Free

Elecitation and pretexting - Essay Example

Comments (0) Cite this document
Summary
This takes place during a very normal and innocent communication when social engineers seek to obtain some information. The engineers use their…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94.7% of users find it useful
Elecitation and pretexting
Read TextPreview

Extract of sample "Elecitation and pretexting"

Elicitation and pretexting Introduction Elicitation refers to the process of extracting as well as gathering informationfrom someone through the use of technology. This takes place during a very normal and innocent communication when social engineers seek to obtain some information. The engineers use their conversational skills as well as tactics so as to encourage the targeted people to provide in-depth information. The tactics include assumptive questions, volunteering information, expression of mutual interest as well as appealing to the ego of their target. On the other hand, pretexting is the practice of an individual presenting themselves to be someone else so that they can obtain some private information. It is the use of publicly available information to in order to creates ones new identity and using it to acquire information needed to convince their target to take a specific action.
Positive attributes of elicitation and pretexting
The tools of social engineering can be used to detect criminal activities by tracing the conversations of the suspects before they engage in attacks. Elicitation has aided in the fight against global challenges such as terrorism through the tracking of conversations using modern communication gadgets. It can be used to get some vital information that may lead to the hideouts of criminals.
The tool is used by politicians and other leaders to make inroads into the camps of opponents for safeguarding the nation. Pretexting can be used to gain vital information on the operations of illegal business ventures and bringing them to the public for legal measures to be undertaken. Intelligence services adopt the use of elicitation to track down hackers who use similar techniques in propagating criminal activities (Hadnagy, 56-109).
Work Cited
Hadnagy, Christopher. Social Engineering: The Art of Human Hacking. , 2011. Print. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Elecitation and pretexting Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
Elecitation and pretexting Essay Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1672013-elecitation-and-pretexting
(Elecitation and Pretexting Essay Example | Topics and Well Written Essays - 250 Words)
Elecitation and Pretexting Essay Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1672013-elecitation-and-pretexting.
“Elecitation and Pretexting Essay Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1672013-elecitation-and-pretexting.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Elecitation and pretexting

The Evolutional View of the Types of Identity Thefts

...no specific quantitative analysis done on data presented; its methodology did not include statistical analysis at all. However, the authors gave valuable information on some definitions of online fraud, identity, and identity theft. They discussed some priniciples of identity verifications; deconstructed theft into its horizontal and vertical dimensions including its elements; cited specific examples of methods used to implement identity theft and onlline fraud; and proposed approaches to prevent such online crimes. Examples of online fraud against individuals are phishing, spyware, transaction fraud, advanced fee fraud; examples of online fraud against institutions are pretexting, hacking, advertising fraud;...
4 Pages(1000 words)Research Paper

Intrusion and Hidden Cameras/telephoto lenses

...normal circumstances. The victim may reveal some secrets to the interviewer after taking him in confidence. The victim will know about the trap or the sting operation only after the offender publishes it on Medias. Sting operation is used extensively in all parts of the word to trap corrupted politicians and also the reveal the private lives of the celebrities. Are the media and those who use the tools of the trade such as private investigators protected in the eyes of law? "The Gramm-Leach-Bliley Act is a pretexting law that prohibits "pretexting," the use of false pretenses, including fraudulent statements and impersonation, to obtain consumers personal financial information, such as bank balances....
5 Pages(1250 words)Research Paper

Training and Development in General Occupational Health & Safety at Your Workplace

14 Pages(3500 words)Assignment

Describe a companys obligations to protect that information and the techniques and tools that can use to accomplish that task

... comprises three principal components – the Financial Privacy Rules, the Safeguards Rule and the Pretexting provisions. The Financial Privacy Rules of the Act lays down the conditions and obligations for collection and disclosure of customers’ personal financial information by financial institutions. These rules also govern other companies which may not be financial institutions but receive personal financial information of customers nevertheless. According to these rules institutions are required to give their customers privacy notices that describe and explains the information collection and sharing practices of the institutions. On being apprised of these practices, customers has the right to curtail or limit the sharing... and integrity...
7 Pages(1750 words)Essay

