
Social Engineering Penetration Testing
Author(s) -
Vamshi Krishna Motru
Publication year - 2021
Publication title -
international journal for research in applied science and engineering technology
Language(s) - English
Resource type - Journals
ISSN - 2321-9653
DOI - 10.22214/ijraset.2021.35187
Subject(s) - social engineering (security) , upgrade , computer security , information security , penetration (warfare) , computer science , point (geometry) , risk analysis (engineering) , engineering , business , operations research , geometry , mathematics , operating system
In this universe of digitalization, the requirement for information protection and information security is very significant. The IT organizations today care for their information over everything. For organizations, information protection is additionally significant for any person. In any case, regardless of how secure the organization is, how cutting-edge is the innovation utilized, or how modern their products are, there's as yet a weakness in each area known as 'Human'.The ability of gathering sensitive information from a person is known as Social Engineering. Social Engineering exceeds a variant security danger as it has demonstrated to be one of the simplest, least expensive, and vigorous and profoundly fruitful ways for criminals to accomplish their finishes. This paper depicts social engineering, progressed techniques utilized,and their effect on associations. This paper can help the security analysts to acquire experiences into social engineering from an alternate point of view, and specifically, upgrade the current and future investigation on social engineering monitor mechanisms.