Preview

Summary: Social Engineering For Security Attacks

Satisfactory Essays
Open Document
Open Document
109 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Summary: Social Engineering For Security Attacks
According to, “Social Engineering for Security Attacks”, social engineering is a kind of advanced persistent threat that gains private and sensitive information through social networks or other types of communication (Nelson, 2016). The goal of social engineering is to stay inside of a social media account while undetected for a long period to steal private data (Nelson, 2016). Some targets of social engineering are government agencies, corporations, schools or high- profile users (Nelson, 2016). This type of threat has become increansingly popular in recent years as well as other threats to cybersecurity. Attackers are becoming more sophisticated and persistent, and are focusing on small attacks and high profile organizations.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    In “Terror on Facebook, Twitter and YouTube” Gabriel Weimann argues that social media has greatly aided the spread of terrorism over the advancement of technology in online communication. Weimann examines the use of interactive online communication by terrorists and their supporter- from chatrooms to social media and online video communities.…

    • 508 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Organized Crime

    • 375 Words
    • 2 Pages

    One new trend in organized crime is cybercrime. The key to it is social engineering. Hackers can easily persuade someone now a days to do things on their computer that is not in their best interest and the internet is assisting them.…

    • 375 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    SkillPort Security

    • 647 Words
    • 3 Pages

    Well trained employees play a huge factor in protecting the network. Many viruses and malware can be prevented just by paying attention and having a trained eye. It is important that employees can recognize and respond to social engineering techniques. Social engineering is a method that attackers use to gain information to make their attack successful. In other words, it is a method of gaining confidential information. Social engineering has been around for a very long time and it is the most basic way to bypass an organizations security.…

    • 647 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab 1

    • 567 Words
    • 3 Pages

    Social engineering is being used to by tricking people into giving out information that is not normally publicly available.…

    • 567 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    paganinip . (2nd Dec 2011). Social Network Poisoning … they want to spy on us, we evade. Available: http://securityaffairs.co/wordpress/352/digital-id/social-network-poisoning-they-want-to-spy-on-us-we-evade.html. Last accessed 29 Oct 2012.…

    • 2024 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Within the World Wide Web, social network is becoming the favorite target for cybercriminals. This…

    • 526 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The computer world gives criminals a large amount of power because victims can just about anyone and can happen internationally (Maras, 2015). It can be hard for law enforcement to understand cybercrime because of how fast new crimes are committed and the new ways to commit those crimes is constantly changing (Maras, 2015). For example, various ways to commit cybercrime include hacking, malware, cyberterrorism, cyberextortion, and cybervandalism (Maras, 2015). It can be hard for law enforcement to keep up with these criminals because of how often technology is changing. Account holders of platforms such as social media, online bank accounts and billing accounts, email, and more have to be very cautious when using technology because of how easy…

    • 471 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Social Media has become very popular due to the growth of technology and the ability to use our phones as computers. Social Media is a place that young teens and adults use to connect to friends and family. Yet many people have been caught trying to use sites like this to…

    • 812 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Annotated Bibliography

    • 943 Words
    • 3 Pages

    Facebook has more than five hundred million users and fifty percent are logged on every day, because of this it makes it a large target for online hackers. Many applications on social networking sites can access a user’s personal information. An increasing number of Facebook users are adding “friends” on their Facebook that they do not know and because they accept the friend request, it is not abuse since the friend request was accepted. Spambots send informal messages to users which contain a link which once opened can contain any type of computer virus. Cyber attackers are also using natural disasters as a way to gain credit card information. They will start a group titled “Help Haiti Rebuild” or something similar with a link to insert credit card information to send money to those affected. Some hackers also take part in “phishing” which is a way to gain login names and passwords by presenting a fake login page. an excessive amount of spam was sent by a using account from which the passwords were phished and post a link to the malware.…

    • 943 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Business Memo

    • 675 Words
    • 3 Pages

    Being able to recognize when someone is attempting to use a social engineering technique is critical. Far too many employees are unaware of the consequences that can follow by clicking an unknown link on an email as well as responding to random text messages via SMS. It is important for upper-level management and executives to provide training to employees to make them aware of possible social engineering attacks. Ensuring that employees understand what privileges they have on company information systems and the various methods attackers use can help mitigate future social engineering success.…

    • 675 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Consider the various amounts of social media sites and email accounts, along with the millions of passwords that are used to access these sites. Society continues to crave more social media interactions and email accounts but yet there is not a cohesive effort to secure the passwords that are used for these sites. In a recent article by SC Magazine, it reported the compromise of over two million accounts. The goal of this evaluation will be to reference numerous aspects of this security article, describe each aspect, with comments on its usefulness…

    • 605 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    It Infrastructure

    • 342 Words
    • 2 Pages

    The User Domain is comprised of individuals that are often not aware of the tricks of attackers. For example, networks usually have strong passwords that one must know in order to gain access to the Internet. Nevertheless, social engineers can persuade individuals to give out personal information such as passwords and other types of private information. By giving out such information can cause computer viruses and infections executed by social engineers. Another way in which the User Domain can fall susceptible to attackers is the activities carried out by individuals on the computer. Visiting dangerous websites, downloading malicious files, and installing infected programs all give invitations to attackers to hack computer systems. In addition, inserting infected jump drives into computers can cause an entire computer network to become infected.…

    • 342 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Is404 Final Study Guide

    • 840 Words
    • 4 Pages

    7.p24 Social engineering is the single most common strategy attackers use and it’s also the most effective…

    • 840 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Facebook Privacy

    • 448 Words
    • 2 Pages

    Nowadays, users of online social networking communities are disclosing large amounts of personal information, putting themselves at a variety of risks. Social networking site, such as Facebook, one of the foremost social networking websites, with over 9.4 million users spanning over 2,000 college campuses, is considered for many people as a second home. College students are primary users of Facebook and are most likely to be effected and jeopardized by serious flaws in this system. Students tend to join Facebook as soon as possible, usually putting real time and effort into creating their profiles. However, in many cases students are unaware of the complex interactions between university policy and the information they are making available online. Administrators are using Facebook to learn about their students and their activities, therefore students must be especially aware of the risks that come with signing up for Facebook account. Privacy on Facebook is undermined by three principal factors:  users disclose to much  Facebook does not take adequate steps to protect user privacy  third parties are actively seeking out someone's information using Facebook. We as Group C, conducted a research about Facebook privacy by using credible and trustworthy sources from online databases such as ProQuest and EBSCOhost. Additionally, we used recent newspaper articles from New York Time and scholarly journals such as Business Horizons and Internal Auditor to find information about low privacy protections in Facebook. By conducting Facebook research, we have found that university administrators or police officers may search the site for evidence of students breaking their school’s regulations. Users may submit their data without being aware that it may be shared with advertisers. Third parties may build a database of Facebook data to sell. Intruders may steal passwords, or entire databases. More than one in five employers search social networking sites to…

    • 448 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Unit 1 Assignment Q A

    • 592 Words
    • 2 Pages

    Social Engineering is one of the number one ways a network is easily infiltrated. They major forms of this are Phishing, baiting and diversion theft.…

    • 592 Words
    • 2 Pages
    Good Essays