Cyber Security Expo
Social Engineering - An Attack Vector Most Intricate to Tackle! by Ashish Thapar on 12/06/07

There are several techniques available to a hacker for breaching the Information Security defenses of an organization. The human approach often termed ‘Social Engineering’ and is probably the most difficult one to be dealt with. This paper describes Social Engineering, common techniques used and its impact to the organization. It discusses various forms of Social Engineering, and how they exploit common human behavior. The document highlights ways and means to counter these attacks, and also emphasizes on the importance of policy enforcement and user education in mitigating the risks posed by Social Engineering.

This document is in PDF format. To view it click here.

Rate this article

All images, content & text (unless other ownership applies) are © copyrighted 2000 -  , All rights reserved. Comments are property of the respective posters.