TY - JOUR TI - Social Engineering AU - Syed Nasir Abas AU - Shuvam Bhimrajkar AU - C. K. Raina JO - International Journal of Scientific Research in Computer Science, Engineering and Information Technology PB - Technoscience Academy DA - 2017/12/31 PY - 2017 DO - https://doi.org/10.32628/IJSRCSEIT UR - https://ijsrcseit.com/CSEIT1726291 VL - 2 IS - 6 SP - 1109 EP - 1114 AB - A common thought individuals have regarding cyber attackers is that they solely use advanced hacking tools and technology to interrupt into people’s computers, accounts and mobile devices. This can be merely not true. Cyber attackers have learned that one in every of the best ways in which to steal your info or hack your pc is by merely reprimand and deceptive you. During this story, we'll find out how these varieties of human attacks (called social engineering attacks) work and what you'll be able to do to safeguard yourself. Social network s area unit a number of t h e largest and quickest growing on line services these days. Facebook, for instance has been hierarchical because the second most visited sit e on t h e Internet, and has been reportage growth rates as high as third per week. One in every of t h e key options of social network sis t h e support they supply for locating new friends. For ex ample, social networks might attempt to mechanically establish that u look for currently one another so as to propose relationship recommendations. This paper presents Associate in Nursing tried survey of the present state of Social Engineering – together with the social context of the development, a quick history of notable social engineering attacks and their impact, a structured summary of social engineering attacks and customary ways, a discussion of assorted defense ways and, finally, discusses some open challenges within the topic.