Social Engineering: A Psychological Hacking to Temper Medical Security View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2013

AUTHORS

L. N. Pandey , Mukta Bhatele , Vivek Badhe

ABSTRACT

There are several techniques available to a hacker for infringe the information from persons using social networks. The human approach often called “Social Engineering” and is almost the most difficult one to handle. The hackers of today are using a hybrid approach combining social networking techniques and hacking methodologies to gain unauthorized access to computer systems. In general, the user is easy to fool—and that is why so many people get infected. Even if user knows about security, and knows that he have to be careful on the internet, no one is safe when something is really targeted at you. This paper describes some common Social Engineering techniques and their impact on the Medical Security. This paper describes the ways to protect the images or data from being tempered. It also discusses innovative ways for us to construct and utilizes scenarios for social engineering tests, and provides key strategies for successfully defeating these attacks. More... »

PAGES

239-245

Book

TITLE

Proceedings of All India Seminar on Biomedical Engineering 2012 (AISOBE 2012)

ISBN

978-81-322-0969-0
978-81-322-0970-6

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-81-322-0970-6_27

DOI

http://dx.doi.org/10.1007/978-81-322-0970-6_27

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1052836012


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0806", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information Systems", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "name": [
            "Computer Technology and Application, Gyan Ganga College of Technology, Jabalpur, India"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Pandey", 
        "givenName": "L. N.", 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "name": [
            "Department of Computer Science, Gyan Ganga College of Technology, Jabalpur, India"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Bhatele", 
        "givenName": "Mukta", 
        "id": "sg:person.011007062501.09", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011007062501.09"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "name": [
            "Department of Computer Science, Gyan Ganga College of Technology, Jabalpur, India"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Badhe", 
        "givenName": "Vivek", 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "https://doi.org/10.1016/s1353-4858(01)00716-4", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1007413582"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1016/j.istr.2011.09.008", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1050607321"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2013", 
    "datePublishedReg": "2013-01-01", 
    "description": "There are several techniques available to a hacker for infringe the information from persons using social networks. The human approach often called \u201cSocial Engineering\u201d and is almost the most difficult one to handle. The hackers of today are using a hybrid approach combining social networking techniques and hacking methodologies to gain unauthorized access to computer systems. In general, the user is easy to fool\u2014and that is why so many people get infected. Even if user knows about security, and knows that he have to be careful on the internet, no one is safe when something is really targeted at you. This paper describes some common Social Engineering techniques and their impact on the Medical Security. This paper describes the ways to protect the images or data from being tempered. It also discusses innovative ways for us to construct and utilizes scenarios for social engineering tests, and provides key strategies for successfully defeating these attacks.", 
    "editor": [
      {
        "familyName": "Kumar", 
        "givenName": "Veerendra", 
        "type": "Person"
      }, 
      {
        "familyName": "Bhatele", 
        "givenName": "Mukta", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-81-322-0970-6_27", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-81-322-0969-0", 
        "978-81-322-0970-6"
      ], 
      "name": "Proceedings of All India Seminar on Biomedical Engineering 2012 (AISOBE 2012)", 
      "type": "Book"
    }, 
    "name": "Social Engineering: A Psychological Hacking to Temper Medical Security", 
    "pagination": "239-245", 
    "productId": [
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-81-322-0970-6_27"
        ]
      }, 
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "fbac56f905b80555264d6e625e5203a6fb9a9385ba3fb140ec9e6a95b909ae76"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1052836012"
        ]
      }
    ], 
    "publisher": {
      "location": "India", 
      "name": "Springer India", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-81-322-0970-6_27", 
      "https://app.dimensions.ai/details/publication/pub.1052836012"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2019-04-15T19:56", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8687_00000091.jsonl", 
    "type": "Chapter", 
    "url": "http://link.springer.com/10.1007/978-81-322-0970-6_27"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-81-322-0970-6_27'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-81-322-0970-6_27'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-81-322-0970-6_27'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-81-322-0970-6_27'


 

This table displays all metadata directly associated to this object as RDF triples.

