dc.contributor.author |
Bhattad, Prasad |
|
dc.contributor.author |
Patil, Rakesh |
|
dc.date.accessioned |
2024-02-01T06:04:56Z |
|
dc.date.available |
2024-02-01T06:04:56Z |
|
dc.date.issued |
2023-11 |
|
dc.identifier.citation |
Social Engineering in Cyber Security: A Comprehensive Review of Modern Threats, Challenges, and Counter Measures |
en_US |
dc.identifier.issn |
2581-9879 |
|
dc.identifier.issn |
0076-2571 |
|
dc.identifier.uri |
http://localhost:8080/xmlui/handle/123456789/14802 |
|
dc.description.abstract |
Human-to-human communication is now easier and more immediate thanks to developments in digital technology. However, social networks and other internet services without adequate security measures may make personal and sensitive data accessible online. By using social engineering techniques, unscrupulous persons can easily break into communication systems. These assaults try to deceive people or organisations into carrying out acts that are advantageous to the attackers or giving them sensitive information such social security numbers, health records, and passwords. Because it takes advantage of the inherent human desire to trust, social engineering is one of the largest problems in network security. This essay offers a thorough examination of social engineering attacks, including their categories, methods of detection, and preventative measures. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
Kesari Mahratta Trust |
en_US |
dc.relation.ispartofseries |
Vol - I;Issue - I |
|
dc.subject |
Social Engineering Attacks |
en_US |
dc.subject |
Prevention Techniques |
en_US |
dc.subject |
Gap’s. |
en_US |
dc.title |
Social Engineering in Cyber Security: A Comprehensive Review of Modern Threats, Challenges, and Counter Measures |
en_US |
dc.type |
Article |
en_US |