people into giving them access or the information necessary to get access. This paper discusses the inner working of such attacks. Case study of Spyware is provided. In this case study, we got 100% success using social engineering techniques for deception on Linux operating system, which is considered as the most secure operating system. Few basic principal of defend, for the individual as well as for the organization, are discussed here, which will prevent most of such attack if followed.
Hasan Mosin
Prajapati Nilesh
Vohara Safvan
No associations
LandOfFree
Case Study On Social Engineering Techniques for Persuasion does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Case Study On Social Engineering Techniques for Persuasion, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Case Study On Social Engineering Techniques for Persuasion will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-431486