Abstract

Social networks have become a trusted communication medium for both personal and professional communication. However, hackers regularly exploit the trust of the users of social networks for their own gain. This is often done by using phishing attacks. Phishing emails are both a scam and a business. Many companies, governments and individuals have been affected by these attacks. The most powerful tool an attacker can use to access this knowledge is Social Engineering by manipulating a person into giving information to the social engineer. It is superior to most other forms of hacking in that it can breach even the most secure systems, as the users themselves are the most vulnerable part of the system. Research has shown that Social Engineering can be easily automated in many cases and can therefore be performed on a large scale. Social Engineering has become an emerging threat in virtual communities. Information security is key to any business’s growth. This paper gives an overview of Social Engineering attacks on social networks, Social Engineering principles and types.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.