There are many approaches that malicious individuals or hackers apply in the attempt to violate the information security protection of a corporation or an institution. Social engineering also termed as the human method is one of them. Social engineering is explicated as the art of using human characters to breach information security without the victim or participant knowledge that they have been manipulated. A huge number of staffs, faculties, and students make use of computer devices to store, manage and share a broad range of data and information. A personal computer contains information that is confidential and distinct personal information; then, it is of great essence to comprehend information security in order to protect information ...