Research on Social Engineering in Network Security

Article Preview

Abstract:

The social engineering techniques such as flattery, persuade, induce, disguise, threat, obedience and infiltration was summarized. The main methods and steps of social engineering research and the main six aspects contents such as social engineering technology analysis, social engineering case survey were also put forward. Finally, a model of social engineering attack based on complex network is built and some prevention methods aiming to social engineering attack were presented.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 989-994)

Pages:

4881-4884

Citation:

Online since:

July 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Shi Mingyu, Chen Shaojun. Discrimination of Sociology on Engineering Project and Social Engineering [J]. Academics. 2011 3 57-63.

Google Scholar

[2] Jiang Yu. Social Engineering Research of Computer Network Attack [J]. Journal of Hunan Economic Management College. 2006 17(6) 279-280.

Google Scholar

[3] Gao XiaoYan. Deceiving Technology Research of Attack and Defence in Network Security [J]. Journal of ZhengZhou Economics & Management Institute. 2006 21(1) 84-86.

Google Scholar

[4] Sun LiJuan. Discuss of Social Engineering [J] Journal of Kaifeng Institute of Education. 2009 29(4) 48-49.

Google Scholar

[5] Zhao QingQiang. Social Engineering Attack and Defence Countermeasure for Online Bank User [J]. Journal of ABC Wuhan Training College. 2011 147 78-79.

Google Scholar