91 TRIPLES      23 PREDICATES      29 URIs      20 LITERALS      8 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-81-322-0970-6_27 schema:about anzsrc-for:08
2 anzsrc-for:0806
3 schema:author N290e84c203b843d186640b67198ef5af
4 schema:citation https://doi.org/10.1016/j.istr.2011.09.008
5 https://doi.org/10.1016/s1353-4858(01)00716-4
6 schema:datePublished 2013
7 schema:datePublishedReg 2013-01-01
8 schema:description There are several techniques available to a hacker for infringe the information from persons using social networks. The human approach often called “Social Engineering” and is almost the most difficult one to handle. The hackers of today are using a hybrid approach combining social networking techniques and hacking methodologies to gain unauthorized access to computer systems. In general, the user is easy to fool—and that is why so many people get infected. Even if user knows about security, and knows that he have to be careful on the internet, no one is safe when something is really targeted at you. This paper describes some common Social Engineering techniques and their impact on the Medical Security. This paper describes the ways to protect the images or data from being tempered. It also discusses innovative ways for us to construct and utilizes scenarios for social engineering tests, and provides key strategies for successfully defeating these attacks.
9 schema:editor N678a951ef86144f9aa31e057bb1a86dc
10 schema:genre chapter
11 schema:inLanguage en
12 schema:isAccessibleForFree false
13 schema:isPartOf N2988b628e7b8456aa00744a6e7fcfc66
14 schema:name Social Engineering: A Psychological Hacking to Temper Medical Security
15 schema:pagination 239-245
16 schema:productId N2184ea4aacc84d86bf0ee1b2657eee80
17 N7a087049c13740e48994562b89a91432
18 Nafe7ef535e02421a92f3e47ef77a74ee
19 schema:publisher N740cf9cfe1b54fc6b0f799d7e895749d
20 schema:sameAs https://app.dimensions.ai/details/publication/pub.1052836012
21 https://doi.org/10.1007/978-81-322-0970-6_27
22 schema:sdDatePublished 2019-04-15T19:56
23 schema:sdLicense https://scigraph.springernature.com/explorer/license/
24 schema:sdPublisher N68bc6ca86d9148d6addc6bf4a3886401
25 schema:url http://link.springer.com/10.1007/978-81-322-0970-6_27
26 sgo:license sg:explorer/license/
27 sgo:sdDataset chapters
28 rdf:type schema:Chapter
29 N0968b06dfb8444bb996873ef10650361 rdf:first N5b2712fdab7e4f859c5c4fecd3cf1014
30 rdf:rest rdf:nil
31 N166b5492e4224ad98a64a5b1350b20bc schema:affiliation N1f10e95916ea4707a4f4981be63ee108
32 schema:familyName Badhe
33 schema:givenName Vivek
34 rdf:type schema:Person
35 N1f10e95916ea4707a4f4981be63ee108 schema:name Department of Computer Science, Gyan Ganga College of Technology, Jabalpur, India
36 rdf:type schema:Organization
37 N2184ea4aacc84d86bf0ee1b2657eee80 schema:name doi
38 schema:value 10.1007/978-81-322-0970-6_27
39 rdf:type schema:PropertyValue
40 N290e84c203b843d186640b67198ef5af rdf:first Nab47391dd9044352a086a6865267e9f1
41 rdf:rest N410a10ce033f46bfa53690a7ba384124
42 N2988b628e7b8456aa00744a6e7fcfc66 schema:isbn 978-81-322-0969-0
43 978-81-322-0970-6
44 schema:name Proceedings of All India Seminar on Biomedical Engineering 2012 (AISOBE 2012)
45 rdf:type schema:Book
46 N410a10ce033f46bfa53690a7ba384124 rdf:first sg:person.011007062501.09
47 rdf:rest N6c86f7520bce4d2d9fcf221e4e97243f
48 N5b2712fdab7e4f859c5c4fecd3cf1014 schema:familyName Bhatele
49 schema:givenName Mukta
50 rdf:type schema:Person
51 N678a951ef86144f9aa31e057bb1a86dc rdf:first Nc647f30ea8204b988f73a263b5ead3f0
52 rdf:rest N0968b06dfb8444bb996873ef10650361
53 N68bc6ca86d9148d6addc6bf4a3886401 schema:name Springer Nature - SN SciGraph project
54 rdf:type schema:Organization
55 N6c86f7520bce4d2d9fcf221e4e97243f rdf:first N166b5492e4224ad98a64a5b1350b20bc
56 rdf:rest rdf:nil
57 N740cf9cfe1b54fc6b0f799d7e895749d schema:location India
58 schema:name Springer India
59 rdf:type schema:Organisation
60 N7a087049c13740e48994562b89a91432 schema:name dimensions_id
61 schema:value pub.1052836012
62 rdf:type schema:PropertyValue
63 N85071a406ec040549a3884404301ba4a schema:name Computer Technology and Application, Gyan Ganga College of Technology, Jabalpur, India
64 rdf:type schema:Organization
65 Nab47391dd9044352a086a6865267e9f1 schema:affiliation N85071a406ec040549a3884404301ba4a
66 schema:familyName Pandey
67 schema:givenName L. N.
68 rdf:type schema:Person
69 Nafe7ef535e02421a92f3e47ef77a74ee schema:name readcube_id
70 schema:value fbac56f905b80555264d6e625e5203a6fb9a9385ba3fb140ec9e6a95b909ae76
71 rdf:type schema:PropertyValue
72 Nc647f30ea8204b988f73a263b5ead3f0 schema:familyName Kumar
73 schema:givenName Veerendra
74 rdf:type schema:Person
75 Nf7014bf0529f4ad8a10b3f1caa4e36b2 schema:name Department of Computer Science, Gyan Ganga College of Technology, Jabalpur, India
76 rdf:type schema:Organization
77 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
78 schema:name Information and Computing Sciences
79 rdf:type schema:DefinedTerm
80 anzsrc-for:0806 schema:inDefinedTermSet anzsrc-for:
81 schema:name Information Systems
82 rdf:type schema:DefinedTerm
83 sg:person.011007062501.09 schema:affiliation Nf7014bf0529f4ad8a10b3f1caa4e36b2
84 schema:familyName Bhatele
85 schema:givenName Mukta
86 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011007062501.09
87 rdf:type schema:Person
88 https://doi.org/10.1016/j.istr.2011.09.008 schema:sameAs https://app.dimensions.ai/details/publication/pub.1050607321
89 rdf:type schema:CreativeWork
90 https://doi.org/10.1016/s1353-4858(01)00716-4 schema:sameAs https://app.dimensions.ai/details/publication/pub.1007413582
91 rdf:type schema:CreativeWork
 




Preview window. Press ESC to close (or click here)


...