StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Cyber crime,the social engineering - Essay Example

Cite this document
Summary
The acts are felonious manipulations of the internet. The crime takes place to obtain important organizational information, robing of people through impersonation and other unlawful acts…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.7% of users find it useful
Cyber crime,the social engineering
Read Text Preview

Extract of sample "Cyber crime,the social engineering"

Cyber Crime By Introduction The term cybercrime refers to any unjustified act that relates to a computer and a network. The acts are felonious manipulations of the internet. The crime takes place to obtain important organizational information, robing of people through impersonation and other unlawful acts. The crimes lead to insecurity and threats to financial health of a given nation. In addition, the crimes may cause mental harm or ruin the reputation of an individual or a group (Wall 2007 page 107-240).

Social engineering refers to the use of confidential tricks to divulge information from an organization through people, though it differs from a traditional term ‘con’. Social engineering is a widespread problem through the internetToday social engineering has become a nuisance to many people as the cybercrime techniques improve and spread widely. Those committing the offenses tend to manipulate the victims into believing false information to obtain personal or organizations crucial information.

Cybercrimes pay as some of the social engineering obtains payments through targeting specific organization information. The internet as a social engineer leads to over reliance on information provided through the internet. People meet through the social network and share information without their physical knowledge, thus promoting cybercrime. People act upon the received emails, telephones, mobiles and faxes from others they are unfamiliar with. It is becasue of the the ability to believe what others say.

People, in many cases, act as the weak links to cybercrime as the hackers target the human nature and obtain a response. The social engineers tend to be charming or at times use their appearance and hold false authority. Ruse acts as a key while the parody and disguise is through speech, physical disguise or documents (Brenner 2010 page 40-96).Social engineering over the internet is difficult to deal with compared to phone or face to faceFace to face communication proves to be the best form of information exchange as people obtain direct feedback.

Physical reactions are evident and direct responses are made unlike communication through the internet. The social engineers use tricks and technology to obtain information that is difficult to track. The engineers have good knowledge on the use of computers and ways to prevent their arrest. Social engineering through the internet is easy to deal with as phone numbers are tracked leading to the social engineer. Though the act of spoofing provides a social engineer with the name, and number of the caller that permits the callers to forge their identity, social engineering still proves difficult to deal with.

Web spoofing allows scanning of documents and exploitation of web browser bugs, while email spoofing allows the spammers access the spam lecture. The spoofing of the internet protocol tricks two people exchanging information into believing they are the sole communicators and finally attacking. In this case the attacker obtains information from both parties at the same time while social engineering through the phone involves only one victim at a time. The internet allows the hackers produce and use fake bank notes and present forged certificates (Anon 2010 page 51).

ConclusionThe use of cybercrime as a source of income is an unlawful act as the victims experience emotional disturbances. The social engineers use convincing means to obtain needed information or divulge information to their own advantage (Interpol 2010). Social engineering through the internet exploits many victims who disclose personal or organizational information. The rate of cybercrime is at increase and this threatens the security and financial status of a country.Reference listAnon., 2010.

Cybercrime. years of international police cooperetion, pp. 73-98.Brenner, S. W., 2010. Cybercrime: Criminal Threats from Cyberspace. New York: ABC-CLIO.Interpol, 2010. spoof cards. search security, p. 42.Wall, D., 2007. Cybercrime: The Transformation of Crime in the Information Age. chicago: Polity.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cyber crime,the social engineering Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Cyber crime,the social engineering Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1646641-cyber-crimethe-social-engineering
(Cyber crime,the Social Engineering Essay Example | Topics and Well Written Essays - 500 Words)
Cyber crime,the Social Engineering Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1646641-cyber-crimethe-social-engineering.
“Cyber crime,the Social Engineering Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1646641-cyber-crimethe-social-engineering.
  • Cited: 0 times

CHECK THESE SAMPLES OF Cyber crime,the social engineering

Social Engineering Attacks and Counterintelligence

social engineering Attacks and Counterintelligence (University) social engineering Attacks and Counterintelligence Introduction With the growth in technology, the world of crime has kept pace too.... social engineering This term is used both in sociology and security.... “social engineering is defined as the process of deceiving people into giving away access or confidential information” (social engineering Defined)....
5 Pages (1250 words) Essay

Vulnerabilities of Networks and Internet

engineering, ng plans, for instance, financial information, business or marketing plans, and whatever secret data stored in a computer2.... They continually spawn new ideas and offer many social benefits, yet at the same, time they present increased opportunities for charm....
7 Pages (1750 words) Essay

Information Security Skills

Besides, incorporating advanced computing and network engineering developments that specifically target the security of the huge internet browsing population is an interesting area that fascinates me and certainly attracts my learning attention.... Due to the fact that more millions of people are likely to become involved in some way with the growing social network and online transaction platforms.... With respect to the evolution of computing threats from simple access security to more potent threats of economic crime and terrorism scares on the internet, it is an increasingly important area of concern that requires the appropriate training of professionals such as in this area of study....
2 Pages (500 words) Essay

Information in Organizations

This paper analyses the security measures in companies.... As businesses must take due care of their possessions and assets to prevent damage or theft, businesses must protect their information.... There are thousands of ways that businesses can suffer harm through access to their personal information....
8 Pages (2000 words) Coursework

Reverse Social Engineering Attacks in Online Social Networks

The writer of the essay "Reverse social engineering Attacks in Online Social Networks" suggests that in order to minimize the effects of RSE, the networking sites should only suggest possible friends when there is a strong connection that exists between them.... hellip; A social networking structure comprises of nodes that are represented by individuals and is also one of the most widely growing phenomena to date.... social networking sites such as LinkedIn, Facebook and Twitter, which are, being utilized primarily for communication, oriented either upon business related ventures, friendship....
4 Pages (1000 words) Essay

Significance of Technology in the Future

Contrary to the time when technology faced resistance in society because of associated fears, it has proved to be… As expected, there is the dark side of technology that causes many to feel that through technology, humans are engineering destruction.... At first, this technology presented a viable solution to pests, diseases and unfavorable climatic conditions because genetic engineering provided crops with the capacity to withstand all these.... After the Second World War, the globe experienced a social and economic recession that instilled hopelessness in majority of them....
7 Pages (1750 words) Essay

Week 1 CYB

This was achieved by viewing the security problems from the point of… The actions of the team are mainly based on wireless and wired hacking, social engineering and entering buildings without being granted legal access by breaking into them.... The actions of the team are mainly based on wireless and wired hacking, social engineering and entering buildings without being granted legal access by breaking into them.... They then used a rogue wireless access point and carried out social engineering to gain access to sensitive information on customers....
2 Pages (500 words) Assignment

Application of Data Mining

Operational engineering data can detect fault equipment with the help of data mining and determine parameters that can help in controlling such activity (Rajaraman & Ullman, 2011).... The information which is extracted from the data can be used for different purposes.... Data mining is used to generate revenues, cut costs, or get an insight… Recently, it has been revealed that the government has also been using an advance form of data mining where they are able to get the complete information about any individual....
5 Pages (1250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us