Preview

Social Engineering

Good Essays
Open Document
Open Document
3841 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Social Engineering
Social Engineering
You’ve probably heard about social engineering, but have your users? Do your users know they are the single biggest threat to the security of your organization? Social engineering comes in many forms. Users must be educated on the creative ways attackers leverage social engineering to take advantage of human nature.
Demonstrating social engineering for Professor Tim Richardson's E-Business Strategies class (MGD415). We found an old McDonald's cup someone had thrown away outside of McDonald's, filled it with a bottle of water and told the drive-thru it was too cold...free latte.
What Is "Social Engineering"? Social engineering is also called social hacking or social cracking. Social engineering is stealing important security information such as ID or passwords, not by technically but by socially. Popular example is picking through trash of a company or an organization and finding discs that contain secret documents or important data. Even you may use a paper shredder, it can be reconnected. Also, it is other way calls and asks information by lying about his/her identity. In a company, perpetrators may pass himself off as a boss, call to system management center, and say “I forgot passwords, so please tell me again”. There are a lot of other ways. Companies have to set up exacting rules of important data to prevent social engineering.

Social Engineering describes methods of influencing people with the goal of illegally obtaining sensitive data (e.g. passwords, credit card information). Social Engineers observe the personal environment of their victims and use fake identities to gain secret information or free services. In most cases Social Engineering is used to infiltrate third party computer systems to spy on sensitive data; in that case social engineering is also called Social Hacking.
An early form of social engineering first appeared in the 1980′s and was named phreaking. Phreakers called phone companies and claimed to be system

You May Also Find These Documents Helpful

  • Satisfactory Essays

    How can social engineering be used to gather information or data about the organizations’ IT Infrastructure?…

    • 283 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    FXT2 Task2

    • 825 Words
    • 4 Pages

    References: Peltier, T. (n.d.). Social Engineering: Concepts and Solutions. Retrieved January 27, 2014, from http://www.infosectoday.com/Norwich/GI532/Social_Engineering.htm…

    • 825 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Is404 Final Study Guide

    • 840 Words
    • 4 Pages

    7.p24 Social engineering is the single most common strategy attackers use and it’s also the most effective…

    • 840 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Unit 1 Assignment Q A

    • 592 Words
    • 2 Pages

    Social Engineering is one of the number one ways a network is easily infiltrated. They major forms of this are Phishing, baiting and diversion theft.…

    • 592 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Answer: Computer Hacking it is the act of bypassing ones account or database and hacking involves stealing of identity and use it in his/her own interest.…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 1

    • 567 Words
    • 3 Pages

    Social engineering is being used to by tricking people into giving out information that is not normally publicly available.…

    • 567 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    You will be able to recognize various motivations and vulnerabilities for exploiting a social network platform.…

    • 1245 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Sharick, P. (2002). Techniques for Establishing Highly Secure Systems, Windows IT Security, June 2002 Edition.…

    • 1974 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    1) Security attacks – action that compromises the security of information owned by an organization.…

    • 788 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Week 5 you decide

    • 928 Words
    • 4 Pages

    Social engineering attacks are another concern for our company. People tend to use sites like Facebook in order to communicate with other employees, family, and friends. It is in our best interest to have strict policies constantly in place to validate the uniqueness of the user prior to a password reset being made.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Organized Crime

    • 375 Words
    • 2 Pages

    One new trend in organized crime is cybercrime. The key to it is social engineering. Hackers can easily persuade someone now a days to do things on their computer that is not in their best interest and the internet is assisting them.…

    • 375 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    SkillPort Security

    • 647 Words
    • 3 Pages

    Well trained employees play a huge factor in protecting the network. Many viruses and malware can be prevented just by paying attention and having a trained eye. It is important that employees can recognize and respond to social engineering techniques. Social engineering is a method that attackers use to gain information to make their attack successful. In other words, it is a method of gaining confidential information. Social engineering has been around for a very long time and it is the most basic way to bypass an organizations security.…

    • 647 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Once you have enough information to understand how the target works and what information of value might be available, you begin the process of scanning perimeter and internal network devices looking for weaknesses, including…

    • 284 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Computer Memory Hacking

    • 820 Words
    • 2 Pages

    of reasons that one might participate in hacking the memory of a computer system. One reason…

    • 820 Words
    • 2 Pages
    Good Essays
  • Good Essays

    In public life communication technology serve more advantages than disadvantages. We can find friends through social media or online game sites, we can even find suitable partner through dating sites. The disadvantages are that people can provide false information and exploit the advantages of social media on people public life and cause misunderstanding, loss of properties or sometimes even lives. In private life, the disadvantages are more than the advantages. The advantages are that we can communicate and stay connected with our family or friends online, but it is also easy for hackers to access our personal profile online. Many cases have been reported that…

    • 1087 Words
    • 5 Pages
    Good Essays