Preview

Impact of Social Engineering Essay Example

Powerful Essays
Open Document
Open Document
1438 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Impact of Social Engineering Essay Example
Impact of Social Engineering

Topic: The Impact of Social Engineering I. Introduction A. Definition of Social Engineering B. The goal of Social Engineering C. Reverse Social Engineering

II. Body D. Categories of Social Engineering 1. Technology based 2. Non-Technology based E. Types of Social Engineering attacks

III. Conclusion F. Defense against Social Engineering G. Impact of a Social Engineering attack

Introduction
Social engineering has become the most popular method of compromising the security of personal data. The successful use of Social Engineering techniques has provided attackers and hackers the ability to breach computer systems and gain access to sensitive data. Many computer hackers such as renowned hacker Kevin Mitnick have found that it is easier to trick somebody into giving his or her password than to carry out an elaborate hacking attempt (Mitnick and Simon, 2002).
What is social engineering?
Social engineering is the art of gaining access to buildings, systems or data by exploiting human psychology, rather than by breaking in or using technical hacking techniques (Godchild. 2011)”. Social engineering involves the use of manipulation to trick others into revealing and or providing the needed information that can be used to steal data and or gain access to secured systems. Most victims of social engineering attacks never see their attackers and they seldom realize that they have been hacked or manipulated.
The goal of social engineering
The main goal or focus of social engineering is to use human weakness to gain access to secure systems and or data. Despite the implementation of a wide range of security controls and measures into a secured system; there will always be a human linked to the system. Humans are the weakest link in all secured systems. “Securing the hardware, software, and firmware

You May Also Find These Documents Helpful

  • Good Essays

    FXT2 Task2

    • 825 Words
    • 4 Pages

    References: Peltier, T. (n.d.). Social Engineering: Concepts and Solutions. Retrieved January 27, 2014, from http://www.infosectoday.com/Norwich/GI532/Social_Engineering.htm…

    • 825 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Is404 Final Study Guide

    • 840 Words
    • 4 Pages

    7.p24 Social engineering is the single most common strategy attackers use and it’s also the most effective…

    • 840 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Unit 1 Assignment Q A

    • 592 Words
    • 2 Pages

    Social Engineering is one of the number one ways a network is easily infiltrated. They major forms of this are Phishing, baiting and diversion theft.…

    • 592 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Lab 1

    • 567 Words
    • 3 Pages

    Social engineering is being used to by tricking people into giving out information that is not normally publicly available.…

    • 567 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Consider the various amounts of social media sites and email accounts, along with the millions of passwords that are used to access these sites. Society continues to crave more social media interactions and email accounts but yet there is not a cohesive effort to secure the passwords that are used for these sites. In a recent article by SC Magazine, it reported the compromise of over two million accounts. The goal of this evaluation will be to reference numerous aspects of this security article, describe each aspect, with comments on its usefulness…

    • 605 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Hackers formulate different variations of Malware to take advantage of these areas before the Developers can patch and protect against these vulnerabilities (Wikipedia, 2013). Oracle’s Java is an example of an application that is vulnerable. Their latest patch JAVA 7 Update 11 is in place to prevent up to fifty of these vulnerabilities as it just recently experienced some of these exploits. Many users are disabling this application in a Browser setting, likening it to “Kissing a black rat, in London, during the plague.” As stated in the Inquirer (Neal,…

    • 1564 Words
    • 7 Pages
    Better Essays
  • Good Essays

    The main factor that contributed to Sarah’s attitude towards her curfew was social cognition. Partying with friends was yet a new thing to her and she had been hearing of it from her friends but had never been to it due to the restrictions put by her parents. It was her curiosity to better know and understand her society and to see the things that she had heard of which actually made her break the curfew and go to the party. Moreover, there is also an underlying optimistic bias that influenced her decision to do so where she believes that things will turn out to be well overall. So, it is her social cognition that she still does not know very well of her society and that there is more to see and know for which she takes the decision. The fear to miss the things also made her go to the party and disregard the curfew.…

    • 872 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Once you have enough information to understand how the target works and what information of value might be available, you begin the process of scanning perimeter and internal network devices looking for weaknesses, including…

    • 284 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    There are essentially two ways spelled out in the Constitution for how to propose an amendment. The first method is for a bill to pass both houses of the legislature, by a two-thirds majority in each. Once the bill has passed both houses, it goes on to the states. This is the route taken by all current amendments. Because of some long outstanding amendments, such as the 27th, Congress will normally put a time limit (typically seven years) for the bill to be approved as an amendment (for example, see the 21st and 22nd). The second method prescribed is for a Constitutional Convention to be called by two-thirds of the legislatures of the States, and for that Convention to propose one or more amendments. These amendments are then sent to the states to be approved by three-fourths of the legislatures or conventions.There has been many attempts to change the information. There have been many failed attempts to change the process.…

    • 3653 Words
    • 12 Pages
    Good Essays
  • Powerful Essays

    Re: Assignment Essay Example

    • 6011 Words
    • 24 Pages

    P2: Outline the arrangements for providing quality care for looked after children and young people…

    • 6011 Words
    • 24 Pages
    Powerful Essays
  • Better Essays

    Securing and protecting information has become increasingly far more difficult and complex then what is has been in the past. As the amount of internet users and new devices that use the internet continue to become more common, new methods and users trying to steal information will continue to advance as well. Just this year we have seen large companies, corporations, and banking institutions which some were thought to be very secure have been broken into. Hackers continue to develop new ways to steal private information and develop these tools with increased simplicity. Hackers use different methods in breaching the security of the companies they target. These methods have increasingly become increasingly more complex and difficult to detect with tools and programs that are developed to detect attacks and intrusions. With the increasing amount of security threats, new ideas and methods continue to be developed to prevent further attacks. Among these methods is security authentication, protection and prevention.…

    • 1725 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Global technology is on the rise and being used by many on a daily basis. Companies all around the world are using technology, as well as individuals for personal use. With the rise of global technology comes the increase of cyber crimes and cyber-related threats. With so much personal information available online criminals are finding it easier than ever to access it.…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Computer Fraud Act Of 1984

    • 2247 Words
    • 9 Pages

    Due to the advance technology of the Internet, the government, private industry and the everyday computer user have fears of their data or private information being comprised by a criminal hacker. C.C. Palmer, who manages the Network Security and Cryptography department at the IBM. Thomas J. Watson Research Center writes, “They are afraid that some hacker will break into their Web server and replace their logo with pornography, read their e-mail, steal their credit card number from an on-line shopping site, or implant software that will secretly transmit their organization’s secrets to the open Internet”. This hacking is not only widespread, but is being executed so flawlessly that the attackers compromise a system, steal everything…

    • 2247 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Organized Crime

    • 375 Words
    • 2 Pages

    One new trend in organized crime is cybercrime. The key to it is social engineering. Hackers can easily persuade someone now a days to do things on their computer that is not in their best interest and the internet is assisting them.…

    • 375 Words
    • 2 Pages
    Satisfactory Essays