StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Social Engineering: Examining the Latest Scams - Essay Example

Cite this document
Summary
The essay "Social Engineering: Examining the Latest Scams" focuses on tech critical analysis of the idea of social engineering. In this scenario, this research is aimed to assess some of the main web-based scams that make security much harder to manage proficiently…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.6% of users find it useful
Social Engineering: Examining the Latest Scams
Read Text Preview

Extract of sample "Social Engineering: Examining the Latest Scams"

Social Engineering Analysis of latest scams Table of Contents Introduction In scenario of computer security, social engineering is a paradigm that illustrates a non-technical type of interruption that depends significantly on human interaction as well as frequently engages scamming other people to break standard security measures. A social engineer executes what used to be acknowledged a "con game". For instance, a person making use of social engineering to burglarize a business or else personal computer network would attempt to attain the confidence of someone who is allowed to have the legal right to use the network so as to acquire them to disclose information that compromises the networks safety. They may be known as the authorized worker by having a number of types of urgent problem; social engineers frequently depend on the usual concern of people and on their faults. Appeal to egotism, request to power, and outdated questioning are classic social engineering methods (TechTarget, 2009; Allen, 2006). The concept of social engineering is the use of getting secret information through handling of legal users. A social engineer will usually utilize the Internet or phone to scam someone into disclosing secretes data as well as information or else acquiring them to perform any thing that is not lawful or against the normal rules. Through this technique, social engineers make use of the standard propensity of a person to keep faith on his or her word, relatively than making use of computer safety gaps. In addition, it is normally established on that “clients are the fragile link” in safety as well as this standard is what formulates social engineering practicable (TechTarget, 2009; Allen, 2006). This paper presents a comprehensive analysis of the idea of social engineering. In this scenario this research is aimed to assess some of the main web based scams those make security much harder to manage in proficient manner. This research is aimed to assess some of the prime and recent scams regarding social engineering paradigm. This paper will also assess main attacking areas along with possible counter techniques to secure the social engineering attacks. 2- Social Engineering: An overview Social engineering is fundamentally the technique of taking admittance to the systems, networks, buildings or else data by making use of the human mental characteristics, before breaching in or in other words making use of the practical hacking methods. For instance, in place of attempting to find out software flaw, a social engineer might call a worker plus pretense like an IT support person, attempting to deceive the worker into revealing his code word. Well-known hacker Kevin Mitnick facilitated to popularize the thought of social engineering in the nineties’, while the initiatives as well as a lot of the methods have been around as long as there have been some kind of scam or cheat performance (Goodchild, 2010). We can say that social engineer is a hacker who employs brains in place of computer strength. Hackers take prohibited entry to the network of system and data centers as well as make believe to be the clients who have lost their password or else show up at a business or ecommerce website and only expect someone to keep an access open for them. Other shapes of social engineering are not therefore obvious. Hackers have been recognized to produce phoney websites, feedback forms or lotteries that ask users to enroll a password (Allen, 2006; TechTarget, 2009). Social Engineering is employed between hackers intended for breaking methods that rely on weakness as well as flaws in physical safety somewhat than software; the intention of this scam is to burglarize the people data as well as information plus revealing passwords or else other secrete data and information that negotiates a target system’s security (Attiyah, 2010) One more feature of social engineering depends on peoples incapability to carry on through a culture that depends greatly on the data and information technology. Additionally, the social engineers depend on the reality that people are not conscious of the significance of personal data as well as information they keep and are not so much cautious regarding its caution. Often, social engineers will explore dumpsters intended for important data and information, learn admittance codes through looking over someones shoulder (that is also known as the shoulder surfing), otherwise get benefit of peoples intrinsic partiality to favor secret codes as well as passwords that are quite significant to them though these passwords are able to be simply guessed. Security professionals and experts recommend that as our culture is turning out to be more reliant on information; social engineering will continue the maximum danger to a number of privacy as well as security system. Avoidance comprises educating people regarding the worth of data plus information, training and convincing them to defend it, as well as expanding peoples consciousness of how social engineers work (TechTarget, 2009). 