WhatsApp at (+91-9098855509) Support
ijprems Logo
  • Home
  • About Us
    • Editor Vision
    • Editorial Board
    • Privacy Policy
    • Terms & Conditions
    • Publication Ethics
    • Peer Review Process
  • For Authors
    • Publication Process(up)
    • Submit Paper Online
    • Pay Publication Fee
    • Track Paper
    • Copyright Form
    • Paper Format
    • Topics
  • Fees
  • Indexing
  • Conference
  • Contact
  • Archieves
    • Current Issue
    • Past Issue
  • More
    • FAQs
    • Join As Reviewer
  • Submit Paper

Recent Papers

Dedicated to advancing knowledge through rigorous research and scholarly publication

  1. Home
  2. Recent Papers

Social Engineering: A Digital Hypnotization Ploy

Biraj Das Das

Download Paper

Paper Contents

Abstract

The term "hypnosis" is attempted to be captured in this document as a tactic for putting a person into a trance and eventually gaining his attention. Apart from folklore relating to "hypnosis", there are even some medical and therapeutic benefits as well, which are used by psychologists. The digital hypnosis, however, has emerged as a new concern to the society, particularly with the ever-growing emphasis on digitalization in financial and business sectors. There are various types of Attack Vectors, i.e. phishing emails, Trojans, SQL Injection, etc. But Social Engineering is one of the most widely used tactics to gain right-to-know authority from a target or a victim by a perpetrator, and subsequently, the target is being exploited. This is very analogous to "hypnosis". This can also be viewed as a demonstration of destructive obedience, which relates to an act of obeying a command from some unverified sources or unknown persons without bothering to confirm the validity, possibly as a consequence of having limited knowledge. Social engineering is merely a psychological operation. Usually, it is executed in four steps as indicated below. i. Investigation :: Identifying the target after knowing a bit of his background. ii. Hook :: Trying to increase proximity either by means of indulging into some kinds of mutually interesting topics or provocation. iii. Play :: After gaining confidence, the perpetrator tries to expand his grip and starts exploiting, which can also be treated as the Foot-in-the-door technique. iv. Exit :: After the target has been exploited, the perpetrator exits, often without issuing any alarm to the victim. Thus, the wicked mission of the perpetrator gets accomplished and the victim may well become aware about the exact happening after some time, often several days. It would be pertinent to indicate here that, in this entire operation, the perpetrator doesnt use any kind of hacking tools to gain access to the victims system. This is done completely through human-to-human interactions. The perpetrator exploits the psychological manipulation, i.e., Coercive Persuasion to have a propensity to compromise the victim's security protocols, and consequently, the exploited. :: Keywords: social engineering, digital hypnosis, psychological operation ::

Copyright

Copyright © 2023 Biraj Das. This is an open access article distributed under the Creative Commons Attribution License.

Paper Details
Paper ID: IJPREMS30900012285
ISSN: 2321-9653
Publisher: ijprems
Page Navigation
  • Abstract
  • Copyright
About IJPREMS

The International Journal of Progressive Research in Engineering, Management and Science is a peer-reviewed, open access journal that publishes original research articles in engineering, management, and applied sciences.

Quick Links
  • Home
  • About Our Journal
  • Editorial Board
  • Publication Ethics
Contact Us
  • IJPREMS - International Journal of Progressive Research in Engineering Management and Science, motinagar, ujjain, Madhya Pradesh., india
  • Chat with us on WhatsApp: +91 909-885-5509
  • Email us: editor@ijprems.com
  • Sun-Sat: 9:00 AM - 9:00 PM

© 2025 International Journal of Progressive Research in Engineering, Management and Science. All Rights Reserved.

Terms & Conditions | Privacy Policy | Publication Ethics | Peer Review Process | Contact Us