Preview

Business Memo

Satisfactory Essays
Open Document
Open Document
675 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Business Memo
Business Memo: Social Engineering Threats
Ray Ruiz
BSA/310
April 17, 2013
Fred Bennett

Business Memo: Social Engineering Threats
With the advancement of technology in the work place, the opportunity for malicious users to infiltrate and corrupt your business increases. Knowing what types of methods these individuals are using will help you in developing preventative measures. Keeping employees informed of the ways to recognize and respond to social engineering techniques are important to an organizations overall information security program. The two types of social engineering threats business face are local and remote social engineering.
Being able to recognize when someone is attempting to use a social engineering technique is critical. Far too many employees are unaware of the consequences that can follow by clicking an unknown link on an email as well as responding to random text messages via SMS. It is important for upper-level management and executives to provide training to employees to make them aware of possible social engineering attacks. Ensuring that employees understand what privileges they have on company information systems and the various methods attackers use can help mitigate future social engineering success.
Social engineering is a method of tricking users into divulging confidential information. One of the forms of social engineering is local engineering. More specifically, dumpster diving is a local social engineering method that requires the attacker to search through the organizations trash hoping to collect useful inside information. Some of the items that can be recovered by the malicious user are hard copies of documents, invoices, or a discarded computer device such as USB drives. One tactic for mitigating this threat is ensuring documents and data are properly destroyed before discarding. For example, using a paper shredder to destroy hard copies of documents before throwing them in the trash. Also, wiping hard drives clean



References: Skill Port. (2013). Control Fundamentals and Security Threats [Multimedia]. Retrieved from Skill Port, BSA/210 website.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    How can social engineering be used to gather information or data about the organizations’ IT Infrastructure?…

    • 283 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    INF 325 Week 1: A Case Study

    • 2472 Words
    • 10 Pages

    Internet and network security are a primary concern for many businesses. In today 's world, the number of hacks and leaks of data is continuing to rise, which is what makes security the primary concern. What may or may not be apparent is that many breaches of data tend to be caused by internal users ' errors that may not even have been meant to be malicious. Liaskos and Sandy quote a study by Roman which revealed…

    • 2472 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Is404 Final Study Guide

    • 840 Words
    • 4 Pages

    7.p24 Social engineering is the single most common strategy attackers use and it’s also the most effective…

    • 840 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    IS3445 Unit 4 Lab

    • 556 Words
    • 2 Pages

    Criminals often use social engineering along with vulnerabilities in applications such as web browsers or email clients to trick users into installing malicious code on their computer.…

    • 556 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Lab 1

    • 567 Words
    • 3 Pages

    Social engineering is being used to by tricking people into giving out information that is not normally publicly available.…

    • 567 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    IS3110 Quiz 6 2015

    • 600 Words
    • 2 Pages

    2. Using the USER domain, define risks associated with users and explain what can be done to mitigate them. Are related to social engineering. Users can be conned and tricked. A social engineer tries to trick a user into giving up information or performing an unsafe action. You can try to minimize these risks by raising user awareness. Implement acceptable use policies (AUPs) to ensure users know what they should and should not be doing. Use logon banners to remind users of the AUP. Send out occasional e-mails with security tidbits to keep security in their minds. Use posters in employee areas.…

    • 600 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Sharick, P. (2002). Techniques for Establishing Highly Secure Systems, Windows IT Security, June 2002 Edition.…

    • 1974 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Week 5 Quiz

    • 531 Words
    • 3 Pages

    Spamming coworkers Accessing prohibited websites Purposely circumventing security policies Sending files with sensitive data outside the organization.…

    • 531 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Web page and search engines are very helpful and can provide a lot of information at an employee’s fingertips, however if these programs are not monitored they can be abused by personal use of employees. Managers and other department supervisors should monitor the use of email, instant messaging, web pages, and search engines because it is important to…

    • 346 Words
    • 2 Pages
    Good Essays
  • Good Essays

    SkillPort Security

    • 647 Words
    • 3 Pages

    Well trained employees play a huge factor in protecting the network. Many viruses and malware can be prevented just by paying attention and having a trained eye. It is important that employees can recognize and respond to social engineering techniques. Social engineering is a method that attackers use to gain information to make their attack successful. In other words, it is a method of gaining confidential information. Social engineering has been around for a very long time and it is the most basic way to bypass an organizations security.…

    • 647 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Computer Memory Hacking

    • 820 Words
    • 2 Pages

    of reasons that one might participate in hacking the memory of a computer system. One reason…

    • 820 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Business Letter

    • 338 Words
    • 1 Page

    Business letters may include requests, inquiries, sales information, invitations, an introduction to a report, recommendations, and more. They will normally include a distinct letterhead and can often include tables or graphics to illustration the topic. They might also use a template as the basis of the letter.…

    • 338 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Business Letter

    • 270 Words
    • 2 Pages

    Although having unhealthy food is quite valuable for many students, we should propose something that would benefit the school and the students. I recommend we start replacing unhealthy food like chips and soda pop with more nourishing food like yogurt or fruit juice. This would not only help having healthier food but also persuade students to eat healthy. Another way we can start the process of healthy food is through using the power of posters in which we can advertise about all the advantages of keeping a healthy yet effective food diet. If us grade nine students start eating healthier this would make us great role models for the younger students who would also want to eat food high in nutrients. By applying these methods the grade nine students will still be able to attend there adventure camp in spring every year and also exercise the benefits of eating much healthier.…

    • 270 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It Infrastructure

    • 342 Words
    • 2 Pages

    The User Domain is comprised of individuals that are often not aware of the tricks of attackers. For example, networks usually have strong passwords that one must know in order to gain access to the Internet. Nevertheless, social engineers can persuade individuals to give out personal information such as passwords and other types of private information. By giving out such information can cause computer viruses and infections executed by social engineers. Another way in which the User Domain can fall susceptible to attackers is the activities carried out by individuals on the computer. Visiting dangerous websites, downloading malicious files, and installing infected programs all give invitations to attackers to hack computer systems. In addition, inserting infected jump drives into computers can cause an entire computer network to become infected.…

    • 342 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Organized Crime

    • 375 Words
    • 2 Pages

    One new trend in organized crime is cybercrime. The key to it is social engineering. Hackers can easily persuade someone now a days to do things on their computer that is not in their best interest and the internet is assisting them.…

    • 375 Words
    • 2 Pages
    Satisfactory Essays

Related Topics