3- How we are at risk? Social engineering has confirmed to be extremely successful means for illegal activities to "acquire inside" in our business data or else system. In case of a social engineer’s attack has a trusted staffs password is stolen or hacked; now social engineers is able to cleanly log in as well as interfere around intended for business as well as sensitive information plus data. Another attempt might be to scam somebody out of an admittance card otherwise code so as to physically obtain access inside a facility, whether to get entrance into business plus corporate data, harm people or else pilfer corporate assets (Goodchild, 2010). The Internet is rich ground intended for social engineers searching to give way secrete as well as confidential information and passwords. The main flaw is that a lot of users frequently do yet again the utilization of a simple password on each account: Travelocity, Yahoo, and Gap.com, whatsoever. Consequently once the social engineer gets one secret password, he or she is competent to possibly obtain access into numerous accounts. One approach in that hackers have been recognized to get this type of password through on-line forms over the Internet: they are able to drive out a number of types of sweepstakes information as well as inquire the client to insert a name (comprising e-mail address – that way, she might yet obtain that person’s company account password as well) as well as password in an illegal way. These emergences are able to be transmitted in the course of e-mail otherwise in the method of US Mail. US Mail offers an enhanced appearance that the sweepstakes could be a lawful enterprise. One more technique hackers can get on-line data and information is by showing to be the network administrator, transmitting an e-mail in the course of the network and demanding for a client’s password. This form of social engineering attack does not normally work, as users are normally more conscious about hackers who are online, however it is something of which to get awareness. Also, pop-up windows are capable to be set up through hackers to look like a fraction of the network as well as insist that the client re-enter his password and username to protect a number of types of problems. In this situation, the majority of users should be acquainted with not to transmit passwords in plain text, however it never hurts to encompass a sporadic prompt of this simple protection measure as of the System Administrator. Yet better, system administrators might desire to advise their users besides disclosing their passwords in some manner other than a face-to-face discussion by a colleague who is recognized to be a trusted official (Granger, 2001). E-mail is as well able to be employed for extra direct ways of taking admittance to a system. For example, mail attachments transmitted from someone’s computer is competent to carry diverse types of worms, numerous viruses, malwares and Trojan horses. A premium instance of this was an AOL hack, noted through VIGILANT: In that scenario, the hacker identified himself as AOL’s technical support plus spoke via the support person intended for an hour. All through the chat, the hacker stated that his car was intended for public sale inexpensively. The technical supporter was paying attention; therefore the hacker transmitted an e-mail message and attachment ‘by an image of the car’. In place of car image, the mail executed a backdoor attack that launched a link as of AOL all through the firewall (Granger, 2001). Analysis 4- How social engineering is accomplished This section presents a detailed analysis of some of the vital aspects of how social engineer is able to launch an attack against a network or a person. In this scenario I will assess and analyze some prime types and ways those can be proficiently used by the Social engineer for the business as well as corporate systems and security contravenes. Social engineering is carried out in the course of a lot of accomplishments comprising dumpster diving as well as arguments. Social engineering comprises: (Kee, 2008; Turban et al., 2005) Telephone: by means of telephones to make contact with persons of a business and then to convince them to reveal secret data and information. Online: Convincing or else collecting information in the course of utilization of an online chat forum, emails, or else some other techniques that our business can utilize to intermingle online by means of the public. 5- Online Attacks Types This section presents a detailed analysis of some of the main aspects of web based attacks from the social engineering practice. In discussing the social engineering practice via web based working in the central theme in this research. This section will assess how social engineering is working through phishing and pop-ups through directly connected computers or else online. People knowledge has increased above the previous some years concerning phishing as well as pop-ups. As majority of them are able to be ignored immediately by making use of a popup blocker and upright spelling organizer, a number of them are able to be more persuasive. Thus, it is essential to think about the information that we provide over the internet (Kee, 2008). 5.1- Dumpster Diving Searching for data as well as information disposed by corporation’s workers Shoulder surfing: basically searching over someone’s shoulder as they are working on a PC. This could be performed in short variety and large variety by means of a couple of binoculars. As dumpster diving is very inactive as well as is able to be in fact performed as we are sleeping, this is additional of an explanation of what is able to take place. A social engineer was away at the back of a business he was profiling pushing about in their dumpster. The dumpster was at large and had no obstacle on it thus he watched down in the garbage be able to and discovered a bag that comes into view to have plenty of papers in it. Within were receipts, invoices as well as additional significant documents. The business before that week had a number of maintenance performed on a laser printer as an invoice acknowledged (Kee, 2008). 