Social Engineering: A Psychological Hacking to Temper Medical Security View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2013

AUTHORS

L. N. Pandey , Mukta Bhatele , Vivek Badhe

ABSTRACT

There are several techniques available to a hacker for infringe the information from persons using social networks. The human approach often called “Social Engineering” and is almost the most difficult one to handle. The hackers of today are using a hybrid approach combining social networking techniques and hacking methodologies to gain unauthorized access to computer systems. In general, the user is easy to fool—and that is why so many people get infected. Even if user knows about security, and knows that he have to be careful on the internet, no one is safe when something is really targeted at you. This paper describes some common Social Engineering techniques and their impact on the Medical Security. This paper describes the ways to protect the images or data from being tempered. It also discusses innovative ways for us to construct and utilizes scenarios for social engineering tests, and provides key strategies for successfully defeating these attacks. More... »

PAGES

239-245

Book

TITLE

Proceedings of All India Seminar on Biomedical Engineering 2012 (AISOBE 2012)

ISBN

978-81-322-0969-0
978-81-322-0970-6

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-81-322-0970-6_27

DOI

http://dx.doi.org/10.1007/978-81-322-0970-6_27

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1052836012


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0806", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information Systems", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "name": [
            "Computer Technology and Application, Gyan Ganga College of Technology, Jabalpur, India"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Pandey", 
        "givenName": "L. N.", 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "name": [
            "Department of Computer Science, Gyan Ganga College of Technology, Jabalpur, India"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Bhatele", 
        "givenName": "Mukta", 
        "id": "sg:person.011007062501.09", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011007062501.09"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "name": [
            "Department of Computer Science, Gyan Ganga College of Technology, Jabalpur, India"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Badhe", 
        "givenName": "Vivek", 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "https://doi.org/10.1016/s1353-4858(01)00716-4", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1007413582"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1016/j.istr.2011.09.008", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1050607321"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2013", 
    "datePublishedReg": "2013-01-01", 
    "description": "There are several techniques available to a hacker for infringe the information from persons using social networks. The human approach often called \u201cSocial Engineering\u201d and is almost the most difficult one to handle. The hackers of today are using a hybrid approach combining social networking techniques and hacking methodologies to gain unauthorized access to computer systems. In general, the user is easy to fool\u2014and that is why so many people get infected. Even if user knows about security, and knows that he have to be careful on the internet, no one is safe when something is really targeted at you. This paper describes some common Social Engineering techniques and their impact on the Medical Security. This paper describes the ways to protect the images or data from being tempered. It also discusses innovative ways for us to construct and utilizes scenarios for social engineering tests, and provides key strategies for successfully defeating these attacks.", 
    "editor": [
      {
        "familyName": "Kumar", 
        "givenName": "Veerendra", 
        "type": "Person"
      }, 
      {
        "familyName": "Bhatele", 
        "givenName": "Mukta", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-81-322-0970-6_27", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-81-322-0969-0", 
        "978-81-322-0970-6"
      ], 
      "name": "Proceedings of All India Seminar on Biomedical Engineering 2012 (AISOBE 2012)", 
      "type": "Book"
    }, 
    "name": "Social Engineering: A Psychological Hacking to Temper Medical Security", 
    "pagination": "239-245", 
    "productId": [
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-81-322-0970-6_27"
        ]
      }, 
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "fbac56f905b80555264d6e625e5203a6fb9a9385ba3fb140ec9e6a95b909ae76"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1052836012"
        ]
      }
    ], 
    "publisher": {
      "location": "India", 
      "name": "Springer India", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-81-322-0970-6_27", 
      "https://app.dimensions.ai/details/publication/pub.1052836012"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2019-04-15T19:56", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8687_00000091.jsonl", 
    "type": "Chapter", 
    "url": "http://link.springer.com/10.1007/978-81-322-0970-6_27"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-81-322-0970-6_27'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-81-322-0970-6_27'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-81-322-0970-6_27'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-81-322-0970-6_27'


 

This table displays all metadata directly associated to this object as RDF triples.

