StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Social Engineering Aspects - Essay Example

Cite this document
Summary
The paper "Social Engineering Aspects" highlights that the formation of the Federal Trade Commission was created in the United States of America with aim of ensuring that customers are not subjected to fraudulent activities through deceptive practices…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.4% of users find it useful
Social Engineering Aspects
Read Text Preview

Extract of sample "Social Engineering Aspects"

Social Engineering Introduction Social engineering aspects have been misunderstood in many ways or the other posing various opinions on how it works as far as world of social engineering is concerned. Many people in the modern world of social engineering believe that the perception lies to trivial fraud. Social Engineering is a professional norm that usually happens in small marketing businesses as well as in the government institutions. The aspect of social Engineering however, is associated with tricks that people uses to share as well as link out the information that in turns makes them susceptible to crime. Meanwhile, the aspect of social Engineering just happening from diverse institutions in the technological world however is not good or evil since it carries both positive as well as negative norms. Many companies usually work based on initiating database for effective delivery of their services and therefore they make sure that their servers are free from malicious hackers as well as avoid any forms of infiltrations on their servers. Social Engineering infrastructure has been affected through internet fraudulent activities. Social engineering is one the artistically as well as scientifically facet that involves skillfully articulations and it is used in diverse professional including, lawyer, students, researchers, psychologists. According to various researchers, social engineering is termed as a collection of various skills and sciences that leads to a certain action (Wilson and Hadnagy, 12-16). Pre-texting In the United Kingdom, pre-texting, also known as blagging as well as bohoing activities, involves the act of creation and inventing ways to phish out divulging information. Moreover, pre-texting can also be defined as the act of inventing and creating certain traits that makes people perform certain actions. Pre-texting involves anything within imagination context. The rise of internet has majorly affected Pre-texting norm in many ways. Various hackers nowadays use Pre-texting technique as well as method phished from business domains in disclosing customer’s information as well as obtaining various records (Arnold, 20-23). Forms of social Engineering The forms of social Engineering entails the presence of hackers, penetration testers also known as pentester, spies framework, identity thieves, disgruntled employees, scum artists, executive recruiters, salespeople, governments as well as professionals such as lawyers, psychologists, and doctors. Many companies and software vendors are creating hardened as well as complex software, difficult to break into. Due to this reason, many hackers have decided to embark on the social engineering facets using the prevailing minor breaches as well as blend engineering attacks to initiate their purposes (Simson and Mitnick, 42-47). In real sense, we find that penetration testers are entity of people who uses black malicious skills in gaining personal information of someone or harming the targeted person. Remote hacking has been one of the major approaches that have been used as a penetration tester also known as pentester, which is offensive in nature. However, based on pentester facet, many organizations in business today uses pentester articulation to ensure that their clients remain secure in terms of their data manipulation. Many governmental organizations utilize social engineering perception by controlling their protocol domains and messaging systems they releases to their workers. Social proof, authorization, and scarcity are one of the social engineering aspects that are utilized, showing that social engineering is not always negative (Wilson and Hadnagy, 49-56). Uses of Social engineering Social engineering can be initiated and employed in many areas that pertain aspects of life and affects one positively or negatives depending on the prevailing issue. Generally, social engineering can be malicious or be friendly by either tearing down or building up someone life. Motivation is an aspect that is associated with social engineering norm in that it makes one to take a given action. Various professional spies use social engineering perceptions to avail their investigations framework. Using the skills and knowledge acquired through science, spies’ initiates fooling aspect to make people involved believe that they are the real people addressing them. In the field of social engineering, theft identity is one of the highly considered issue on the cause, characterized by the aspect of impersonation and use of someone information without his or her consent. Identity theft is considered as a criminology act and it is believed that this aspect is brought by the essence of social engineering norm. An employee who usually becomes discontented most of the time enters into adversarial relationship with their employers since they try their level best not to put their employment at risk. Social engineering however, is composed of fraud artists who engage into vandalism, crime, as well as theft with the purpose of making extra bucks. All this is associated with creation of skillful elicitation, which in turns leads to adept anticipation motivation. Elicitation is the only technological approach to avail psychological principles of social engineering (Wiles and Long, 54-59). Conclusion In conclusion, Social Engineering is a professional norm that usually happens in small marketing businesses as well as in the government institutions. The aspect of social Engineering however, is associated with tricks that people uses to share as well as link out the information that in turns makes them susceptible to crime. . Generally, social engineering can be malicious or be friendly by either tearing down or building up someone life. Motivation is an aspect that is associated with social engineering norm in that it makes one to take a given action. Many companies and software vendors are creating hardened as well as complex software, difficult to break into. Due to this reason, many hackers have decided to embark on the social engineering facets using the prevailing minor breaches as well as blend engineering attacks to initiate their purposes. The rise of pre-texting fraudulent activities associated within social engineering has led to formation of legislation law formed by GLBA the year 1999 in the United States of America. The law availed by federal legislation addresses the issue of pre-texting that has really affected banking systems records. The formation of Federal Trade Commission was created in the United States of America with aim of ensuring that customers are not subjected to fraudulent activities through deceptive practices. This body responsible for punishing the lawbreakers goes against the pre-determined laws based on the pre-texting and social engineering aspects. Works Cited Arnold, Patricia. Social Engineering: Hiding in Plain Sight (InfoSec Series) [Kindle Edition]. Canada: Amazon Digital Services, 2009. Print. Simson, William and Mitnick, Kevin. The Art of Deception: Controlling the Human Element of Security Paperback. New York: Wiley, 2003. Print. Wilson, Paul and Hadnagy, Christopher. Social Engineering: The Art of Human Hacking [Paperback]. New York: Wiley, 2010. Print. Wiles, Jack and Long, Johnny. No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing [Paperback]. Washington, DC: Syngress, 2008. Print. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Social Engineering Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Social Engineering Essay Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/information-technology/1496691-social-engineering
(Social Engineering Essay Example | Topics and Well Written Essays - 1000 Words)
Social Engineering Essay Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/information-technology/1496691-social-engineering.
“Social Engineering Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1496691-social-engineering.
  • Cited: 0 times

