title,doi,url,abstract,journal,publication_year,pmid,arxiv Social Engineering, https://doi.org/10.32628/IJSRCSEIT, https://ijsrcseit.com/CSEIT1726291, A common thought individuals have regarding cyber attackers is that they solely use advanced hacking tools and technology to interrupt into people’s computers accounts and mobile devices. This can be merely not true. Cyber attackers have learned that one in every of the best ways in which to steal your info or hack your pc is by merely reprimand and deceptive you. During this story we'll find out how these varieties of human attacks (called social engineering attacks) work and what you'll be able to do to safeguard yourself. Social network s area unit a number of t h e largest and quickest growing on line services these days. Facebook for instance has been hierarchical because the second most visited sit e on t h e Internet and has been reportage growth rates as high as third per week. One in every of t h e key options of social network sis t h e support they supply for locating new friends. For ex ample social networks might attempt to mechanically establish that u look for currently one another so as to propose relationship recommendations. This paper presents Associate in Nursing tried survey of the present state of Social Engineering – together with the social context of the development a quick history of notable social engineering attacks and their impact a structured summary of social engineering attacks and customary ways a discussion of assorted defense ways and finally discusses some open challenges within the topic. , International Journal of Scientific Research in Computer Science Engineering and Information Technology, 2017, CSEIT1726291