Preview

Social Engineering

Good Essays
Open Document
Open Document
1041 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Social Engineering
Social Engineering
This research paper is primarily based on information gathered from secondary sources explaining what the term “social engineering” is, how it is perpetrated, and the impact it has on individuals and corporations. It will also discuss ethical issues and action that can be taken by both individuals and corporations respectively to mitigate and minimize the risk of social engineering attacks.
Social engineering, in the context of information technology, is defined as “gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others” (Gary B. Shelly, 2010). The methods adopted are similar to those used by con artist where individuals are tricked into divulging confidential information. Social engineers mislead their victims into providing confidential and critical information that can enable them to perpetrate fraud. Social security numbers, user names, passwords, credit card details, bank account numbers and organizational charts are prime examples of target information that is used by fraudsters to commit a crime or in some case sell the information to other criminals.
Individuals using social engineering techniques, or social engineers as they are commonly called, are essentially hackers. The only distinction is hackers use technical methods like installing spyware on targets computers or networks to secure information, whereas the social engineers uses a combination of technical, social and psychological skills to carry out their attacks.
The article Social Engineering Foundamentals: Hackers Tactics (Granger, 2001) shows that attacks can be carried out in both physical and psychological forms and can involve physical intrusion into the work place, over the phone and collection of trash (a.k.a Dumpster diving). Items found such as documents and outdated or broken hardware components may contain crucial information which can be use to carried out



References: Cisco. (2011). http://www.cisco.com/web/about/security/intelligence/mysdn-social-engineering.html. Retrieved April 18, 2011, from www.Cisco.com. Gary B. Shelly, M. E. (2010). Discovering Computers 2010: Living in a Digital World Complete. Boston: Course Technology: Cengage Learning. Granger, S. (2001, december 18). Social Engineering Foundamentals. Retrieved April 18, 2011, from http://www.symantec.com: http://www.symantec.com/connect/articles/social-engineering-fundamentals-part-i-hacker-tactics Raymond, A. (2009, October). An effective incidence response process. SCmagazine. Retrieved April 20, 2011, from http://www.scmagazineus.com. -------------------------------------------- [ 1 ]. This article, obtained from the Symantec corporation website narrates a true story of typical attacked carried out by security consulting firm using social engineering methods. [ 2 ]. Federal Trade Commission: is a governmental body with primary responsibility to protect consumer rights. http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html [ 3 ]. The Ponemon Institute is an IT security solutions provider that is now part of the Symantec group a leading IT security company; the manufacturer of Norton Antivirus program.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    How can social engineering be used to gather information or data about the organizations’ IT Infrastructure?…

    • 283 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    FXT2 Task2

    • 825 Words
    • 4 Pages

    References: Peltier, T. (n.d.). Social Engineering: Concepts and Solutions. Retrieved January 27, 2014, from http://www.infosectoday.com/Norwich/GI532/Social_Engineering.htm…

    • 825 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Is404 Final Study Guide

    • 840 Words
    • 4 Pages

    7.p24 Social engineering is the single most common strategy attackers use and it’s also the most effective…

    • 840 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    b. Social engineering is used on most people. Reverse social engineering is used on people with specialized law enforcement training.…

    • 312 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit 1 Assignment Q A

    • 592 Words
    • 2 Pages

    Social Engineering is one of the number one ways a network is easily infiltrated. They major forms of this are Phishing, baiting and diversion theft.…

    • 592 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Computer Hacking in 1960’s up to 1970’s – an individual working with computers who were technically gifted and skilled it was defined by computer ethicist Duncan Langford (1995).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Sharick, P. (2002). Techniques for Establishing Highly Secure Systems, Windows IT Security, June 2002 Edition.…

    • 1974 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Once you have enough information to understand how the target works and what information of value might be available, you begin the process of scanning perimeter and internal network devices looking for weaknesses, including…

    • 284 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Abraham Lincoln was born in early 1809. During Abraham’s childhood he was forced to work on farms, and had under a year of schooling, so he taught himself to read and write. He moved away from his family when he was 21 years old. He was a self-taught attorney that got his law degree at the age of 23.…

    • 940 Words
    • 4 Pages
    Good Essays
  • Good Essays

    spanglish

    • 789 Words
    • 4 Pages

    [ Artists shouldn't be afraid to hurt their characters, and Brooks certainly puts his list of candidates on the line, including Deb's hysterical mother, Evelyn (Cloris Leachman in a role initially awarded to Anne Bancroft), and several children such as Bernie, Georgie (the Claskys' son), and Cristina, Flor's daughter. No one is safe from heartache. But, all are given the power to find peace. Flor (Vega) and her daughter Cristina, played by Victoria Luna Flor (Vega) and her daughter Cristina, played by Victoria Luna Spanglish really deals with affairs of the heart. One character gets involved in an all-out physical affair, and two other characters look to each other as soul mates and share several passionate-but-tense moments leading up to a very intimate evening. While these two characters physically share little more than a kiss, they have dangerously invested far too much emotionally and psychologically. Brooks' characters have great depth and awareness. Unfortunately, many of them are looking for fulfillment in empty places?lovers' arms, food, property, or other material possessions. Alas, Brooks leaves the final details to his viewers, who become part of the Clasky family for two hours as the director exposes the highs and lows of humanity. The audience has to figure out what happens behind the beautiful walls of the Claskys' LA mansion. From the beginning of the…

    • 789 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    According to, “Social Engineering for Security Attacks”, social engineering is a kind of advanced persistent threat that gains private and sensitive information through social networks or other types of communication (Nelson, 2016). The goal of social engineering is to stay inside of a social media account while undetected for a long period to steal private data (Nelson, 2016). Some targets of social engineering are government agencies, corporations, schools or high- profile users (Nelson, 2016). This type of threat has become increansingly popular in recent years as well as other threats to cybersecurity. Attackers are becoming more sophisticated and persistent, and are focusing on small attacks and high profile organizations.…

    • 109 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    It Infrastructure

    • 342 Words
    • 2 Pages

    The User Domain is comprised of individuals that are often not aware of the tricks of attackers. For example, networks usually have strong passwords that one must know in order to gain access to the Internet. Nevertheless, social engineers can persuade individuals to give out personal information such as passwords and other types of private information. By giving out such information can cause computer viruses and infections executed by social engineers. Another way in which the User Domain can fall susceptible to attackers is the activities carried out by individuals on the computer. Visiting dangerous websites, downloading malicious files, and installing infected programs all give invitations to attackers to hack computer systems. In addition, inserting infected jump drives into computers can cause an entire computer network to become infected.…

    • 342 Words
    • 2 Pages
    Good Essays
  • Best Essays

    McClure, S., Scambray, J., & Kurtz, G. (2009). Hacking exposed 6: Network security secrets & solutions. New York: McGraw-Hill.…

    • 4737 Words
    • 19 Pages
    Best Essays
  • Better Essays

    References: Bidgoli, H. (2006). Handbook of Information Security, Information Warfare, Social, Legal, and International Issues and Security Foundations. John Wiley & Sons, 1008 pp. ISBN: 0470051205, 9780470051207…

    • 1068 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Organized Crime

    • 375 Words
    • 2 Pages

    One new trend in organized crime is cybercrime. The key to it is social engineering. Hackers can easily persuade someone now a days to do things on their computer that is not in their best interest and the internet is assisting them.…

    • 375 Words
    • 2 Pages
    Satisfactory Essays