In today's world there is an abundance of information. When you think of hackers you normally think of individuals who use technology to gain access to information that is not otherwise available. In a lot of cases this can be true but there are other ways to gain access to information that requires little technical knowledge. A lot of this information is available freely without restrictions. Social engineering takes advantage of this fact to acquire additional information by manipulating perceptions of those disclosing the needed information.
Although, social engineering does not require that one be tech savvy, to be an effective social engineer requires a few specific traits. The first trait is that you have to be a well perceptive person. You have to be able to see everything in your surrounds and use them as a tool. For example, in a parking lot near a government building or military facility, you can find out a lot of information about the owner of the vehicle. Most federal faculties require that an employee's vehicle be mark for proper access and parking. You can use this information to figure out rank, access and position of the owner from which you can further refine your approach to this person if information is needed. Parking passes and window stickers works for more than just government employees as a lot of business and schools require these items as well.
Another aspect of a successful social engineer is be able to blend in. This usually requires that you have done your research and know what the normal operations would entail. Knowing exactly how to convincingly perform is essential to successful convincing other to reveal additional information. As a social engineer, you must not appear as a treat. This requ...
... middle of paper ...
...available to a social engineer. You have to be proactive in using available tools to prevent access to information like security tool built into social media sites and proper techniques of information disposal. There is no getting around the fact that if the information is there someone will use it against you.
Works Cited
Long, J. (2007). No-Tech Hacking. Presented at DEFCON15. Retrieved from: https://www.youtube.com/watch?v=qfFELeCP-oA
Scher, R. (2011). From Within: What Happens When IT Goes Wrong. Retrieved from: http://www.social-engineer.org/resources/DamageFromWithin.pdf
Scher, R. (2011). Protect your company: Social Engineering and Your Employees. Retrieved from: http://www.social engineer.org/wiki/archives/NewsArticles/ProtectYourCompany.pdf
Whitman, M. E., & Mattord, H. J. (2011). Principles of Information Security. Boston: Course Technology.
Kabay, M. E., & Robertson, B. (2009). Security policy guidelines. In S. Bosworth, M. E. Kabay, & E. Whyne (Eds.), Computer security handbook (5th ed.). New York, NY: John Wiley
Whitman, M. E. & Mattord, H. J. (2011) Principles of Information Security. Boston: Course Technology. (Whitman & Mattord, 2011)
Whitman, M., & Mattord, H. (2010). Management of information security. (3rd ed., p. 6). Boston, MA: Cengage Learning.
Social engineers offer something that creates excitement to grab offer and entice to put blind trust on attackers with confidence.
Haslam, S.A. (2004). Social Identity Approach . In: Psychology in organizations . 2nd ed. London: SAGE publications. 17-30.
Gibson, Darril. Understanding The Security Triad (Confidentiality, Integrity, and Availability). Pearson IT Certification. 2011. http://www.pearsonitcertification.com/articles/article.aspx?p=1708668
According to the National Association of Social Work (NASW), Social work is defined as, “The professional activity of helping individuals, groups, or communities enhance or restore their capacity for social functioning and creating societal conditions favorable to this goal.” As such to pursue a career as a Social worker one must contain some key values. Such values include: one must be able to provide help, resources, and benefits to people so that they can achieve their maximum potential in life, they must also uphold that all citizens should be treated equally despite their socioeconomic background. In addition, they have to be willing to maintain trustworthiness and sound adherence to moral ideals, value the dynamic reciprocal interactions
Occupational socialization is the process by which a person acquires the values, attitudes, and behaviors of an ongoing occupational social system (Stojkovic, Kalinich, & Klofas, 2013, p. 250). It is a continuous process and may result in both legal and illegal behaviors. Becoming aware of organizational and occupational practices, internalizing them, and carrying them out as participating members of the work group, affects the way they perceive, influence, and interact with citizens in a law enforcement capacity. These are influenced intentionally while going through training when beginning the primary introduction into a new organization, and through the actual experience in the office and on the job interactions. Police socialization for example, ensures that individuals acquire the necessary knowledge to perform adequately on the job.
Social workers are special people. They spend their lives assisting others in their life crises no matter how large or small someone else might perceive them to be. The have unique qualities that are a prerequisite to be successful at the job and at relating with the people who come to you for help. Personal qualities make a significant difference in one's ability to inter...
...you could down load a maliciousness virus that will provide them your sensitive information (Williams & Sawyer, 2013). It is critical to have firewalls in place to minimize social engineering on your personnel or companies network systems. But the first line of defense, in protecting your company against the loss of critical business information is to ensure that your employees are trained in security awareness (Goodchild, 2012). Hacker can still gain access to your systems even if you have the best security controls in place. It starts with your employees, you have to increase their awareness of how social engineering operates. If they know the signs, they will be able to prevent it. The most important thing is when you are on your personal or work computer, always remember PPI because you will never know who is on the other side of the computer networks.
Social computing refers to the intersection of social behavior and computational systems. It is the collaborative and interactive aspect of online behavior of different people communicating together- not in isolation as in one on one chat. Social computing in an organization can empower and motivate employees and as a result create benefits for the business. For example the use of customer relationship management, enterprise resource planning systems among others. Therefore businesses can use social computing to get closer and intimate with their customers, suppliers and hence promote their brands at a lesser cost. Social computing enhances customer relationship management because it allows a business to follow public opinion its brand and respond quickly to customer issues and this increase customer satisfaction and loyalty as well as placing the firm in a better place as far as competition is concerned because of proper customer service delivery social computing elements include wikis, blogs, twitter and instant messaging.
...rces. In order to properly help people, social workers must follow the change process: “ First, engage clients in an appropriate working relationship; Second, Identify issues, problems, needs, resources, and assets; Third, collect and assess the data; Fourth, plan for delivery of services; Fifth, use your communication skills, and consult with your supervisor; Sixth, identify, analyze and implement your interventions to reach the clients goals; Seventh, apply empirical knowledge and technological advances; and finally, evaluate your outcomes and the practice effectiveness” (Zastrow, 2010). That and treating your clients with the respect and dignity they deserve are some of the fundamental skills of being in the social work field.
“Social software is the integration of communication and collaboration technologies that allow people to meet, interact and share ideas, artefacts and interests with each other.( Aelita,1)” Social software technologies include email, wikis, blogs, and knowledge sharing functions such as collaborative editing and document management. Some social tools also integrate real-time features, including instant messaging and web conferencing with voice and video. (See Table 1)
Johnson, B. R. (2005). Principles of Security Management. Upper Saddle River, NJ: Pearson Prentice Hall.
Some examples of social engineering include phishing, spear phishing, and hoaxes. Phishing is where a victim receives messages that may or may not look real from actual business places. These messages ask victims to authenticate and give up sensitive information. Most people who fall for these tactics believed that the website or message was real. Spear Phishing targets a specific victim. Hoaxes are just ways to make the victim feel dumb that they fell for the trap. Lastly, we have spam, which is unsolicited commercial emails. Now a days filters have blocked a good amount of these emails because they are just annoying to deal with but spam has become the common transport for viruses, worms, trojans, and many other forms of