StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Importance of Social Engineering - Term Paper Example

Cite this document
Summary
The paper "The Importance of Social Engineering" focuses on the critical analysis of the major issues in the importance of social engineering. Social engineering is a problem that relates to the manipulation of computer users out of their usernames and passwords…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.5% of users find it useful

Extract of sample "The Importance of Social Engineering"

SOCIAL ENGINEERING (COMPUTER SECURITY) 30th August, 2008 WORD COUNT: TABLE OF CONTENTS 1. Executive Summary………………………………………………………... 3.0 2. Introduction…………………………………………………………………3.0 3. Social Engineering Sinks Security………………………………………….4.0 4. Social Security Attacks against people……………………………………. 5.0 5. Internal Assessment Procedures…………………………………………… 5.0 6. Modes of Common Online Attacks…………………………………………6.0 7. Prevention of Social Engineering Attacks…………………………………. 7.0 8. Integration of Social Engineering and Information System……………….. 8.0 9. Conclusion…………………………………………………………………. 9.0 10. Appendix……………………………………………………………………10.0 11. Reference………………………………………………………………… 13.0 EXECUTIVE SUMMARY Social engineering is a problem that relates to manipulation of computer users out of their username and passwords. In other terms, it includes the human element of engineering attack. The social engineering aspects of cyber crime points out on human weaknesses to encourage the acts of illegal and unauthentic attacks. The report deals with the issues of social engineering attacks in regard to human perspective, the various means through which the information is being hacked and the various preventive measures which can be opted and carried out to curb the ill effects of the menace. The analysis and the research done on the issue, further stresses on creating a mass awareness among the people about the different cyber threats and their corresponding remedial measures. The importance of confidentiality of crucial information such as passwords, id’s etc has been justified in the report. INTRODUCTION The rise of 21st century marked the transition phase of the most global businesses towards a paperless office environment, where the focus shifted the manual to the computerized form of work culture. But at the same time, change brought a number of threats and menace in terms of one of the biggest issues of the current businesses, the social engineering used among the hackers for cracking techniques that rely more on human weaknesses rather than technology itself. The aim or motive of such attacks was getting access to passwords or other relevant information by tricking people for carrying out illegal or criminal activities. FBI and other security experts hold a firm view that majoirity of threats orginate from the internal working environment or employees who have been granted additional privileges or authorities to company’s information. People who have an urge for power and control over other individuals exhibit the social engineering skills .computer hacking is the modern form of social engineeering and the most hi tech of all (Villamor E, 2008). The fundamental problem with online social networking services especially is that there are no criteria or authentication for evidence or proof of an individuals identity, which keeps at stake both our privacy and information. SOCIAL ENGINEERING SINKS SECURITY Social engineering attacks are driven by financial needs where hackers try to obtain confidential information about the users to access accounts. Social engineering is the root cause to ideas behind phishing and pretexting where hackers gain confidence of people who are careless or blindly trust others helping them to take undue advantage. Hackers know the weak point which can be trashed, none other than the human element itself. No matter how advanced the technology may get, the human element opens up all the loop holes to make the social engineering attacks more easier. Destruction of personal information is too less a crime, now a well formulated and planned social engineering attack could destroy companies on the whole. To make it more prominent, a case study was circulated on the net, where a credit union employeed a ethical hacking company to test the compnay security practices. The security consultants intentinally dropped few thumb drives, in utter curiousness people plugged in the devices to inject the trojan viruses affceting the entire system. In this situation one could clearly differentiate the weaknesses and unprofessional attitude of the people towards the security and safety aspects and technologies(Linda M,2006). SOCIAL SECURITY ATTACKS AGAINST PEOPLE Social engineering is the human side of cracking into a corporate network. To launch an attack, human interaction is preferred because they are the easy targets. Social Engineering, is generally referred to as “people hacking,” to gain information about usernames, passwords, personal identification codes (PINS), credit card numbers and expiration dates etc. It’s an attack against the people as hackers are more inclined towards extracting information for personal advantage rather than system failures. Web spoofing is an eminent problem involving e-mail frauds and web sites to grab the private information of the users. To safeguard people, social engineering tactics could be introduced to increase internal awareness and reduce future threats. Education and supervision are the only modes to mitigate the internal security risks. The best protection against social engineering attack is creating awareness by users through education. People reveal information to social engineers on account of trust, faith and social relations unrealizing the fact that they have been victimized, even after the hacker uses the information given them for illegal and harmful reasons. INTERNAL ASSESSMENT PROCEDURE A small case study would reflect the importance of incorporating an internal assessment procedure for safeguarding oneself from the social engineering attacks. A woman calls a company’s help desk to get her password because she’s forgotten it and needs it urgently to fix up her deadlines on a big advertising project. The help desk worker feels sorry for her and quickly resets the password -- unwittingly giving a hacker clear entrance into the corporate network. Meanwhile, a man is in back of the building loading the company's paper recycling bins into the back of a truck. Inside the bins are lists of employee titles and phone numbers, marketing plans and the latest company financials. This example reveals the fact of human weakness overpowering the technological loopholes. To overcome such issues, all companies need to set up an internal assessment procedure, whereby people could be properly directed, trained and educated to handle the security and information safety issues. To accomplish the task a complete internal assessment procedure could be undertaken whereby the future projects are identified and a social engineer is appointed for overall supervision of the project and handling of all security issues and aspects related to the project including the employee and the systems as well. The project engineer must be represented as a significant project resource that can perform all social engineering tactics to safeguard the information and providing solutions to remediate the problems. The report complied by the engineer at the end of the process must be forwarded to the management for further consideration.