Social engineering exploits human psychology and organizational processes to bypass technical defenses and gain unauthorized access to information, systems, or physical spaces. This report analyses common social engineering techniques, the cognitive biases they exploit, notable historical case studies, and practical mitigation strategies that blend technical controls, policy design, and human-centric security training. Emphasis is placed on measurable, reproducible interventions and the importance of ethical considerations when developing countermeasures
Social Engineering: The Human Side of Hacking
Maaz Ahmad Khan,A. P. Jadhao,D. S. Kalyankar,R. S. Durge,D. G. Ingale,R. N. Solanke
Published 2025 in International Journal of Advanced Research in Science, Communication and Technology
ABSTRACT
PUBLICATION RECORD
- Publication year
2025
- Venue
International Journal of Advanced Research in Science, Communication and Technology
- Publication date
2025-11-10
- Fields of study
Not labeled
- Identifiers
- External record
- Source metadata
Semantic Scholar
CITATION MAP
EXTRACTION MAP
CLAIMS
- No claims are published for this paper.
CONCEPTS
- No concepts are published for this paper.
REFERENCES
Showing 1-2 of 2 references · Page 1 of 1
CITED BY
- No citing papers are available for this paper.
Showing 0-0 of 0 citing papers · Page 1 of 1