StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Cyber crime,the social engineering - Essay Example

Comments (0) Cite this document
Summary
The acts are felonious manipulations of the internet. The crime takes place to obtain important organizational information, robing of people through impersonation and other unlawful acts…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92.5% of users find it useful
Cyber crime,the social engineering
Read TextPreview

Extract of sample "Cyber crime,the social engineering"

Cyber Crime By Introduction The term cybercrime refers to any unjustified act that relates to a computer and a network. The acts are felonious manipulations of the internet. The crime takes place to obtain important organizational information, robing of people through impersonation and other unlawful acts. The crimes lead to insecurity and threats to financial health of a given nation. In addition, the crimes may cause mental harm or ruin the reputation of an individual or a group (Wall 2007 page 107-240). Social engineering refers to the use of confidential tricks to divulge information from an organization through people, though it differs from a traditional term ‘con’.
Social engineering is a widespread problem through the internet
Today social engineering has become a nuisance to many people as the cybercrime techniques improve and spread widely. Those committing the offenses tend to manipulate the victims into believing false information to obtain personal or organizations crucial information. Cybercrimes pay as some of the social engineering obtains payments through targeting specific organization information. The internet as a social engineer leads to over reliance on information provided through the internet. People meet through the social network and share information without their physical knowledge, thus promoting cybercrime. People act upon the received emails, telephones, mobiles and faxes from others they are unfamiliar with. It is becasue of the the ability to believe what others say. People, in many cases, act as the weak links to cybercrime as the hackers target the human nature and obtain a response. The social engineers tend to be charming or at times use their appearance and hold false authority. Ruse acts as a key while the parody and disguise is through speech, physical disguise or documents (Brenner 2010 page 40-96).
Social engineering over the internet is difficult to deal with compared to phone or face to face
Face to face communication proves to be the best form of information exchange as people obtain direct feedback. Physical reactions are evident and direct responses are made unlike communication through the internet. The social engineers use tricks and technology to obtain information that is difficult to track. The engineers have good knowledge on the use of computers and ways to prevent their arrest. Social engineering through the internet is easy to deal with as phone numbers are tracked leading to the social engineer. Though the act of spoofing provides a social engineer with the name, and number of the caller that permits the callers to forge their identity, social engineering still proves difficult to deal with. Web spoofing allows scanning of documents and exploitation of web browser bugs, while email spoofing allows the spammers access the spam lecture. The spoofing of the internet protocol tricks two people exchanging information into believing they are the sole communicators and finally attacking. In this case the attacker obtains information from both parties at the same time while social engineering through the phone involves only one victim at a time. The internet allows the hackers produce and use fake bank notes and present forged certificates (Anon 2010 page 51).
Conclusion
The use of cybercrime as a source of income is an unlawful act as the victims experience emotional disturbances. The social engineers use convincing means to obtain needed information or divulge information to their own advantage (Interpol 2010). Social engineering through the internet exploits many victims who disclose personal or organizational information. The rate of cybercrime is at increase and this threatens the security and financial status of a country.
Reference list
Anon., 2010. Cybercrime. years of international police cooperetion, pp. 73-98.
Brenner, S. W., 2010. Cybercrime: Criminal Threats from Cyberspace. New York: ABC-CLIO.
Interpol, 2010. spoof cards. search security, p. 42.
Wall, D., 2007. Cybercrime: The Transformation of Crime in the Information Age. chicago: Polity. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cyber crime,the social engineering Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Cyber crime,the social engineering Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1646641-cyber-crimethe-social-engineering
(Cyber crime,the Social Engineering Essay Example | Topics and Well Written Essays - 500 Words)
Cyber crime,the Social Engineering Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1646641-cyber-crimethe-social-engineering.
“Cyber crime,the Social Engineering Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1646641-cyber-crimethe-social-engineering.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Cyber crime,the social engineering

Cyber Crime as opposed to Cyber warfare

... and back channel diplomacy etc, economic and trade agreements etc. For instance, the main aim is to access implicit information and to destroy existing data warehouses and governmental networks to bring economic, technical and social losses to rival nation. 1.3 - Problem Statement Although systems and software developing IT organisations (such as Microsoft, Apple, IBM) have been striving to deal with the rising menace of cyber crime, there is dire need to develop strong anti-virus softwares to ensure information security. Nevertheless, cyber crimes (specifically viruses) do not only threaten security of software components, but also they may sabotage hardware resources, especially computer hard disks. In addition, the cyber warfare may...
10 Pages(2500 words)Essay

Cyber Crime as opposed to Cyber warfare

... relationships and back channel diplomacy etc, economic and trade agreements etc. For instance, the main aim is to access implicit information and to destroy existing data warehouses and governmental networks to bring economic, technical and social losses to rival nations. Problem Statement Although systems and software developing IT organisations (such as Microsoft, Apple, IBM) have been striving to deal with the rising menace of cyber crime, there is dire need to develop strong anti-virus software's to ensure information security. Nevertheless, cyber crimes (specifically viruses) do not only threaten security of software components, but also they may sabotage hardware resources, especially computer hard disks. In addition...
11 Pages(2750 words)Research Paper