5.2- Reverse social Engineering This is a more superior technique of social engineering as well as is approximately forever successful. A hacker will have had to formerly performed investigation and previously have a number of amount of fortune by means of preceding attack (whether social engineering otherwise through hacking). Reverse social engineering is a technique where a hacker is able to obtain their targets (victims) to take them back relating to something a hacker can have formerly. As a victim is calling the hacker, the victim is before now at the mercy of the hacker, as well as it is approximately impractical intended for the victim to inform that they are being assaulted if they have previously legally arranged the call-back to the invader. A social engineer is able to utilize a blend of the entire of these techniques to achieve his ultimate objective. Actually, the majority of flourishing tricks will include as a minimum 2 of these techniques (Kee, 2008). The concept of reverse social engineering is a extra advanced technique of social engineering as well as necessitates a number of inspection prior to a successful attack is utilized. It engages the user in inquiring for help as of the attacker hence the victim is at the clemency of the attacker/hacker/social engineer. This type of attack can be regarded as one of the worst kinds of attacks to perceive for the reason that when a target victim calls the social engineer, they have undoubtedly they are who they declare they are as well as will the majority possible not query them in any way. There are a lot of techniques that a social engineer can be able to obtain a user to speak to them for support or help (Kee, 2008). 5.3- Persuasion Persuading a lot of individuals to provide the private data and information either by encouraging them we are individuals who is able to be believed otherwise through merely requesting it (Kee, 2008). It is obvious that hackers themselves are technology social engineers from a psychological perspective, highlighting how to produce the supreme psychological circumstances intended for the attack. Fundamental techniques of persuasion attacks comprises: ingratiation, impersonation, diffusion as well as conformity of data plus information responsibility, and plain old friendliness. In spite of the technique employed, the major intention is to encourage the person to reveal the data plus information that the social engineer is actually an individual who can be trusted by that sensitive information. The further significant key is to never request intended for extra information at a time, however to request for a little from every person so as to advocate the emergence of a comfortable association (Granger, 2001). 5.4- Shoulder Surfing In case of another social engineering attack that is known as the shoulder surfing, is a way in which social engineer or known as attacker observes what we are performing as well as is able to as well be performed distantly (together through software plus cameras). This is as well a typically inactive method. For example, if we work at a public site plus have to work on a computer of several kinds (similar to a POS register) anybody is able to observe us in case of entering our employee ID as well as password to mount the register. As well, if we are in a public site with a notebook computer or a laptop, be cautious of what is on our system or else laptop too. It can be evident, however a number of people leave usernames as well as passwords tied to their systems, plus not simply are able to be witnessed in public, if the laptop is pilfered, they beforehand have identification. ATMs are as well employed an enormous deal plus occasionally cannot forever be as private as we all imagine. A social engineer by means of a couple of binoculars can be concealing in the bushes observing us in case of entering your pin code, as well as can proceed to obtain a sight of our name. If we occur to be in a PC, there will almost certainly be computer cameras just about. It is necessary for all of us to recognize that those cameras could be public as well as anybody by means of an internet link can able to logon, zoom in, plus observe what anybody in some place or room is performing. The most excellent thing to perform is be conscious of our environment; we never be acquainted with who can be observing us (Kee, 2008). 6- Social Engineering Latest scams This section will discuss latest Social Engineering scams. In this scenario I want to declare that above mentioned Social Engineering scams are still working competently however taking diverse new ways and methods for strongly targeting and scamming users. In this regard I have outlined some new as well as recent ways and techniques used by the Social Engineers for scamming people (Posey, 2003): 6.1- Password conundrum In case of Password conundrum Social Engineering attack the attacker takes advantage of the public psyche that most of the people are not able to memorize long, intricate and a lot of diverse types of passwords. This happens because people are not able to remember a lot of additional passwords than they are familiar with. In addition, through so various passwords to memorize, it is not rare for people to utilize the similar password in several sites to keep as of having to memorize numerous diverse passwords. For instance, a user may perhaps utilize the similar password at workplace as to access the web at his residence. In this scenario Social Engineer tries to hack or else get that password to generate difficulty for the user and then cause them an enormous damage (Posey, 2003). 6.2- Phishing Phishing is a well known Social Engineering technique for hacking along with generating problems for the people in case of smooth working at job otherwise at home. In case of Phishing a Social Engineer dishonestly gets people data and information that are confidential and secret. Normally, the phisher transmits an e-mail that comes into view from a legal business or a bank, or credit card corporations, asking for "confirmation" of information and advice of a number of terrible outcomes if it is not presented. The e-mail frequently holds a website link to a fake website page that appears to be legal. In addition, through the business logos as well as content Social Engineer has a profile requesting all from a home address to an ATM card number and its PIN code information. After that attacker hacks all the information and causes a terrible damage to the victims (Ollmann, 2007). 