2 pages/≈550 words
Communications & Media
Malicious Activity: The Various Aspects Of Social Engineering Attacks (Essay Sample)
explain the various aspects of social engineering attacks and the possible methods to prevent these attacks. style: apa
Social Engineering Attacks Student’s Name Institution The aspect of social engineering attacks is not only prevalent in business enterprises but are becoming increasingly even in the social life of every individual in social networks. Most of these attacks occur on online social networks such as Facebooks, computers, phones among others. The attackers and hackers are devising more pronounced and intelligent ways of fooling and tricking individuals and employees and getting access to valuable data, private information. Social engineering attack occurs where the attackers use psychological kind of manipulation hence tricking the users to make security mistakes or exposing sensitive information through computers or other devices such as phones. Online social networking is a platform with a lot of vulnerable attacks which will target a particular group of individuals using various techniques such as phishing, pretexting, malware among others. Harmless information can be shared or exploited through this social media and when the attacker get access to this information the more easily the attack can. In addition, it may happen through one or many steps (Ackroyd, 2014). First, the attacker will investigate the target victim to get the necessary information to access the entry points such as weak security and then proceed with the attack. Therefore, it’s crucial to detect the generic social network platform, which will correspond to these distinct functional features of these systems. This work tends to explain the various aspects of social engineering attacks and the possible methods to prevent these attacks. First reply on Social Engineering Attacks Social engineering or Reverse social engineering, on the other hand, is a direct attack to an individual or person-to-person in which the attacker convinces the victim that she/he is being faced by a certain problem now or in future and the attacker is there ready to solve the problem. The attacker pretends to be legitimate, and he or she is the authority of that organization that belongs to the victim. From this, he first gains the trust of the victim and then obtains the crucial and sensitive information through phone calls or even messages. According to a study done by researchers indicate that users in the online social networks tend to display the high rate of trust of messages sent by other online users. A good example of these attacks is through phishing where attackers send messages through email that comprise of malware and when the victim click to open the attacker get access to the organization. Second, reply Social engineering attack in RSA company In this company, the attackers used a simple technique to perform breaching in the company. According to information provided the hackers or attackers sent an email message which was written: “2011 Recruitment Plan” a few people or group of employees in the RSA company. In the process, one of the employees retrie...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
- The Role of Social Media on Technical CommunicationsDescription: The sample is about the role of social media on technical communications. The task is come up with different kinds of social media and brings out the ones that can be applied to technical communications and the advantage of using them as well as how they can be used in firms...2 pages/≈550 words| 1 Source | APA | Communications & Media | Essay |
- New York City Times Square Bombing Research AssignmentDescription: Faisal Shahzad's path to radicalization emerged starting around 2006. By the time he gained his US citizenship in mid 2009, his radicalization had crystallized into private admiration of violent jihadism and one of its most vociferous practitioners, the Pakistani Taliban. ...7 pages/≈1925 words| 40 Sources | APA | Communications & Media | Essay |
- Examining the Role of Communication in Public Administration Description: Communication plays a crucial role among and within groups of employees in both public and private organizations. It can facilitate the flow of information, policies, and resources. ...8 pages/≈2200 words| 2 Sources | APA | Communications & Media | Essay |