%0 Journal Article %T Case Study On Social Engineering Techniques for Persuasion %A Mosin Hasan %A Nilesh Prajapati %A Safvan Vohara %J International Journal on Applications of Graph Theory in Wireless ad hoc Networks and Sensor Networks %D 2010 %I Academy & Industry Research Collaboration Center (AIRCC) %X T There are plenty of security software in market; each claiming the best, still we daily face problem ofviruses and other malicious activities. If we know the basic working principal of such malware then wecan very easily prevent most of them even without security software. Hackers and crackers are experts inpsychology to manipulate people into giving them access or the information necessary to get access. Thispaper discusses the inner working of such attacks. Case study of Spyware is provided. In this case study,we got 100% success using social engineering techniques for deception on Linux operating system, whichis considered as the most secure operating system. Few basic principal of defend, for the individual aswell as for the organization, are discussed here, which will prevent most of such attack if followed. %K Spyware %K Malware %K Social Engineering %K Psychology. %U http://airccse.org/journal/graphhoc/papers/0610jgraph2.pdf