91 TRIPLES      23 PREDICATES      29 URIs      20 LITERALS      8 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-81-322-0970-6_27 schema:about anzsrc-for:08
2 anzsrc-for:0806
3 schema:author N0365fb156cfa4a679852a94ce4cf290f
4 schema:citation https://doi.org/10.1016/j.istr.2011.09.008
5 https://doi.org/10.1016/s1353-4858(01)00716-4
6 schema:datePublished 2013
7 schema:datePublishedReg 2013-01-01
8 schema:description There are several techniques available to a hacker for infringe the information from persons using social networks. The human approach often called “Social Engineering” and is almost the most difficult one to handle. The hackers of today are using a hybrid approach combining social networking techniques and hacking methodologies to gain unauthorized access to computer systems. In general, the user is easy to fool—and that is why so many people get infected. Even if user knows about security, and knows that he have to be careful on the internet, no one is safe when something is really targeted at you. This paper describes some common Social Engineering techniques and their impact on the Medical Security. This paper describes the ways to protect the images or data from being tempered. It also discusses innovative ways for us to construct and utilizes scenarios for social engineering tests, and provides key strategies for successfully defeating these attacks.
9 schema:editor Na549325a454e4f7488b8741cba2469ee
10 schema:genre chapter
11 schema:inLanguage en
12 schema:isAccessibleForFree false
13 schema:isPartOf N28b288b43b504cd19980dd85768bcb24
14 schema:name Social Engineering: A Psychological Hacking to Temper Medical Security
15 schema:pagination 239-245
16 schema:productId N3f329a8a77484684942b087eac8995ef
17 N5e6074175d5443b7b015dfaffc508155
18 Nf3f5bee7f4ff44baa30ed582b7b8b04b
19 schema:publisher N0f87c9a703a344349a73b2436f02fc15
20 schema:sameAs https://app.dimensions.ai/details/publication/pub.1052836012
21 https://doi.org/10.1007/978-81-322-0970-6_27
22 schema:sdDatePublished 2019-04-15T19:56
23 schema:sdLicense https://scigraph.springernature.com/explorer/license/
24 schema:sdPublisher Nf3d47b9bf5644d72880c9bee2f004b3d
25 schema:url http://link.springer.com/10.1007/978-81-322-0970-6_27
26 sgo:license sg:explorer/license/
27 sgo:sdDataset chapters
28 rdf:type schema:Chapter
29 N02bbdeab69154ab98cd5d00cf0aa2f30 rdf:first sg:person.011007062501.09
30 rdf:rest Naa2e1ada03ab4397bac22bb390481139
31 N0365fb156cfa4a679852a94ce4cf290f rdf:first N4101fba7f8094a65939ed96dc412061f
32 rdf:rest N02bbdeab69154ab98cd5d00cf0aa2f30
33 N0f87c9a703a344349a73b2436f02fc15 schema:location India
34 schema:name Springer India
35 rdf:type schema:Organisation
36 N15f76562bf4a4bf88f9083614350a80e schema:name Department of Computer Science, Gyan Ganga College of Technology, Jabalpur, India
37 rdf:type schema:Organization
38 N20692677229c4bc3a9d779955145d73c rdf:first Nad82f505438940d8b6a4e504623ca647
39 rdf:rest rdf:nil
40 N28b288b43b504cd19980dd85768bcb24 schema:isbn 978-81-322-0969-0
41 978-81-322-0970-6
42 schema:name Proceedings of All India Seminar on Biomedical Engineering 2012 (AISOBE 2012)
43 rdf:type schema:Book
44 N3c7e7ccb9eee4e8eb42ab365cfcd0bb6 schema:name Department of Computer Science, Gyan Ganga College of Technology, Jabalpur, India
45 rdf:type schema:Organization
46 N3f329a8a77484684942b087eac8995ef schema:name readcube_id
47 schema:value fbac56f905b80555264d6e625e5203a6fb9a9385ba3fb140ec9e6a95b909ae76
48 rdf:type schema:PropertyValue
49 N4101fba7f8094a65939ed96dc412061f schema:affiliation N54c05e21dcfd4a628fb7a6413bb10d7b
50 schema:familyName Pandey
51 schema:givenName L. N.
52 rdf:type schema:Person
53 N54c05e21dcfd4a628fb7a6413bb10d7b schema:name Computer Technology and Application, Gyan Ganga College of Technology, Jabalpur, India
54 rdf:type schema:Organization
55 N5e6074175d5443b7b015dfaffc508155 schema:name dimensions_id
56 schema:value pub.1052836012
57 rdf:type schema:PropertyValue
58 Na549325a454e4f7488b8741cba2469ee rdf:first Ndca87fd923e94b3cb4140afb0a9ca98a
59 rdf:rest N20692677229c4bc3a9d779955145d73c
60 Naa2e1ada03ab4397bac22bb390481139 rdf:first Nc1fee45de1df4684bcc0cf03000d25ef
61 rdf:rest rdf:nil
62 Nad82f505438940d8b6a4e504623ca647 schema:familyName Bhatele
63 schema:givenName Mukta
64 rdf:type schema:Person
65 Nc1fee45de1df4684bcc0cf03000d25ef schema:affiliation N15f76562bf4a4bf88f9083614350a80e
66 schema:familyName Badhe
67 schema:givenName Vivek
68 rdf:type schema:Person
69 Ndca87fd923e94b3cb4140afb0a9ca98a schema:familyName Kumar
70 schema:givenName Veerendra
71 rdf:type schema:Person
72 Nf3d47b9bf5644d72880c9bee2f004b3d schema:name Springer Nature - SN SciGraph project
73 rdf:type schema:Organization
74 Nf3f5bee7f4ff44baa30ed582b7b8b04b schema:name doi
75 schema:value 10.1007/978-81-322-0970-6_27
76 rdf:type schema:PropertyValue
77 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
78 schema:name Information and Computing Sciences
79 rdf:type schema:DefinedTerm
80 anzsrc-for:0806 schema:inDefinedTermSet anzsrc-for:
81 schema:name Information Systems
82 rdf:type schema:DefinedTerm
83 sg:person.011007062501.09 schema:affiliation N3c7e7ccb9eee4e8eb42ab365cfcd0bb6
84 schema:familyName Bhatele
85 schema:givenName Mukta
86 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011007062501.09
87 rdf:type schema:Person
88 https://doi.org/10.1016/j.istr.2011.09.008 schema:sameAs https://app.dimensions.ai/details/publication/pub.1050607321
89 rdf:type schema:CreativeWork
90 https://doi.org/10.1016/s1353-4858(01)00716-4 schema:sameAs https://app.dimensions.ai/details/publication/pub.1007413582
91 rdf:type schema:CreativeWork
 




Preview window. Press ESC to close (or click here)


...