Normative Ethics In Hewlett Packard

...been recruited to spy and to engage in pretexting. Pretexting is a method where a spy would call the phone company and pretend to be the phone owner himself and wanting to get his own records. Patricia had hired investigators to get the records of the directors, so as to keep a close look at their phone conversations and interactions. This formed to be the biggest issue of the company, mainly because this was a complete breach of the code of conduct of the company. Patricia had violated the rules of the company and had caused a breach of the privacy policy of the company. It is also to be noted that the pretexting was mainly done on the personal phones of the directors and not the...
5 Pages(1250 words)Essay

Ethics in Business and Society

...ASSIGNMENT Choose an ethical issue facing multi-national organizations (MNCs) and show how a deontologist and a consequentialist would consider the issue differently and how they might therefore agree or differ as to the appropriate policy for companies to adopt. Abstract This paper is an attempt to discuss the famous business scandal that took place 4 years back in 2005 - 2006 when famous board chairperson of Hewlett Packard named board Ms. Patricia Dunn had been allegedly indulged in Pretexting. In other words, she took assistance of an outside investigative firm mainly because one of the Directors leaked HP’s private board meeting’s discussion and progress. Ms. Patricia Dunn actually wanted to discover who (was the...
8 Pages(2000 words)Assignment

Security Threats and Defenses

...from legitimate institution such as a bank. The mail comes with a form requesting for many details including ATM’s card PIN. 2. Interactive Voice Response The victim required to verify some information and directed to call the bank via a free toll number. The login will be rejected severally ensuring the victim keys in passwords multiple times. 3. Diversion theft This is a trick exercised by professional thieves to con companies. It persuades the responsible person for deliver to deliver it elsewhere. 4. PretextingPretexting aims at engaging a victim in a manner that leads to the victim divulging information or engage in activities which he/she could not be involved in under ordinary...
1 Pages(250 words)Essay

Case Study

...Impacts of ChoicePoint’s Negligence in Information Security Question Oluwatosin’s pretexting trial at Choice point was effective because his credentials were not verified before selling information to him. He pretended to represent legal business as the loophole enabled him to create hoax business accounts, which gave him access to the database with personal financial information (Otto, Anton & Baumer, 2007). The negligence of Check point resulted to violation of privacy. ChoicePoint’s policies were proven to be insufficient and flawed in tackling fraud against the firm as the fraudsters were capable of evading being detected for a whole year. The simple mistakes by the company were the major causes of data breaches. Question 2... The...
2 Pages(500 words)Case Study

HP Settles Spying Case with N.Y. Times

...back in 2005 - 2006 when famous board chairperson of Hewlett Packard named board Ms. Patricia Dunn had been allegedly indulged in Pretexting. In other words, she took assistance of an outside investigative firm mainly because one of the Directors leaked HP’s private board meeting’s discussion and progress. Ms. Patricia Dunn actually wanted to discover who (was the culprit) provided secret information to the personnel associated with print and internet media (Wall Street Journal). The paper will first throw light over the business case and will then demonstrate the ethical considerations by analyzing Utilitarian and Deontological theories of business ethics. It should be pointed out that Ms. Patricia Dunn discovered...
6 Pages(1500 words)Case Study

Should Patricia Dunn Have Been Forced to Resign

...Should Patricia Dunn have been forced to resign? Investigators perform a variety of tasks for different and different reasons. Today, a greatdeal of information is available via databases of public and private records. There is no truth to the thought that databases have all of the information, nor are they as accurate as an investigator needs them to be. There is an art to investigating that has been with us since the earliest beginnings, and it is sometimes the most valuable tool in our lives. This is commonly referred to as pretexting. Pretexting is a crime and is often described as identity theft. Thus the notion that it is used for good has no relevance anymore. In simple terms,...
6 Pages(1500 words)Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Elecitation and pretexting for FREE!

Contact Us