Reference Hub1
Social Engineering and Data Privacy

Social Engineering and Data Privacy

Mumtaz Hussain, Samrina Siddiqui, Noman Islam
ISBN13: 9781668465813|ISBN10: 1668465817|ISBN13 Softcover: 9781668465820|EISBN13: 9781668465837
DOI: 10.4018/978-1-6684-6581-3.ch010
Cite Chapter Cite Chapter

MLA

Hussain, Mumtaz, et al. "Social Engineering and Data Privacy." Fraud Prevention, Confidentiality, and Data Security for Modern Businesses, edited by Arshi Naim, et al., IGI Global, 2023, pp. 225-248. https://doi.org/10.4018/978-1-6684-6581-3.ch010

APA

Hussain, M., Siddiqui, S., & Islam, N. (2023). Social Engineering and Data Privacy. In A. Naim, P. Malik, & F. Zaidi (Eds.), Fraud Prevention, Confidentiality, and Data Security for Modern Businesses (pp. 225-248). IGI Global. https://doi.org/10.4018/978-1-6684-6581-3.ch010

Chicago

Hussain, Mumtaz, Samrina Siddiqui, and Noman Islam. "Social Engineering and Data Privacy." In Fraud Prevention, Confidentiality, and Data Security for Modern Businesses, edited by Arshi Naim, Praveen Kumar Malik, and Firasat Ali Zaidi, 225-248. Hershey, PA: IGI Global, 2023. https://doi.org/10.4018/978-1-6684-6581-3.ch010

Export Reference

Mendeley
Favorite

Abstract

This paper presents the concept of social engineering. The internet has completely changed the mode of operations of modern-day systems. There are billions of internet users and this number is rising every day. Hence, ensuring the security is very important for any cyber physical systems. This paper focuses on one of the very important aspects of cyber security, i.e., social engineering. It is defined as a set of techniques of human manipulation by exploitation of the basic emotions of human beings. Different institutions deploy state-of-the-art systems to protect the data housed in their datacenter. However, it is also essential that an individual must secure their personal information from the social engineers. Hence, this paper discusses the data privacy issues and various relevant techniques under the umbrella of social engineering. It discusses various social engineering techniques and summarizes those techniques, thus concluding the paper.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.