Download file to see previous pages...
The term “social engineering” was coined by Kevin Mitnick, a hacker who spent many years in federal prison for nefarious activities, then became a highly sought-after computer expert, writing books and other journals. (Mitnick, 2002, p. x). The basics of social engineering are simple – a criminal will use psychological and other low-tech techniques to get what he wants, and what he wants is to hack into the secure databases of these companies to steal trade secrets to give to competitors, or other valuable and confidential information. Some of these techniques include “dumpster diving” to get information about a company that he wants to exploit; impersonating colleagues, management or IT professionals on the telephone to get information that he needs, such as passwords and passcodes; befriending employees; and getting a job a the corporation to get all the information he needs.
Social engineers are a huge threat to all corporations, because what they do seems so innocuous. They also are able to exploit very basic mistakes, such as the fact that employees do not always shred sensitive documents, and think nothing of throwing away calendars, employee handbooks, and corporate phone books, all of which are gold-mines to the social engineers who are looking for information to get their foot in the door of a large corporation. And they do a lot of damage. In one study, people using social engineering techniques were able to steal $1 billion of information in one day!
One of the new scams involves live “support” personnel. (Claburn, 2010, p. 1). In this scam, an individual gets a pop-up or other advertisement stating that their computer has been infected with a virus, and that they need to purchase a certain program called Live PC Care to remedy this problem. If the individual is reluctant to buy this Live PC Care program, then they can click on a box to talk with live personnel. What this
...Download file to see next pagesRead More
Cite this document
(“Social Engineering Essay Example | Topics and Well Written Essays - 3000 words”, n.d.)
Retrieved from https://studentshare.org/miscellaneous/1563923-social-engineering
(Social Engineering Essay Example | Topics and Well Written Essays - 3000 Words)
“Social Engineering Essay Example | Topics and Well Written Essays - 3000 Words”, n.d. https://studentshare.org/miscellaneous/1563923-social-engineering.
Among the main social engineering techniques identified by anti-virus providers such as McAfee and Avira as the methods for disabling target networks include 'spear phishing' emails, which are customized to appear as if from trustworthy sources (Kiountouzis & Kokolakis, 2011).
In social imagination, an individual gets to imagine growing up under completely different circumstances that he is in currently. Mooney, Knox and Schacht (pg. 489) points out that the beginning of a sociological imagination can be as simple as the pleasures derived at watching people, giving one an opportunity to know how the society influences people’s lives.
With the cyber age, even the speed of crime has grown by leaps and bounds. It then becomes imperative for the law enforcers also to keep abreast of these changes in their area of operation. Social Engineering This term is used both in sociology and security.
Social Engineering is a professional norm that usually happens in small marketing businesses as well as in the government institutions. The aspect of social Engineering however, is associated with tricks that people uses to share as well as link out the information that in turns makes them susceptible to crime.
It is for this reason that social; engineering has become one very important issue in the combat against crime and most governments countries for that matter are giving it a great priority.
Talking about the economic effects, when crimes occurs, a lot of money is spent by the government in providing all the necessary equipments and logistics to the security agencies in order to be able to combat the crimes effectively.
ome a platform of gathering different networks that allow individual computers to connect with them in a number of ways such as through dial-ups, gateways, ISPs, etc. In other words, only a computer and network connection are the two major requisites for entering into the world
For instance, a person making use of social engineering to burglarize a business or else personal computer network would attempt to attain the confidence of someone who is allowed to have the legal right to use the network so as to
ere has been development in technical expertise, skills and tools since the Stone Age when primitive man developed tools necessary to live, and to protect himself from enemies. However, the development of technology is marked from the time of the Iron Age, when iron replaced