Essay Available:
You are here: Home → Essay → IT & Computer Science
Pages:
2 pages/≈550 words
Sources:
3 Sources
Level:
APA
Subject:
IT & Computer Science
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 10.8
Topic:
Social engineering (Essay Sample)
Instructions:
The essay entailed describing social engineering, its effects, types of social engineering attacks, examples of the attacks in real life and ways to mitigate such attacks. source..
Content:
Assignment Title: Social Engineering
Student’s Name
Course Title
Instructor’s Name
Date
Introduction
Social engineering represents a threat to both the individuals and the state as a whole. It refers to a situation where a person manipulates others or a group of individuals to get sensitive and confidential information from them. A good example is a person using various methods to cheat you so that you can unknowingly provide them with your email password or the pin to the bank account. Some of them can trick you so that they can install malware on your computer and the malware can allow them to access critical data from you. The key reason why attackers prefer to use this approach is that it is easier to use compared to the other methods (Luo et al., 2013). They can exploit trust developed between them and their victim and get the information they want. Getting information may be very hard so they prefer involving their victims to make the work easier.
Discussion
Various types of social engineering exist. However, fundamental characteristics common to all of them is that they aim to achieve a common goal, always known to the attacker. Their goals are not God and negatively affect their victims. One type of this attack is phishing. This attack depicts social engineering attacks aimed at their victim. The main avenue of this attacks is websites, email or other social sites. The attack appears to emanate from people we know, or we trust (Dadkhah et al., 2015). Such attack could come from organisations such as banks which we are confident. The message instils fear to the victim, a move that makes them give away their sensitive data unknowingly. Another form of this attack is Baiting. Despite the fact that this attack appears similar to the phishing, it is different. In this type of attack, the attacker presents something attractive or enticing to make them give away their secret data. For example, the attacker may intentionally leave a nice flash disk at the desk of the victim. The victim may get curious to know what the disk contains and when they plug it in their computer, it installs malware that helps the attacker get vital information.
Another type of attack is Quid pro-Quo attack in which the attacker presents the victim with an offer too sweet to reject. For example, they may provide free technical assistance for a firm and in the process get access to vital data from the company. Pretexting is another form of attack where the attack relies on trust between the victim and the attacker. The attacker may also impersonate themselves for example as a heat of an IT support department. They may send attachments as legitimate managers, and when an employee opens it, they may install malware on the company computers without knowing. Piggybacking is another approach in the field of social engineering. In this attack, the attacker may borrow a computer from an employee and install malware. Also, the attacker may follow an employee into a restricted zone with the employee thinking that the attacker is part of the company.
Recent social engineering attacks have faced the department of homeland security in which a hacker gained access to the FBI database. The report published on 09 Feb 2016 shocked the department of homeland security. The attack targeted the Department of Justice and helped the attacker gain the vital information. The hacker produced the list of names of employees of the homeland security department and the FBI including specialist agents. This act may jeopardise their work as exposin...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
Other Topics:
- Database Management: A Referential Integrity ConstraintDescription: Document provides an overview of the major components and terms usually in database management. It also acts as a partial fulfillment of the students coursework...1 page/≈275 words| No Sources | APA | IT & Computer Science | Essay |
- Evolution Of Technology: Gerhard Lenski, Leslie WhiteDescription: The document serves to fulfill the requirements of the coursework and also provide detailed information to the student about the topic...2 pages/≈550 words| 7 Sources | APA | IT & Computer Science | Essay |
- Cyber Security and TechnologyDescription: Cyber Security and Technology IT & Computer Science Essay...3 pages/≈825 words| 5 Sources | APA | IT & Computer Science | Essay |