( Bevis J, viewed on 30th August, 2008) MODES OF COMMON ONLINE ATTACKS The most common online attacks featured in the current issues creep up from the e-mails, pop up applications, instant messages that flash on the screen and subvert computer resources. The most common flaws noticed in the usage of the system which helps in information hacking are firstly the presence of active links and excessive information about the company profile, details of the employees etc which facilitates the hacking process. Phone scamming is very common now days where caller’s information could be hacked through phones. Dumpster diving is the easiest mode to retrieve information stored in trash ((Meyer, Eric, 2005). Phishing is a form of social engineering attack that uses email and web sites for extracting personal information. Attackers may send email representing a renowned company requesting for information to gain access to the accounts. For instance, several cases have happened in the past where the hacker was successful in obtaining information by conveniently misguiding the other person. Once, using a "war dialer" together with a call to the company's computer help desk, the hackers extracted the phone numbers of the company modems and were able to gain access to the systems. PREVENTION OF SOCIAL ENGINEERING ATTACKS Installation of strong anti virus programs in the system is not enough to combat the threat of attacks. A complete and through security solution is required to provide total digital immunity for protection and security of the systems which includes a pro-active approach to prevent any loss of information from the anticipated perils ((Mansukhani M,2007). Use of features such as e-scan, content security, firewall software’s, advanced anti virus programs with regular updates, e-conceal and many more to name have been undertaken as solutions to prevent the social engineering attacks. Use of spoof guards against the identity theft could be used to examine web pages and generate alarms in suspect to any attack. Assessment of threats is must for any organization, they must know and where the information could travel in and out of the organization and must ensure that people are adequately trained and aware about all the potential threats possible and try to cooperate in reducing and eliminating the negative impact of anticipated as well unanticipated risks. Apart from this companies should take care to put limited information on the web sites and avoid creating active links to email addresses. Being cautious and alert when answering IT related questions on phone could help in avoiding phone scamming. Shredding services should be used to prevent dumpster diving. Proper logging off the individual workstation lessens up the chances of hacking though not completely eradicating them. One can prepare a strong defense system against the social engineering attacks by including instructions and alerts in the security policy of the company. Many of the people consider social engineering attacks as an attack to their proficiency or intelligence , what needs to be done at this stage is creating awareness about security and sensitivity to information. INTEGRATION OF SOCIAL ENGINEERING AND INFORMATION SYSTEM Information security is much more than patching computers, it involves a combined and a unanimous effort from all aspects such as the physical security, users training and the network policies. Information security training is a prime task for any organization to impart to its employees for ensuring better security plans and incorporating as many number of security layers from top to bottom levels of system operations (Meyer, Eric,2005). The usefulness of the information and the difficulty level in acquiring the information depends upon the strength of the security layering of the company. Thus, the social engineering must be integrated with the information assessment procedures of the company. Meticulous planning along with carefully drafted objectives is a critical tool in defining an organizations security plan. Spreading the word of caution, conducting frequent tests for detection of threats and their meaningful and timely analysis can measure the effectiveness of the people centric control rather than the application of conventional and outdated measures of security. CONCLUSION Social Engineering is just a method to exploit the casual and untailored attitude of people which could only aggravate the security issues and grow dodgier as people "forget" to make security their priority. Updating security policies and imparting training to people can certainly minimize the impact of social engineering attacks. Personnel should understand the magnitude of risks and the information at stake. It is important that it is stressed to all users the importance of keeping information confidential. The fact still lies that social engineering has penetrated deep into our systems and it works to its highest peak (Morill D,2006), acknowledging the ability of the humans to be fooled easily, such attacks are difficult to be completely eradicated or wiped, but a mass awareness to the cause can help in restriction of spread of the networking epidemic. APPENDIX COMMON ONLINE ATTACKS REFERENCES 1. Morill D, 12th May,2006, Social Engineering still damaging to Computer Security , Viewed on 30th August, 2008, http://it.toolbox.com/blogs/managing-infosec/social-engineering-still-damaging-to-computer-security-13301 2. Mansukhani M, Mar 27, 2008, Social Engineering Threats & Information Security Issues In The Virtualized Environment, Viewed on 30th August, 2008, http://www.mwti.net/products/pdfs/1888pressrelease_com_Social_Engineering_Threats_Information_Security_Issues_In_The_Virtualized_Environment.pdf 3. Meyer, Eric "Computer Security - Preventing Social Engineering Attacks." Computer Security - Preventing Social Engineering Attacks. 29 Dec. 2005. EzineArticles.com. Viewed on 30 Aug 2008 . 4. Linda M, How social engineering sinks security. 19th September, 2006, Viewed on 30th August,2008, http://www.networkworld.com/columnists/2006/100906musthaler.html 5. Villamor E, Social Engineering in Today’s Society, 14th July,2008, Viewed on 30th August, 2008, http://www.socyberty.com/Sociology/Social-Engineering-in-Todays Society.168431 6. Bevis J, Extreme Social Engineering, Viewed on 30th August, 2008, http://jtbevis.files.wordpress.com/2007/09/article-social-eng-v-7921.pdf. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(The Issues of Social Engineering Term Paper Example | Topics and Well Written Essays - 1750 words, n.d.)
The Issues of Social Engineering Term Paper Example | Topics and Well Written Essays - 1750 words. https://studentshare.org/information-technology/2043294-social-engineering-computer-security
(The Issues of Social Engineering Term Paper Example | Topics and Well Written Essays - 1750 Words)
The Issues of Social Engineering Term Paper Example | Topics and Well Written Essays - 1750 Words. https://studentshare.org/information-technology/2043294-social-engineering-computer-security.
“The Issues of Social Engineering Term Paper Example | Topics and Well Written Essays - 1750 Words”. https://studentshare.org/information-technology/2043294-social-engineering-computer-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Importance of Social Engineering