CHECK THESE SAMPLES OF Social Engineering Aspects

Plea Bargaining - A Flaw in the Criminal Justice System in the United States

Date Plea Bargaining - A Flaw in the Criminal Justice System in the United States Introduction It is agreeable that the criminal justice system plays a very critical role in ensuring that the rule of law is observed and helps in imposing penalties to those who violate laws.... ... ... ... In the United States there is no single criminal justice system, but rather numerous similar individual criminal justice systems....
5 Pages (1250 words) Essay

Manufacturing Engineering

These two aspects must be considered independently, because arrangements that are optimal for one may not be optimal for the other.... Manufacturing engineering is moving in the direction of high flexibility, low production cost and high product quality.... During the last few years, several new manufacturing engineering paradigms have been proposed.... Running Head: MANUFACTURING engineering Manufacturing engineering [The of the appears here] [The of the appears here]Manufacturing EngineeringManufacturing engineering is moving in the direction of high flexibility, low production cost and high product quality....
2 Pages (500 words) Essay

Engineering

This paper ''engineering'' tells that The objective of this part of the course is to portray engineering as defined by engineering Australia while identifying the basic concepts and laws involved in engineering as a science.... I would love this to be a program that integrates the concept of industrial engineering into its approach to the engineering discipline.... This course aspect has the objective of outlining the steps and requirements involved in the engineering process, such as (a) systems thinking, which identifies problem elements through attention to their components and boundaries, and an understanding of cross-boundary interactions, (b) reporting, which involves (courtesy of a final report, recommendation of requirements to customers, (c) writing skills, i....
8 Pages (2000 words) Book Report/Review

Internet Safety: How to Protect Yourself

The results show the security issue includes vulnerability and social engineering and how it becomes a threat to any organization which has a connection with the internet.... The software vulnerabilities and social engineering in an organization system that cyber-criminals target is the most important issue in security measures.... This report will discuss general issues related to Internet connectivity, software vulnerabilities, social engineering and specific vulnerability which is Cross-Site Scripting (XSS)....
15 Pages (3750 words) Case Study

What Is Engineering, Learning to Be an Engineer

The paper "What Is engineering, Learning to Be an Engineer" states that engineering, particularly at management level, demands ability to communicate formally, in an official manner.... I expect, through this programme, to be able to re-evaluate my engineering career to give me the opportunity to find new ways of developing my career.... I am able to consolidate through the knowledge gained in this course, by offering a more complete engineering approach to the engineering labour market....
8 Pages (2000 words) Coursework

Human Factors and Social Aspects in Software Engineering

Besides the human factors, software engineering has to consider social aspects too in their work.... Since it is not always easier for the engineers to clearly understand all these factors and social aspects, this paper will serve the onus of highlighting them accordingly.... In simple terms, software engineering refers to the process of developing software with an aim of making them more efficient, reliable, affordable and easy to maintain while meeting the customers' expectations....
7 Pages (1750 words) Case Study

The Importance of Social Engineering

The Social Engineering Aspects of cybercrime points out on human weaknesses to encourage the acts of illegal and unauthentic attacks.... The paper "The Issues of social engineering " is a wonderful example of a term paper on information technology.... social engineering is a problem that relates to the manipulation of computer users out of their usernames and passwords.... The paper "The Issues of social engineering " is a wonderful example of a term paper on information technology....
7 Pages (1750 words) Term Paper

Knowledge in the Engineering Field

I seek to work in any organization that focuses on the design aspects of engineering.... This paper "Knowledge in the engineering Field" tells that I am creative individuals and often think in a contemplative way regarding various issues.... The courses that I study in an engineering course deals with some tactical and operational issues.... My principle aim as an intern was to garner an understanding of the engineering related to specific issues, modelling the problem accordingly and finding a reasonable optimal solution....
7 Pages (1750 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us