6.3- IVR or phone phishing The Social Engineering method of attack employs a rogue IVR (Interactive Voice Response) framework to restructure a legitimate sounding duplicate of a bank or else other corporate interactive voice response system. In case of such attack a victim is encouraged (normally by means of a scamming or phishing e-mail) to connect to the "bank" by means of a (perfectly charge free) number offered so as to "confirm" data as well as information. A normal system will refuse log-ins time after time; making sure that the victim enters passwords otherwise PINs many times, frequently disclosing numerous different PINs and passwords. Further then advanced systems move the victim to the attacker demonstrating like a customer service agent intended for additional questioning. In this way the attacker or Social Engineer gets all the secret information and then uses it for attacking or taking some sort of wrong actions (Maggi, 2010). 6.4- Baiting Baiting is similar to the real-world Trojan horse attack of virus that employs physical media and relies on the interest or else voracity of the user who is an actual casualty of this Social Engineering attack. In case of such attack the Social Engineer launches an attack, and leaves a malware (some type of virus) that infected CD ROM, floppy disk or else USB flash drive in a site sure to be set up (elevator, bathroom, parking lot or sidewalk), provides it a lawful appearance and snooping-interest tag, and just waits intended for the victim to utilize the contrivance or device. So when user uses the device then attacker takes out the all necessary information that can be later on used for attacking and causing enormous damage to the personal information and data (Cyberwarz1, 2010) and (NextGenUpdate , 2010). 6.5- Quid pro Quo In this type of Social Engineering attack an attacker calls telephone or mobile random numbers at some business or else corporation claiming to be calling back as of technical support member. In fact they will hit somebody by means of a legitimate difficulty, gratified that an imperative individual is calling back to facilitate them. The attacker will "aid” to determine the difficulty as well as in this overall procedure have a close look as user type commands that offer the attacker admittance or launch some sort of malwares. Later than establishing the malware in the system the attacker can get full access to get all the secret information as well as data and thereafter can cause huge damage to system working and performance (Cyberwarz1, 2010), (Leyden, 2010) & (Anon., 2010). 7- Social Engineering Target and Attack The fundamental objectives of social engineering are the similar as hacking in common: to achieve illegal right of entry to business arrangements as well as systems or information so as to consign deception, business surveillance, network intrusion, identity stealing, or just to agitate the network or else a particular system. Normal targets comprise telephone businesses as well as replying services, bigwig businesses and economic organizations, armed forces and government organization plus sanatoriums. The web and Internet explosion had its share of industrial business assaults in establishment as well, however attacks normally spotlights on bigger things (Granger, 2001). Discovering superior, true-life instances of social engineering attacks is hard. Target businesses either do not desire to confess that they have been mistreated (following the entire, to admit a crucial security violation is not simply ill at ease, it can be harmful to the business’s status) plus/or the attack was not effectively acknowledged consequently that no one is actually certain whether there was a social engineering attack or not (Granger, 2001). Since for why businesses are attacked in the course of social engineering, though, it’s frequently a simpler means to achieve illegal access than are a lot of types of technological hacking. Still for technical personnel, it’s frequently a great deal easier to immediately pick up the telephone plus inquire somebody intended for his/her password. And the majority frequently, that’s immediately what a hacker will usually practice. Social engineering assaults happen on two stages: the psychological and physical. Primarily, this paper has assessed both types of attacks in this paper. This research has mostly concentrated on the psychological attacks those are launched through the web. In case of physical attacks people are affected at office or place of work, at your refuse, at the phone as well as on-line too. In case of workplace based social engineering attack, the hacker is able to just barge in the entrance, similar to in the movies, also imagine being a maintenance employee/personal or consultant who has admittance to the business. Then the burglar walks in the course of the office in anticipation of he/she discovers a few passwords located around as well as comes out as of the building by means of plenty of information to use the network as of home afterward that night-time. One more advanced method to acquire authentication data and information is to simply stay there and look at an unaware worker as he/she types in his password. After getting password he can use it in a wrong way to access and damage the business and cause some destructive outcomes. Here both psychological and physical stages are extremely dangerous and can offer huge risk for some privacy along with personal uniqueness. They can commence some terrible offence through using that secret information on the identity of some other person from whom that was taken (Granger, 2001). 