Social Engineering Attacks and Counterintelligence - Essay Example

Comments (0) Cite this document
Social Engineering Attacks and Counterintelligence (University) Social Engineering Attacks and Counterintelligence Introduction With the growth in technology, the world of crime has kept pace too. Criminals today are tech savvy persons who update themselves with all the latest developments in the field of science in general and the cyber world in particular…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92.2% of users find it useful
Social Engineering Attacks and Counterintelligence
Read TextPreview

Extract of sample
"Social Engineering Attacks and Counterintelligence"

Download file to see previous pages This essay looks at the concept from the security viewpoint. “Social Engineering is defined as the process of deceiving people into giving away access or confidential information” (Social Engineering Defined). Hackers, identity thieves, information brokers, disgruntled employees etc. are examples of social engineers. Dr. Max Kilger, co-author of the Honeynet Project identifies the motivators for non-ethical computer activity which can also be applied to social engineering; these are money, entertainment, ego, cause, entrance into a social group and status within that social group (Typical Goals of a Social Engineer). Counter Intelligence To a layman, counterintelligence would mean the opposite of intelligence seen from the security angle. “Counterintelligence (CI) can be defined as information gathered and activities conducted to identify, deceive, exploit, disrupt, or protect against espionage, other intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers, organizations or persons, or their agents, or international terrorist organizations or activities” (Office Of Counterintelligence, 2011). Implications to National Security New age threats of different kinds according to Car and Musladin (2013) pose a challenge to national security. These are explained below. A few such challenges like terrorism, organized crime, and activism with a negative face are considered here. Terrorism is one of the dreaded scourges that affect national security. As Car and Musladin explain, terrorists actively use the internet to network and carry out physical attacks on nations, who even own up to terror acts on the internet. Organized Crime cannot be far behind. The use of the internet ensures that people at the higher echelons of a terror network go unapprehended and remain free to plan further terror strikes. All sorts of fraud take place by cheating unsuspecting victims. The defrauding of banks and other financial institutions can lead to the destabilization of the economy. According to Car and Musladin, activism with a negative face also finds voice on the internet. This can shape and build public opinion. Unfortunately, it can provoke the masses as they can be manipulated by touching raw nerves. On the other end of the spectrum, the internet is also the stage of revolutions and protests. The Arab Spring is an instance of a revolution that took the help of digital media. When mainstream media is muffled or does not offer any succor, it is such media which become the voice of the public and leads to revolutions. Importance of Sound Information Workforce It is of utmost importance that a sound information workforce is maintained. The workforce should be aware of and alert about their work environment at all times. They should be sensitized to the value of the data being handled by them. Only an aware workforce can secure its data. Social engineering also poses a grave threat to security. The key to preventing this would be a transparent communication system at all times. Impersonation and identity thefts can be reduced to a large extent with a structured communication system. At times, the workforce can sense patterns and peculiarities in routine activities. Hence, corrective action can be taken before further damage occurs. Finally, it is always best to strike at the roots. Any fool proof system to be designed for security is best ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Social Engineering Attacks and Counterintelligence Essay”, n.d.)
Social Engineering Attacks and Counterintelligence Essay. Retrieved from
(Social Engineering Attacks and Counterintelligence Essay)
Social Engineering Attacks and Counterintelligence Essay.
“Social Engineering Attacks and Counterintelligence Essay”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
Among the main social engineering techniques identified by anti-virus providers such as McAfee and Avira as the methods for disabling target networks include 'spear phishing' emails, which are customized to appear as if from trustworthy sources (Kiountouzis & Kokolakis, 2011).
24 Pages(6000 words)Essay
Social Engineering
Social Engineering is a professional norm that usually happens in small marketing businesses as well as in the government institutions. The aspect of social Engineering however, is associated with tricks that people uses to share as well as link out the information that in turns makes them susceptible to crime.
4 Pages(1000 words)Essay
Social Engineering and the Law
This has altered smokers’ behavior and also led to more of a stigmatization of them than before. As a result, there is evidence that the use of cigarettes is decreasing. This
3 Pages(750 words)Essay
Cyber attacks
The armed forces also aired that the cyber defenses of the country are being challenged by sophisticated and well-organized efforts to steal classified information. Military men agree to US’ vulnerability to cyber
2 Pages(500 words)Essay
Social Engineering
Then there will be an analysis of the research, and then a discussion of what I believe about the need to balance legitimate defenses against social engineering with the need to not go overboard and make people feel like common criminals or unwelcome. Lastly, I will
12 Pages(3000 words)Essay
Social Engineering (ethical hacking )
ome a platform of gathering different networks that allow individual computers to connect with them in a number of ways such as through dial-ups, gateways, ISPs, etc. In other words, only a computer and network connection are the two major requisites for entering into the world
8 Pages(2000 words)Essay
Social Engineering ( Examining the latest scams)
For instance, a person making use of social engineering to burglarize a business or else personal computer network would attempt to attain the confidence of someone who is allowed to have the legal right to use the network so as to
16 Pages(4000 words)Essay
Technology and Social Engineering
ere has been development in technical expertise, skills and tools since the Stone Age when primitive man developed tools necessary to live, and to protect himself from enemies. However, the development of technology is marked from the time of the Iron Age, when iron replaced
2 Pages(500 words)Essay
Counterintelligence/Counter Terrorism
In reference with today’s terrorism, there is a great difference as many of these nations battle to attain political power. However, there is a great difference in the tactics used by militants during those early days. This is following the growth and advancement in
1 Pages(250 words)Essay
Cyber crime,the social engineering
In addition, the crimes may cause mental harm or ruin the reputation of an individual or a group (Wall 2007 page 107-240). Social engineering refers to the use of confidential tricks to divulge
2 Pages(500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Let us find you another Essay on topic Social Engineering Attacks and Counterintelligence for FREE!
Contact us:
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • Miscellaneous
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us