Social Engineering

Read Complete Research Material


Social Engineering: A Hindrance to Information Security

Social Engineering: A Hindrance to Information Security

Objectives of the suggested Study

Social technology is a threat that is increasing and threatens organisations existence. A social engineer can get possession of vital enterprise information that is vital for the organisation and by this threaten the organisation. To avert successful deception endeavours the organisations need to educate their workers about social technology fraud techniques that can be utilised for profiting information. Therefore, data security learning desires new learning approaches to cope with the threats. A answer to the problem is the use of an automated chatbot that gives the employees information about a threat that is tough to spot. To realise if an automated chatbot is a possible solution to teach the users, an investigation about the applicability is undertook. The enquiry is founded on a review that compares traditional security education that is founded on reading a in writing informational text and the use of an automated chatbot that simulates a deception try with the reason to rob an identity. The learning with the automated chatbot is to be exposed to an persona deception attempt in a controlled environment and then get an explanation of what have occurred and way. The automated chatbot is evolved with a deception try that looks like a usual market research approach, the market research where undertook with question that accumulate data that is important for persona thefts. The result of the enquiry displays that it may be likely to use an automated chatbot for teaching in social engineering deception attacks. However there is still a need to explain some major troubles before there are possible to make certain the concept is completely feasible.

The objectives for achieving the aim in this dissertation are:

Evaluate various social engineering techniques that can be used in an implementation of a social engineering AI-bot.

Build a demonstration prototype that can emulate a social engineering attack in an educational context.

Test and evaluate the prototype through a usability test comparing it with an academic reference group with non specialist security education.

Research design

The research will be based on secondary data collection. The data will be extracted from various journals, articles and books. In secondary research data will be extracted from various journals, books and articles.


Qualitative research will be used for proposed study. Qualitative research is more subjective as compared to quantitative research and uses very different methods of collecting information which could be both primary and secondary. As already mentioned this study will choose the secondary method. The theme of this type of research will be investigative along with open-ended.

This type of research is often less expensive than outlines and is extremely effective by acquiring information. It is often the method of choice in the examples where quantitative measurement is not required.


Social engineering attacks are increasingly common for organizations and users. Social engineering attacks can be used for espionage or economic crimes and other crimes as well where the users have knowledge that can be used in a ...
Related Ads