8- Counter Measures for Social Engineering Attacks In this section I will present some of the main counter measures for social engineering attacks. In this scenario I will try to outline some of the main aspects along with areas that need to be considered while making sure that we are not overwhelmed through some social engineering attacks. Here we are surrounded through huge information as well as data that can be useful for us in case of better business and personal information management. In this enormous technology based environment it is really tough to manage the personal security in a better way. In this scenario we are always having the likelihood of the human aspect being inclined through a political, public and/or cultural happening. Yet, as by means of some danger, there are means in that to minimize the probability of accomplishment. This could be attained by having an approval of the danger, as well as information of together the methods that could be employed and the counter-measures that are able to be put into practice (Allen, 2006). Below I have listed some of the prime and valuable techniques along with methods those can be used for the enhanced handling and management of security of personal and business aspects. Here the techniques given below are used for the handling and management of different types of daily attacks that can influence the overall security along with privacy of business (Allen, 2006): Do not disturb usual routine processes Use some suitable software system for personal along with business security that are capable and robust enough to stop a range of nasty events happening together Establish some enhanced core controls arrangement that have the capability to stop and recognize attacks Implement some effective security policy that can educate as well as offer a better opportunity for recognizing any type of attacks Also establish some effective and enhanced physical security arrangements and procedures Increase awareness among business and system users in case of personal and business security through offering them proper education along with training Good security architecture: smart infrastructure design Limit data leakage through the business network plus systems Implement some enhanced Incident response strategy 9- Conclusion Social engineering is a way of controlling the people into carrying out activities or revealing secret data and information, instead of by breaking in or making use of technical hacking methods. This paper has presented a deep analysis of some of the main aspects regarding the implementation of some effective procedures in addition to areas in case of social engineering context. This research has offered a comprehensive overview of some of the vital areas and issues of some of the main fundamental techniques and methods used for security and privacy violations or breaches through the social engineering. In this connection, I have also pointed out some of the modern social engineering breaching techniques along with methods used for assaulting someone’s personal and business security. This research paper has also suggested few security measures and aspects those can be implemented to restrict as well as stop social engineering based scams. Bibliography Allen, M., 2006. Social Engineering: A Means To Violate A Computer System. [Online] Available at: http://www.sans.org/reading_room/whitepapers/engineering/social-engineering-means-violate-computer-system_529 [Accessed 29 December 2010]. Anon., 2010. Passwords revealed by sweet deal. [Online] Available at: http://news.bbc.co.uk/2/hi/technology/3639679.stm [Accessed 29 December 2010]. Attiyah, A., 2010. Social Engineering. [Online] Available at: http://www.auditmypc.com/social-engineering.asp [Accessed 23 December 2010]. Cyberwarz1, 2010. Social Engineering. [Online] Available at: http://www.cyberwarzone.com/content/social-engineering [Accessed 27 December 2010]. Goodchild, J., 2010. Social Engineering: The Basics. [Online] Available at: http://www.csoonline.com/article/514063/social-engineering-the-basics [Accessed 23 December 2010]. Granger, S., 2001. Social Engineering Fundamentals, Part I: Hacker Tactics. [Online] Available at: http://www.symantec.com/connect/articles/social-engineering-fundamentals-part-i-hacker-tactics [Accessed 25 December 2010]. Kee, J., 2008. Social Engineering: Manipulating the Source. [Online] Available at: http://www.sans.org/reading_room/whitepapers/engineering/social-engineering-manipulating-source_32914 [Accessed 27 December 2010]. Leyden, J., 2010. Office workers give away passwords for a cheap pen. [Online] Available at: http://www.theregister.co.uk/2003/04/18/office_workers_give_away_passwords/ [Accessed 26 December 2010]. Maggi, F., 2010. Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds. [Online] Available at: http://home.dei.polimi.it/fmaggi/downloads/publications/2010_maggi_vishing.pdf [Accessed 28 December 2010]. NextGenUpdate , 2010. Social Engineering and Baiting. [Online] Available at: http://www.nextgenupdate.com/forums/computer-hacking-coding/44081-social-engineering-baiting.html [Accessed 27 December 2010]. Ollmann, G., 2007. The Phishing Guide. [Online] Available at: http://www.technicalinfo.net/papers/Phishing.html [Accessed 27 December 2010]. Posey, B.M., 2003. Knowledge is power against these new social engineering schemes. [Online] Available at: http://www.zdnetasia.com/knowledge-is-power-against-these-new-social-engineering-schemes-39133776.htm [Accessed 23 December 2010]. TechTarget, 2009. social engineering. [Online] Available at: http://searchsecurity.techtarget.com/sDefinition/0,sid14_gci531120,00.html [Accessed 24 December 2010]. Turban, E., Leidner, D., McLean, E. & Wetherbe, J., 2005. Information Technology for Management: Transforming Organizations in the Digital Economy. New York: Wiley. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Social Engineering ( Examining the latest scams) Essay”, n.d.)
Social Engineering ( Examining the latest scams) Essay. Retrieved from https://studentshare.org/miscellaneous/1574970-social-engineering-examining-the-latest-scams
(Social Engineering ( Examining the Latest Scams) Essay)
Social Engineering ( Examining the Latest Scams) Essay. https://studentshare.org/miscellaneous/1574970-social-engineering-examining-the-latest-scams.
“Social Engineering ( Examining the Latest Scams) Essay”, n.d. https://studentshare.org/miscellaneous/1574970-social-engineering-examining-the-latest-scams.
  • Cited: 0 times

