Social Engineering Attacks and Counterintelligence - Essay Example

Comments (0) Cite this document
Summary
Social Engineering Attacks and Counterintelligence (University) Social Engineering Attacks and Counterintelligence Introduction With the growth in technology, the world of crime has kept pace too. Criminals today are tech savvy persons who update themselves with all the latest developments in the field of science in general and the cyber world in particular…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92.2% of users find it useful
Social Engineering Attacks and Counterintelligence
Read TextPreview

Extract of sample
"Social Engineering Attacks and Counterintelligence"

Download file to see previous pages This essay looks at the concept from the security viewpoint. “Social Engineering is defined as the process of deceiving people into giving away access or confidential information” (Social Engineering Defined). Hackers, identity thieves, information brokers, disgruntled employees etc. are examples of social engineers. Dr. Max Kilger, co-author of the Honeynet Project identifies the motivators for non-ethical computer activity which can also be applied to social engineering; these are money, entertainment, ego, cause, entrance into a social group and status within that social group (Typical Goals of a Social Engineer). Counter Intelligence To a layman, counterintelligence would mean the opposite of intelligence seen from the security angle. “Counterintelligence (CI) can be defined as information gathered and activities conducted to identify, deceive, exploit, disrupt, or protect against espionage, other intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers, organizations or persons, or their agents, or international terrorist organizations or activities” (Office Of Counterintelligence, 2011). Implications to National Security New age threats of different kinds according to Car and Musladin (2013) pose a challenge to national security. These are explained below. A few such challenges like terrorism, organized crime, and activism with a negative face are considered here. Terrorism is one of the dreaded scourges that affect national security. As Car and Musladin explain, terrorists actively use the internet to network and carry out physical attacks on nations, who even own up to terror acts on the internet. Organized Crime cannot be far behind. The use of the internet ensures that people at the higher echelons of a terror network go unapprehended and remain free to plan further terror strikes. All sorts of fraud take place by cheating unsuspecting victims. The defrauding of banks and other financial institutions can lead to the destabilization of the economy. According to Car and Musladin, activism with a negative face also finds voice on the internet. This can shape and build public opinion. Unfortunately, it can provoke the masses as they can be manipulated by touching raw nerves. On the other end of the spectrum, the internet is also the stage of revolutions and protests. The Arab Spring is an instance of a revolution that took the help of digital media. When mainstream media is muffled or does not offer any succor, it is such media which become the voice of the public and leads to revolutions. Importance of Sound Information Workforce It is of utmost importance that a sound information workforce is maintained. The workforce should be aware of and alert about their work environment at all times. They should be sensitized to the value of the data being handled by them. Only an aware workforce can secure its data. Social engineering also poses a grave threat to security. The key to preventing this would be a transparent communication system at all times. Impersonation and identity thefts can be reduced to a large extent with a structured communication system. At times, the workforce can sense patterns and peculiarities in routine activities. Hence, corrective action can be taken before further damage occurs. Finally, it is always best to strike at the roots. Any fool proof system to be designed for security is best ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Social Engineering Attacks and Counterintelligence Essay”, n.d.)
Social Engineering Attacks and Counterintelligence Essay. Retrieved from https://studentshare.org/information-technology/1487555-social-engineering-attacks-and-counterintelligence
(Social Engineering Attacks and Counterintelligence Essay)
Social Engineering Attacks and Counterintelligence Essay. https://studentshare.org/information-technology/1487555-social-engineering-attacks-and-counterintelligence.
“Social Engineering Attacks and Counterintelligence Essay”, n.d. https://studentshare.org/information-technology/1487555-social-engineering-attacks-and-counterintelligence.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
CHECK THESE SAMPLES - THEY ALSO FIT YOUR TOPIC
Social Engineering Attacks and Counterintelligence
...? Social Engineering Attacks and Counter Intelligence What is Social Engineering? Social engineering is seen to essentially describe the non-technical intrusion that is seen to primarily rely on human interaction with the prime objective of essentially ticking other persons to break the established normal security procedures and provide them with either the confidential information its self or access to it (Mann, 2010). To achieve their objectives, social engineers run con games on other individuals by relying on these people’s weaknesses and natural helpfulness. Social...
5 Pages(1250 words)Case Study
Social Engineering
...the presence of hackers, penetration testers also known as pentester, spies framework, identity thieves, disgruntled employees, scum artists, executive recruiters, salespeople, governments as well as professionals such as lawyers, psychologists, and doctors. Many companies and software vendors are creating hardened as well as complex software, difficult to break into. Due to this reason, many hackers have decided to embark on the social engineering facets using the prevailing minor breaches as well as blend engineering attacks to initiate their purposes (Simson and Mitnick, 42-47). In real sense, we find that penetration testers are entity of people who uses black...
4 Pages(1000 words)Essay
Social Engineering and the Law
