Saturday, May 16, 2020
The Social Of Social Engineering Essay - 1304 Words
INRTODUCTION The media is full of stories of hacking doing untold damage estimated in the millions of dollars. On the same note, identity theft is a major global problem and despite numerous efforts by governments to ensure citizens do not fall prey to fraudsters, the human condition remains the weakest link in information security hence, social engineering thrives under these circumstances. Social engineering in this context, emphasizes the apparent relationship between human social behavior and information technology and specifically. Human habits dictate and indicate the level of information security. This will be the basis of discussion of social engineering in this paper. This paper will endeavor to examine the definition of social engineering, methods of social engineering, impacts of social engineering on society and ways of mitigating the dynamic the dynamic threat of social engineering. DEFIFNITION OF SOCIAL ENGINEERING Per Meinert (2016), in an article she wrote in the ABA Banking Journal, social engineering is the successful manipulation of a victim by a fraudster into divulging private and confidential information. She adds that the fraudster poses as a trustworthy source and to stress her point, she quotes Mark Lowers, CEO of Lowers Risk Group who emphasizes that, social engineering is not only fraud by deception, but is also an exploitation of human decency (Meinert, 2016, p.49). Social engineering in relation to information technology essentially preys on theShow MoreRelatedSocial Engineering954 Words à |à 4 PagesSOCIAL ENGINEERING INTRODUCTION Social Engineering is using non-technical means to gain unauthorized access to information or system. Normally a hackers would use exploit a systems vulnerabilities and run scripts to gain access. When hackers deploy social engineering they exploit human nature. Social Engineering is represented by building trust relationships with people who work in the inside of the organization to gain access or who are privilege to sensitiveRead MoreSocial Engineering630 Words à |à 3 PagesSocial Engineering Social engineering has become the most popular method of compromising the security of personal data. The successful use of Social Engineering techniques has provided attackers and hackers the ability to breach computer systems and gain access to sensitive data. Many computer hackers have found that it is easier to trick somebody into giving his or her password than to carry out an elaborate hacking attempt. Social engineering is the art of gaining access to buildings, systemsRead MoreSocial Engineering1052 Words à |à 5 PagesSocial Engineering This research paper is primarily based on information gathered from secondary sources explaining what the term ââ¬Å"social engineeringâ⬠is, how it is perpetrated, and the impact it has on individuals and corporations. It will also discuss ethical issues and action that can be taken by both individuals and corporations respectively to mitigate and minimize the risk of social engineering attacks. Social engineering, in the context of information technology, is defined as ââ¬Å"gainingRead MoreSocial Engineering2447 Words à |à 10 PagesIdentity Theft: Social Engineering December 5, 2011 Daniel Sama amp; Stacey Smith Sr Computer Ethics CIS-324, Fall 2011 Strayer University Identity Theft: Social Engineering December 5, 2011 Daniel Sama amp; Stacey Smith Sr Computer Ethics CIS-324, Fall 2011 Strayer University Abstract Social Engineering from the outset may seem like a topic one might hear when talking about sociology or psychology, when in fact it is a form of identity theft. To an information technology (IT)Read MoreThe Impact Of Social Of Social Engineering On Business Essay1318 Words à |à 6 PagesSocial engineering has been defined as ââ¬Å"Any act that influences a person to take an action that may or may not be in their best interest.â⬠(Social Engineering, n.d.). Finding a system security vulnerability in a business can mitigate the effects of a social engineering attack. Using a personââ¬â¢s natural reaction to please people against them can be very detrimental to a business. Social engineering takes many forms and effects businesses in many ways. Businesses tend to focus their security on moreRead MoreSocial Science And Remedies For Social Engineering1569 Words à |à 7 Pagessecurity system through social engineering. First, I will define social engineering. People have been victims of social engineer throughout time. The first case of social engineering could be argued was the ââ¬Å"Trojan Horseâ⬠in ancient times in the Trojan War circa 800 B.C.E. according to Homerââ¬â¢s Iliad (www.ancient.eu) or Kublai Khanââ¬â¢s invasion of China in 1275 A.D to todayââ¬â¢s wire fraud emails. This paper will focus on social engineering and remedies for social engineering. Legend has it thatRead MoreThe Social Responsibility Of Engineering1385 Words à |à 6 PagesIn a modern society engineering activities including professional, based on scientific knowledge, social responsibility and human-dimension design and operation of technical devices plays an increasingly important role. Modern engineering professionalism involves not only the development of scientific bases of design engineering, but also awareness of the purposes, meanings and engineering problems in general, its place in the culture of the twenty first century. Of great importance is an understandingRead MoreThe Problems Of Social Engineering1343 Words à |à 6 Pageswhich social engineering can take place is to have details of the clients and then access the system of Amazon posing as clients. One of the requirements in order to have access to customer information. Amazon have not been serious in screening customers and will not be able to know if the customers are who they say they are in real life. It is hard to have an understanding of the data and information about the data and the issues that are associated with the data. Another social engineering techniqueRead MoreSocial Engineering : An Organization Essay2068 Words à |à 9 Pagesinto performing some action or disclosing confidential information to someone outside the business. Information Security terminology defines this manipulation as social engineering. While the term social engineering is a fairly new term, this type of attack is as old as the human race itself. Two of the most famous social engineering attacks are those of the story of the wooden horse of Troy from Homer s The Odyssey, and dating even further back to the start of the Bible with Adam and Eve andRead More social engineering Essay482 Words à |à 2 Pageseach year, and many more go unreported. In 1990, this crime cost over $2 billion -- and this figure does not include psychotherapy for the children involved, and for their parents.â⬠(para 2) If I were in a position to enact laws, the kind of social engineering I would implement is a one-strike law for pedophiles. All too often a pedophile or sex offender gets off with a slap on the wrist. This then gives them ample time to focus on other victims. Why as a society should we let these predators have
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.