CHECK THESE SAMPLES OF Social Engineering: Examining the Latest Scams

Corporate Security Breaches

This paper is going to analyze the extend of understanding that security managers have to go in the latest politics, economy, society, technology, ecology and legal (P.... Therefore, there is crucial importance in understanding the different areas in society like politics and economy at a broader view because as the management of this corporation is becoming more and more reliant on the latest technologies, there is also becoming extremely vulnerable to the cyber attacks....
8 Pages (2000 words) Essay

Information Security Management

the latest networking technology not only helps them achieve this but also allows them to expand their business and upgrade their SME into a large enterprise.... This paper ''Information Security Management'' takes a look at the security threats that an SME faces online and its need of information security management to tackle these threats....
18 Pages (4500 words) Research Proposal

You Tube as a Cultural Form

Its reach, ubiquity, and sheer volume of content, everything from dumb home movies to glossy commercial calling cards, make it “easily dismissible as merely the latest purveyor of trivial, banal, repetitious distractions for an eagerly narcotized booboisie” (Cloud).... ll social changes contain elements of continuity and assertion of novelty is always a tricky enterprise.... Our speech, print, and audio-visual media have always constituted the structures and frameworks for the objective of social setup, as these media act as a powerful instrument capable of imposing its assumptions on our modes of perception....
8 Pages (2000 words) Essay

Strategic Capabilities of UAE Police to Combat Card Fraud

It does not contain any material which has been accepted for another degree in any university and to the best of my knowledge and belief, contains no material previously published, written, or produced by.... ... ... The study is an investigation of the status of credit card fraud as it is perpetrated in the United Arab Emirates....
80 Pages (20000 words) Essay

Credit Card Fraud Issue

I declare that this dissertation is the result of my own research.... It does not contain any material which has been accepted for.... ... ... her degree in any university and to the best of my knowledge and belief, contains no material previously published, written, or produced by another person, except where due reference is made in the text. ...
80 Pages (20000 words) Essay

The 21st Century Classrooms Contribution to Student Enlightenment and the Global Age

This paper, The 21st c Classrooms Contribution to Student Enlightenment and the Global Age, highlights that people of the millennial generation also termed as digital natives live in a virtual world, interact and socialize in virtual space or room, do business and transactions through virtual currency....
30 Pages (7500 words) Research Paper

Voice over Internet Protocol: Security, Vulnerabilities and Recommendations

social engineering provides an alternative method for attackers to gain access to information assets, through exploiting human vulnerabilities.... Information security, software vulnerabilities, and social engineering will be briefly discussed followed by an in-depth exploration of vulnerabilities associated with the use of VoIP.... VoIP systems are not immune to these, and it is essential that software and social security measures be taken.... Important VoIP communications should be encrypted Besides software, social control measures have also been discussed, which are just as important as deploying software controls due to human vulnerabilities....
8 Pages (2000 words) Research Paper

Designing a Cellular Mobile Radio Communication System for Gold Coast, Australia

Consequently, rapid growth is achieved in this sector due to new services and emerging technologies making social and business activities to rely heavily on wireless communications.... The following research paper contains a design for a small cellular mobile radio system for Gold Coast, Australia....
19 Pages (4750 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us