StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Social Engineering - Essay Example

Cite this document
Summary
Included in the research portion is an extensive review of a case study that was performed on a number of different companies that exploited these companies…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.7% of users find it useful
Social Engineering
Read Text Preview

Extract of sample "Social Engineering"

Download file to see previous pages

The term “social engineering” was coined by Kevin Mitnick, a hacker who spent many years in federal prison for nefarious activities, then became a highly sought-after computer expert, writing books and other journals. (Mitnick, 2002, p. x). The basics of social engineering are simple – a criminal will use psychological and other low-tech techniques to get what he wants, and what he wants is to hack into the secure databases of these companies to steal trade secrets to give to competitors, or other valuable and confidential information.

Some of these techniques include “dumpster diving” to get information about a company that he wants to exploit; impersonating colleagues, management or IT professionals on the telephone to get information that he needs, such as passwords and passcodes; befriending employees; and getting a job a the corporation to get all the information he needs. Social engineers are a huge threat to all corporations, because what they do seems so innocuous. They also are able to exploit very basic mistakes, such as the fact that employees do not always shred sensitive documents, and think nothing of throwing away calendars, employee handbooks, and corporate phone books, all of which are gold-mines to the social engineers who are looking for information to get their foot in the door of a large corporation.

And they do a lot of damage. In one study, people using social engineering techniques were able to steal $1 billion of information in one day! One of the new scams involves live “support” personnel. (Claburn, 2010, p. 1). In this scam, an individual gets a pop-up or other advertisement stating that their computer has been infected with a virus, and that they need to purchase a certain program called Live PC Care to remedy this problem. If the individual is reluctant to buy this Live PC Care program, then they can click on a box to talk with live personnel.

What this

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Social Engineering Essay Example | Topics and Well Written Essays - 3000 words”, n.d.)
Retrieved from https://studentshare.org/miscellaneous/1563923-social-engineering
(Social Engineering Essay Example | Topics and Well Written Essays - 3000 Words)
https://studentshare.org/miscellaneous/1563923-social-engineering.
“Social Engineering Essay Example | Topics and Well Written Essays - 3000 Words”, n.d. https://studentshare.org/miscellaneous/1563923-social-engineering.
  • Cited: 0 times

CHECK THESE SAMPLES OF Social Engineering

Social Engineering Attacks and Counter Intelligence

Social Engineering Attacks and Counter Intelligence Name: University: What is Social Engineering?... Social Engineering is seen to essentially describe the non-technical intrusion that is seen to primarily rely on human interaction with the prime objective of essentially ticking other persons to break the established normal security procedures and provide them with either the confidential information its self or access to it (Mann, 2010).... Social Engineering is seen to comprise of a collection of various techniques and tools that are seen to range from psychology, ethical hacking and negotiation....
5 Pages (1250 words) Case Study

Criminal Law as a product of Social Engineering

When it comes to policies of Social Engineering ,the ideas of experts in the social sciences are needed in order to structure out the policies in such a way to be able to achieve its set goal or purpose .... hellip; It is for this reason that social; engineering has become one very important issue in the combat against crime and most governments countries for that matter are giving it a great priority. Talking about the economic effects, when crimes occurs, a lot of money is spent by the government in providing all the necessary equipments and logistics to the security agencies in order to be able to combat the crimes effectively....
3 Pages (750 words) Essay

Ethical Hacking as Effective Coping of Criminal Hacking

Since its beginning in the year 1996 until today, the internet has been successful in establishing an enormous network of millions of computers across the seven continents.... In addition, the internet has now not remained a single network (Erickson, pp.... 23-25); however, has now… ome a platform of gathering different networks that allow individual computers to connect with them in a number of ways such as through dial-ups, gateways, ISPs, etc....
5 Pages (1250 words) Essay

Social Engineering: Examining the Latest Scams

In scenario of computer security, Social Engineering is a paradigm that illustrates a non-technical type of interruption that depends significantly on human interaction as well as frequently engages scamming other people to break standard security measures.... A social engineer… For instance, a person making use of Social Engineering to burglarize a business or else personal computer network would attempt to attain the confidence of someone who is allowed to have the legal right to use the network so as to They may be known as the authorized worker by having a number of types of urgent problem; social engineers frequently depend on the usual concern of people and on their faults....
17 Pages (4250 words) Essay

Technology and Social Engineering

However, the development of technology is marked from the time of the Iron Age, when iron replaced Technology and Social Engineering School/ Whether Technology will Always Find a Solution to Human Problems Technologyis the core aspect of development.... Whether Technology Fixes can be Used to Replace Social Engineering Social Engineering is the organizing and “channelling of environmental and social forces to create a high probability that effective social action will occur” (Podgorecki, Alexander & Shields, 1996, p....
2 Pages (500 words) Essay

Reverse Social Engineering Attacks in Online Social Networks

The writer of the essay "Reverse Social Engineering Attacks in Online Social Networks" suggests that in order to minimize the effects of RSE, the networking sites should only suggest possible friends when there is a strong connection that exists between them.... hellip; A social networking structure comprises of nodes that are represented by individuals and is also one of the most widely growing phenomena to date.... social networking sites such as LinkedIn, Facebook and Twitter, which are, being utilized primarily for communication, oriented either upon business related ventures, friendship....
4 Pages (1000 words) Essay

Cyber crime,the social engineering

Social Engineering refers to the use of confidential tricks to divulge Cyber Crime By Introduction The term cybercrime refers to any unjustified act that relates to a computer and a network.... Social Engineering refers to the use of confidential tricks to divulge information from an organization through people, though it differs from a traditional term ‘con'.... Social Engineering is a widespread problem through the internetToday Social Engineering has become a nuisance to many people as the cybercrime techniques improve and spread widely....
2 Pages (500 words) Essay

Obtaining Information of Interest

… The paper “Obtaining Information of Interest - Social Engineering, Phishing, Trojan Horses, and Espionage”  is a comprehensive example essay on logic & programming.... The paper “Obtaining Information of Interest - Social Engineering, Phishing, Trojan Horses, and Espionage”  is a comprehensive example essay on logic & programming.... In view of this, it becomes easier to obtain commercially sensitive information from the competitors through attack methods mainly, Social Engineering, phishing, Trojan horses, and espionage....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us