...USING THE LAW FOR SOCIAL ENGINEERING Ever since laws were created there have been people trying to use them to alter other people’s behavior and way of life. There are innumerable examples of this form of “social engineering”—some of them effective, some of them leading to terrible results. A contemporary example that many look on as successful is the banning of smoking in bars and restaurant in some cities. This has altered smokers’ behavior and also led to more of a stigmatization of them than before. As a result, there is evidence that the use of cigarettes is decreasing. This has public health benefits. But for every good example there are likely to be bad ones. In Canada, the government used to take away Native children... from their...
3 Pages(750 words)Essay
Counterintelligence
...Counterintelligence What is a Key priority of the National Counterintelligence Strategy Report? A key priority of the National Counterintelligence Strategy Report is to prevent spies from corrupting U.S. intelligence, a major problem demonstrated by agents uncovered in recent years inside the U.S. government who were working clandestinely for China, Russia and Cuba and who were able to influence U.S. intelligence analyses and policies. It is necessary to penetrate foreign intelligence organizations, governments and foreign groups with agents or by electronic or other means as per this report 2. What are the potential consequences of intelligence failures? The potential consequences of...
2 Pages(500 words)Case Study
Social Engineering
..., and outdated hardware.” (Granger, 2001, part 1, p. 3). The problem is that most companies have strict policies about how to dispose of sensitive information that is confidential or secret, but think nothing of throwing away items like phone directories, employee lists and the like. (Miler, 2000, at 3). Nevertheless, these pieces of information are invaluable to a potential hacker or social engineer, because it helps him or her in his or her research of the company. (Rhodes, p. 9). Familiarity Cons Here is where the dumpster-diving comes in handy. Basically, a social engineer needs information from the company to carry out his attack. A true...
12 Pages(3000 words)Essay
Social Engineering (ethical hacking )
...attacks (McClure & Shah, pp. 35-41) are more associated with the social engineering aspect of hacking that includes exploitation of human’s trusting nature to acquire valuable information for malevolent intentions. Besides non-technical attacks, ‘network infrastructure attacks’ is the most common form of hacking attacks that use the internet to enter into any network around the world, and in which, criminal hackers or intruders identify weaknesses in a network, flood it with enormous requests, and subsequently, attacking the network by installing their own network analyzer. Furthermore, ‘operating system...
8 Pages(2000 words)Essay
Technology and Social Engineering
...Technology and Social Engineering School/ Whether Technology will Always Find a Solution to Human Problems Technologyis the core aspect of development. It is the technical means of applying tools and systems to improve the surroundings for easier and better living. Technology also helps to control the natural and man-made worlds, and creates new physical and human environments. There has been development in technical expertise, skills and tools since the Stone Age when primitive man developed tools necessary to live, and to protect himself from enemies. However, the development of technology is marked from the time of the Iron Age, when iron replaced bronze for producing implements and weapons. The...
2 Pages(500 words)Essay
Reverse Social Engineering Attacks in Online Social Networks
...Reverse Social Engineering Attacks in Online Social Networks Institutional affiliation A social networking structure comprises of nodes that are represented by individuals and is also one of the most widely growing phenomena to date. Social networking sites such as LinkedIn, Facebook and Twitter, which are, being utilized primarily for communication, oriented either upon business related ventures, friendship or to find potential dating partners are growing tremendously in size as they take up new members. Facebook has now reached 500 million users, with LinkedIn having 35 million registered members and...
4 Pages(1000 words)Essay
Counterintelligence/Counter Terrorism
.... Ideal examples are the Muslim world (Wardlaw, 2009) Common terror tactics used in the early days where militants would get to a battlefield and fight their enemies until one side surrenders. However, there were instances where attacks were guerrilla. A community would be attacked when least expected and they would be all killed and some captured for sale as slaves. Modern terrorism started in in 19th century and has reached undesirable levels in the 20th and 21st century. This has come with tactics such as bombings, which is the most common. This evolved in the first phase of the modern terrorism. There is also suicide bombing where someone sacrifices himself or herself to die together with the enemies....
1 Pages(250 words)Essay
Social Engineering
...Lab Report Computer Sciences and Information Technology Social Engineering Part Google Phishing 1. Site site limits the search results to the specific domain placed. It can therefore, find all the web pages as well as the subdomains of this specific domain. 1.1.1. Site:www.yahoo.com 1.1.2. site:www.yahoo.com your name is This displays the links with the title containing “Names”. 1.1.3. site: www.yahoo.com username This displays the links with the topic “username” and “password”. 1.1.4. site: www.yahoo.com employee.id This displays the links with employee identification. 1.1.5. site: www.yahoo.com admin This displays the links with administrative services eg granting access. 1.1.6. site: www.yahoo.com...
4 Pages(1000 words)Lab Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Let us find you another Essay on topic Social Engineering Attacks and Counterintelligence for FREE!
logo footer
Contact us:
+16312120006
Contact Us Now
FREE Mobile Apps:
  • StudentShare App Store
  • StudentShare Google play
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • Miscellaneous
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us