论文部分内容阅读
This article surveys the literature on social engineering. There are lots of security application and hardware in market;still there are several methods that can be used to breach the information security defenses of an organization or individual. Social