Top-Rated Free Essay
Preview

Social Engineering Article Review

Good Essays
438 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Social Engineering Article Review
Malware and phishing are two types of cyber security problems that are a growing problem in the United States and other countries. By utilizing various methods cyber criminals attempt to gain access to corporate networks for the purposes of obtaining source code or other sensitive corporate information. Not only are corporations involved but the average user can also be a target of these malicious attacks. Criminals continue to refine their methods with new ways to attract visitors to malicious sites. There are many types of antivirus and malware products available but none of them can fully protect your computer or a corporate network. It takes diligence to ensure the privacy of the information on your computer. While the antivirus and other software is necessary to try and avoid most problems it doesn’t completely solve the problem of those threats.
One such way that your system can be compromised is when hackers break into a legitimate site and replace the links in the site with links to malicious sites. So for instance, you may be reading a legitimate newspaper website that has been hacked and one of the links to a news article could point you to a site that attempts to download a virus or malware to your PC. Since you trusted the site and didn’t know the link was malicious there’s really no good way to catch such a problem.
There are other types of malware that are very easy to catch and there are a few methods one should employ in order to protect your private information. First, any email that contains links should be considered suspicious. Many emails are junk emails which are unsolicited attempts to gain control of your computer or your personal information. All email should be highly scrutinized before opening any attachments or links. If you are going to open a link in an email make sure you completely trust the sender of the document.
A new style of attack is a social engineering attack in which criminals attempt to gain some basic knowledge about you via a social networking site and then obtain other pertinent information about you from your friends by providing leading questions. Another example of a cyber-attack on social media is the use of sending links along with a tweet in order to get the user to utilize the link. In many cases the link attempts to install malicious software on the user’s PC. While there will always be threats it’s important to utilize good Antivirus software along with a common sense approach that it takes diligence to keep your private information private.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    High technology gives criminals the opportunity to obtain valuable information. They are considered a cyber-threat. Criminals usually get illegitimate or legitimate work-related access to a company’s computer resources to sell wanted information.…

    • 273 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    There has been an increase in global technology over the past few years. The increase in technology allows us to have access to many things from almost anywhere, such as the Internet. People can find information right at their fingertips faster and easier than ever before. However, with this increase in technology comes an increase in cybercrime.…

    • 780 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    From the year 2000 to 2010, the users’ on the Internet has escalated to approximately five times its original users. The Internet provides a variety of services in which its users transmits large amounts of proprietary and personal data. The increase in Internet users and the vital data transmitted has enticed criminals to use the internet to obtain vital information. This is done through the use of malicious traffic. Malicious traffic can be defined as Internet traffic used to compromise a system and/or to conceivably impair the privacy of consumers data stored on the system or the person working on the system itself. Security experts has documented "67,000 new malware threats on the Internet daily in the first quarter of 2011, resulting from more than 45 new viruses, worms, spyware and other threats" (Department of Commerce (DOC), 2011). Malicious traffic plays a key role in the challenges faced in the economics of information security. Economically speaking, malicious traffic…

    • 1586 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Incident response begins with prevention and security awareness (figure 1). In the case of malware attacks such as viruses, worms or Trojan horses, defense-in-depth plays a large role in the defense and early detection of potential threats to information systems connected to the internet. Personnel utilizing these assets also play a large role in defending and protecting these assets. Authorized users should be aware of all policies and procedures pertaining to the proper use of all networks, applications, and systems within the organization. The frequency of incidents can be greatly reduced through user awareness (Whitman, Mattord, & Green, 2014).…

    • 805 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Viruses have been around for a long time, and can render a system useless if not dealt with. New, more destructive viruses and worms are being unleashed exponentially. Reports indicate that 50 percent more virus attacks were launched in 2003 than the prior year. The January-March 2004 Mydoom virus outbreaks were the biggest the Internet has encountered to date.…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    The last few years have been marked by numerous malicious applications that have increasingly targeted online activities. As the number of online activities continues to grow strong, ease of Internet use and increasing use base has perfected the criminal targets. Therefore, attacks on numerous users can be achieved at a single click. The methods utilized in breaching Internet security vary. However, these methods have increasingly become complicated and sophisticated over time. With the increase in threat levels, stronger legislations are being increasingly issued to prevent further attacks.…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Good Essays

