This article surveys the literature on social engineering. There are lots of security\napplication and hardware in market; still there are several methods that\ncan be used to breach the information security defenses of an organization\nor individual. Social engineering attacks are interested in gaining information\nthat may be used to carry out actions such as identity theft, stealing password\nor gaining information for another type of attack. The threat lies with the\ncombinations of social engineering with another type of attacks like Phishing\nand Watering hole attack which make it hard to defense against. This research\naims to investigate the impact of modern Social Engineering on the\norganization or individual. It describes the categories of Social Engineering,\nand how the attacker takes advantage of human behavior. At the same time, I\nalso discuss the direct and indirect attack of social engineering and the defense\nmechanism against this attack.
Loading....