Social Engineering Attacks and Counterintelligence

The paper "social engineering Attacks and Counterintelligence" states that a malicious social engineer is like any other criminal, who has a motive and a goal.... 'social engineering is defined as the process of deceiving people into giving away access or confidential information' (social engineering Defined).... Max Kilger, co-author of the Honeynet Project identifies the motivators for non-ethical computer activity which can also be applied to social engineering; these are money, entertainment, ego, cause, entrance into a social group, and status within that social group (Typical Goals of a Social Engineer)....
5 Pages (1250 words) Essay

Social Engineering Attacks and Counter Intelligence

he Potential Implications of social engineering and Counter Intelligence in respect to the Leaked Iraq War Logs and Afghan War Diary It is probable that social engineering was primarily used to trick Bradley Manning who is the 22-year-old U.... The paper "social engineering Attacks and Counter Intelligence" discusses that a relatively large number of various suspicious events tend to occur within most computer systems and enterprise networks nearly every day and successfully manage to go undetected....
5 Pages (1250 words) Case Study

Social Engineering

The basics of social engineering are simple – a criminal will use psychological and other low-tech techniques to get what he wants, and what he wants is to hack into the secure databases of these companies to steal trade secrets to give to competitors, or other valuable and confidential information.... Then there will be an analysis of the research, and then a discussion of what I believe about the need to balance legitimate defenses against social engineering with the need to not go overboard and make people feel like common criminals or unwelcome....
12 Pages (3000 words) Essay

Gender, Social Exclusion and Technology

When gender is viewed in this perspective, it is not some genetic traits or roles that we possess biologically, but is rather a output of social influence that is manifested by what we do or how we behave.... This paper 'Gender, social Exclusion and Technology' postulates that though technology has to a very great extent been aligned to gender bias and social exclusion based on gender, the ICT revolution holds the potential to erase such biases and provide equal opportunity to both sexes....
11 Pages (2750 words) Essay

The Importance of an Engineering Course Education

The paper "the importance of an Engineering Course Education" discusses the perception of the future.... In the past few years, people used to ignore the complex aspects of an individual and emphasized the importance of certificates and academic achievements of an individual.... Harris was a great wizard in the engineering field and the old saying that winners do not do different things but rather do things differently fits him perfectly.... Harris attended an interview in a certain engineering company....
8 Pages (2000 words) Essay

Sustainability and Ethil Issues in Mechanical Enginring

The "Sustainability and Ethiсаl Issues in Mechanical Enginееring" paper states that the ethics of the engineers need to be emphasized among the engineering professionals so that they can be of great importance to society.... Sustainability in the context of mechanical engineering needs to be incorporated in the design processes and the provision for future maintenance of the machine.... Sustainability in the field of mechanical engineering means the production of machines that are friendly to the environment and should keep the existing system of the environment in operations....
7 Pages (1750 words) Coursework

Knowledge in the Engineering Field

This paper "Knowledge in the engineering Field" tells that I am creative individuals and often think in a contemplative way regarding various issues.... The courses that I study in an engineering course deals with some tactical and operational issues.... My principle aim as an intern was to garner an understanding of the engineering related to specific issues, modelling the problem accordingly and finding a reasonable optimal solution.... Principally, my main goal lies in disseminating knowledge in the engineering field....
7 Pages (1750 words) Essay

Cultural Differences in Engineering Organizations

The scope of this paper " Cultural Differences in engineering Organizations" is the analysis of the cross-cultural challenges within engineering organizations.... The paper gives an overview of engineering innovation in Japan and Australia, explaining cultural differences.... Most importantly, engineering fields such as civil, mechanical, electrical, chemical, and petroleum engineering fields have evolved to engage the use of a diversified workforce....
10 Pages (2500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us