    To avoid this, users have to avoid untrusted websites and make sure to scan small attachments before opening them. Simply, reliable and trusted programs must be downloaded which are anti-virus and anti-spyware programs in order to prevent viruses. Also, users must install programs which scan a computer to detect viruses.…

    • 769 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Privacy and Security

    • 4774 Words
    • 20 Pages

    Today 's risk of surfing the internet has increased as a variety of threats have emerged. However; many people fail to understand the importance of internet security. A number of people do not apply or just apply the basic of security software until they realise there is a risk. Consequently, their computers are being infiltrated or infected. Some people are unaware of personal information being stolen or misused, which can present many security issues to the user. As one part of privacy, personal information has to be protected by internet users due to the many attacks that are intended to obtain your personal information for profit.…

    • 4774 Words
    • 20 Pages
    Powerful Essays
  • Satisfactory Essays

    Chipopo Research Paper

    • 343 Words
    • 2 Pages

    where, these free software do not disclose that they are bundled with this adware. Furthermore, this adware invades computer via Spam emails attachment, infected websites, and hyperlinks.…

    • 343 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Malware, Spyware & Adware

    • 2084 Words
    • 9 Pages

    From the early days of cracking passwords and stealing information from personal computers, to deadly Internet based attacks that can shake entire’s nation security, cyber crimes have evolved from the endeavors of entertainment by cyber kiddies to organized crimes and terrorist activities of cyber mafia. Virus Attacks, hacking, browser hijacks, spam, phishing and so on are various manifestations of malicious activities that have evolved on the internet in last couple of decades. Malware is one such tool that has emerged as a widely preferred choice to consummate criminal activities on the Internet.…

    • 2084 Words
    • 9 Pages
    Better Essays
  • Better Essays

    Increase in Denial of service attacks, child pornography, virus/worms and other tools used by individuals to destroy data has lead to law enforcement and media to look into why and how these security breaches are conducted and what new statutory laws are needed to stop this from happening. According to CSI computer crime and security Survey 2007, the average annual loss reported by security breach has shot up to $350,424 from 168,000 the previous year. To add to this, more and more organizations are reporting computer intrusions to law enforcement which inclined to 29 percent compared to 25 percent the year before. [1]…

    • 1237 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Trends in Cybercrime

    • 1077 Words
    • 5 Pages

    Cybercrime is nothing to new in this day and time; this has been a problem for many since the early onset of the 80’s. Although much seems to have been done to combat cybercrime over the years, criminals still have an advantage edge. With IT experts, companies see now just how important it is to involve law enforcement in the efforts to fight against computer crime. Computer cybercrime as we know it today is now used as potentially illegal activities.…

    • 1077 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    * Don’t open any email attachment from any unknown person. And if the person is known then also first scan the email attachment before open or download it.…

    • 900 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Danger of Malware

    • 839 Words
    • 4 Pages

    Computer worms and viruses pose a clear and present danger for corporate and public information security in that as time and technology progress, the damaging effects this "malware" has on the network increases. Throughout this paper the term "malware" is used to define software that damages your system, causes instability, or exhibits antisocial behavior such as changing settings or interfering with a computer's registry and security settings. Typical examples include computer viruses or worms.…

    • 839 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Technologies such as cellular phones, pagers, home computers, the Internet, websites, and palm pilots have added another dimension to crime. That dimension involves increased methods at criminals disposal to commit certain crimes along with increased locations in which crimes can occur. Hackers use to look for fame with a splashy, large-scale attack on a network that made headlines. Today 's cybercriminals are quietly taking over vulnerable web sites as part of an elaborate process in the underground economy. A highlighted section is something can change the motivation of hackers. The hackers have moved from hacking attempts that are being done for notoriety to hacking for criminal intent and fraud. While early hackers wanted to make a big splash by attacking as many computers as possible in a show of genius and ability for taking down network, now criminals do not want to be detected. Takeovers are done in a slow, methodical fashion. By not being caught, they can use the systems they have taken over for a variety of purposes. How are cybercriminals working today, and what do you need to know to stay on top with your security strategy. Cybercriminals are sneakier, and quite. Malware infected systems are used as network of bots for a wide variety of inappropriate activities. A program that uses “Bots,” can do denial of service attacks, they can be used to send out spam, and to send out phishing data…

    • 1750 Words
    • 7 Pages
    Powerful Essays