Loading

Social Engineering Threats and Pertinent Safekeeping Techniques
Uriri Omena1, Asibor Raphael2, Izebizuwa Rose3

1Uriri Omena, Department of Computer Science & Information Technology, Igbinedion University, Okada, Edo State, Nigeria.
2Dr Asibor Raphael Ehikhuemhen, Department of Computer Science/Information Technology, Igbinedion University, College of Natural & Applied Sciences, Okada, Nigeria.
3Izebizuwa Rose, Department of Computer Science University of Benin, Benin City, Edo State, Nigeria.

Manuscript received on 02 November 2017 | Revised Manuscript received on 21 November 2017 | Manuscript Published on 30 December 2017 | PP: 19-24 | Volume-7 Issue-2, November 2017 | Retrieval Number: A2470097117/2017©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The Information and Communication Technology (ICT) security in a socio-technical world was explored and focus made in particular on the susceptibility to social engineering attacks, Social engineering is the most commonly used tactic across all levels of adversaries to gain unauthorized access into a network. While many organizations attempt to implement a policy and technical capabilities to mitigate against this threat, network intrusions through social engineering attacks are often still highly successful. A proven way to assess an organization’s risk to these threats is to test the effectiveness of existing technical and organizational protections, starting with the security awareness of personnel. Most social engineering takes place via email, text message and phone. However, tactics can include simply walking in the front door behind someone possessing a valid badge, or dropping portable USB drives in the parking lot and waiting for an unsuspecting employee to plug them into their work computer. Whatever form social engineering takes, businesses and organizations are largely unprepared for how to effectively counter these attempts across their workforces. Getting employees’ attention and commitment to vigilance can be difficult without proving how easy those employees can be exploited. This paper explores this social engineering attack; analyze counter measures against the attack and makes recommendations on how it can be mitigated. 
Keyword: Social Engineering, Threats, Security Procedures, Intrusion and attacks
Scope of the Article: Social Engineering