Fighting Cyber-Crime

This is because: 1. Every country has their own and separate legal, technical and organizational issues. 2. All information is stored in free-text format. 3. Information keeps changing dynamically. Thus, it has become a biggest international challenge. So how are they fighting against cybercrime? This is the topic of discussion in this task. What is Cybercrime? Cybercrime is any illegal activity that is conducted through the use of computers, the internet and computer network. There are many kinds of cybercrimes that exist: internet fraud, computer hacking, spreading of malicious code or viruses, cyber piracy and many more. And new types of cybercrime keep on being introduced. (Yang, 2008, p. 32). There are many reasons why peopl...
5 Pages(1250 words)Term Paper

Criminology: Cyber Crime

... Criminology: Cyber Crime Introduction The invention and introduction of computer technology presented great advantages that made it receive warm welcome and appreciation from all corners of the world. Computer technologies have actually led to simplification of lifestyles considering its quick manner of solving problems and tasks. Computers have been the basis of operations in various institutions ranging from corporate to government organizations. Computers have been very instrumental in communication, transactions, storage of files and data, as well detecting certain malicious activities. Increasing technological knowhow about computer and its systems have witnessed simultaneous increase in criminal activities carried through computers...
8 Pages(2000 words)Research Paper

Cyber crime

DDos works by first downloading a free internet software called Low Orbit Ion Canon (LOIC) as a "destructive cyber weapon". Once downloaded, “the LOIC could be used to attack by sending internet traffic to a target computer…When the volume of traffic sent to a computer becomes too much for it to handle it would suffer a denial of service. The more LOICs used, therefore, to attack a target computer, the more likely that a denial of service will take place ” (Laville, 2012). The irony of the hackers Anonymous is that they do not see themselves as criminals but rather online activists or hacktivists who conduct their protest by bringing a site down through DDos or other methods to teach them a lesson for whatever reason they can thi...
3 Pages(750 words)Essay

Cyber Security, Cyber Crime and Cyber Forensic

... is not limited to boundaries. Loop holes in information protection results in diverse kind of crimes, ranging from defense to finance. References Santanam, R., &Sethumadhavan, M. (2011).Cyber Security, Cyber Crime and Cyber Forensic: Applications and Perspectives. Idea Group Inc. Print Finklea, K. M., &Theohary, C. A. (2013).Cybercrime: Conceptual Issues for Congress and U. S. Law Enforcement.Congressional Research Service....
2 Pages(500 words)Assignment

Cyber crime

... governments and its threats can be far much worse to an economy since it is a crime related to the internet; internet is one factor that an economy cannot survive without. Additionally, I would agree with what the author has indicated in the article because currently issues concerning cyber crimes are often discussed in the social media and various governments, therefore it is no doubt that whatever the author has provided is backed by so varied and valid evidences. Do you think the topic was important? The topic is very much important globally. Cyber threats and data privacy are factors that are currently becoming a major focus to various businesses, organizations and governments around the world. Since various sectors in the world...
2 Pages(500 words)Article

Cyber Crime

...Cybercrime The recent cases on data breach within high-profile companies have made many shoppers to have negative attitude towards online shopping.Most shoppers have the view that online shopping is more risky than ever. According to statistics by USA Today poll, 24% of Americans have reduced their frequent use of online purchasing techniques owing to recent incidents on identity theft. This presents an unfortunate situation since even the most careful online shoppers are not guaranteed 100% protection from identity theft or credit card fraud. One of the latest cybercrimes according to cyber security bloggers involves hacking of beauty supply chain Sally Beauty (SBH). Underground marketplaces posted a batch of stolen debit and credit...
1 Pages(250 words)Essay

Cyber Crime

However, these technologies represent significant costs for communication companies, and ultimately, the general public. With more businesses coming to depend on computers and internet-based systems, attacks on these systems have increased. Such attacks have been considered crimes which covers the application of computer networks, alongside financial scams, hacking, virus attacks, phishing, cyber stalking, and pornography (Li, et al. 2012). In 2000 for instance, the ILOVEYOU virus caused billions of dollars in damage to different computers and companies all over the world (Mishra and Pajrapati, 2013). It was later discovered that two Filipinos were responsible for the creation of the virus. However, since the Philippines, at...
26 Pages(6500 words)Literature review

Cyber Crime

... Cyber Crime Nowadays, the most alarming and critical technological threat to today’s world isCyber Crime. I will try to discuss the fact that although the awareness level of citizens against cyber crimes is increasing day by day, and the statistics are has shown that they are now trying to protect themselves against the long lasting trauma of cyber crime. Nonetheless, studies over the recent years have indicated that such crimes have increased more rapidly not only in Canada but also across the globe as well. Since few decades, development of internet and computer technology has revolutionized the world upside down. It has been able to attract every single person or group from a teenager to a schoolteacher, to an ordinary businessperson...
10 Pages(2500 words)Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Cyber crime,the social engineering for FREE!

Contact Us