Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
The impact of social engineering
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: The impact of social engineering
Information technology management Assignment no. 01 TOPIC: SOCIAL ENGINEERING NAME: Pralay Ganguly PGDM (2015-17) SECTION-B SUBMITTTED TO: PROF. Kapil Mohan Garg INTRODUCTION Social Engineering refers to the method used by the hackers which relies on human interaction and psychologically manipulate people to retrieve confidential information and gain access to system, divulging in fraudulent activities. So, Social Engineering is a kind of hacking, but it is different from traditional hacking method. Here, confidence trick is used for the purpose of gathering information, giving them control over the computer. Criminal utilize Social Engineering techniques because it is easier to …show more content…
For example: Someone might ask a person to borrow the phone or laptop to do some simple task/ work, but in reality installing some malicious software on that system. Hacking vs social engineering Hacking is a techniques or process of modifying the software and harware structure of a computer in order to achieve certain goal. In this case usually unauthentically gaining access to other system aand accessing information. It is a traditional method which is very complicated, hard and also time consuming. Here, a good hacker have to be an outstanding programmer. Social Engineering is manipulation of people to obtain confidential information by gaining trust through various modes of communication. This process of hacking is much easier compared to traditional method of hacking. In Social Engineering, it do not require a person to be an expertise in computer. Effects of social engineering Social Engineering is becoming more sophisticated day by day, now it not only targeting common user but also organizations, and the people working there such as, IT administrators, call center staffs, etc. Which complicates protecting company’s data, thus effecting the smooth operation of any
Hacking has two primary definitions; the first refers to the enthusiastic and skilful use of computers to solve problems (Techterms, 2013); the second, to “gain unauthorized access to data in a system or computer” (Oxford Dictionaries, 2013). In the context of this essay the second definition is more appropriate and will be the meaning inferred throughout. This definition also more closely aligns with legal terminology used in the UK when describing the hacking of computers. The Computer Misuse Act (1990) introduced three criminal offenses:
Social psychology is one of the many variations of psychology. By definition, social psychology is how humans influence each other’s way of behaving and thinking. Under social psychology, there are various ways to define human behaviour and understand why we behave in a particular manner. These approaches deal with multiple concepts such as conformity, obedience, and social influences. They help answer questions about our behaviour and actions, while also analyzing our cognitive processes in certain situations. Social experiments conducted throughout history have also led to more understanding in the aforementioned areas. With these understandings of social behaviour, society can benefit and become aware of themselves and their mentalities.
Kevin Mitnick has led a life of crime since a very young age. At age 12, Mitnick figured out how to hack into and change the L.A. Bus System’s punch cards. While Mitnick was hacked into the L.A.’s bus system he reverse-engineered the system allowing him to cheat the bus system and ride for free (Brown). That wasn’t enough for the young Mitnick though. With the age of growing technology, computers started becoming more popular. At age 16 Mitnick started hanging out with a group of adolescences that were involved in tapping into different systems, rerouting numbers, and high tech phone pranks (Brown). One prank that Mitnick and his friends use to pull on a regular basis was hacking into the phone directory (411), and when people would call they would come up with a bogus or fake number to tell the callers. Although this was a “harmless” prank it was still illegal. “Mitnick continually worked on perfecting his hacking techniques. “Mitnick pioneered the art of "Social Engineering," a technique that involves using "...
The Ted Talk presented by Catherine Bracy took the word hacking to another level. A new way of looking at a hacker. A hacker meaning much more than a teen behind a computer trying to steal information. The points she brought out is that reaching out to the people can get things done and strengthen relationships between people and an organization and through that relationship both parties are more stable and content. Bracy expressed her experiences with hackers in a government and citizen view, but this can also be applied to personal and
The central concepts following social psychology is that which dares to explain what makes people do what they do. Social psychology is the scientific analysis of how someone influences another’s thoughts, feelings, and behavior. Though considered to be a fairly young science, social psychology has endeavored to examine particular theories, concepts, and phenomenon that has shaped our society. As the centuries roll on, technology alongside social media, has evolved into something more sophisticated and has developed into a mechanism in which to entice and challenge social norms.
Hacking has been around since the birth of computers. When the term hacking was first used, its meaning was not that of how we think of it today. At the origins of computing, a hacker was considered to be just a "creative programmer (Baase, 2003)." Early forms of computer games as well as the beginnings of operating systems were discovered and created by these original hackers. These hackers plunged into systems as a way of an intellectual challenge and to aspire to gain knowledge (Baase, 2003). Kevin Mitnick believes he falls into this realm of hackers. Hackers in today's era are now looked upon as criminals who invade the privacy rights of individuals and have the ability to deliver worms/viruses. The differences are that hackers today have full intentions of delivering terrible viruses and worms. Mitnick was one of the most infamous hackers during the 1980's. He molded his hacking style around the stupidity of humans and his quest for intellectual knowledge. The ways in which he wiggled his way into computer systems extenuates many of the issues surrounding computer security and privacy.
In Computer security terminology Hacker is a person or group of persons, who exploit, modify and identify weakness in a computer system or network. Hacker may be motivates of reasons such as profit, protest and challenge. based on attitude, belief, and goals hacker groups are categories such as
Social Engineering: What It Is and How to Help Protect Yourself. (n.d.). Retrieved from http://www.microsoft.com/security/resources/socialengineering-whatis.aspx
Social designing is the craft of manipulating people so they surrender classified data. The sorts of data these criminals are looking for can fluctuate, however when people are focused on the criminals are generally endeavoring to deceive you into giving them your passwords or bank data, or access your computer to subtly introduce malignant software– that will give them access to your passwords and bank data and additionally giving them control over your computer.
What is a social bot? To put it plain and simple a social bot is a piece of software that is designed to appear human that will interact with people on social networks or a web site. For a successful social bot to perform users need to think that they are interacting with an actual human. A social bot will typically provide short simple information and determine if it needs to be redirected to an actual support personnel. The biggest concern many users have with social bots is the question whether or not they are ethical to use (Socialbot, n.d.).
The term “hacker” has been in use since the early 1980’s due to mass media usage to describe computer criminals. The use of this term is vastly used by the general population and most are not aware that there are different meanings to the word. People within the computing community especially within the programming subculture emphasize the use of the term “crackers” for computer security intruders (cyber criminals). Early hackers rarely used their skills for financial gain as a motivation for their criminal behavior in that time cybercrime was infantile and largely seen as a practical joke or game by those who committed it. Bob Thomas created the first credited computer worm n...
The issue with tackling the ethical hacker scenario is that the event is almost entirely action based. There is no end to give meaning to the action and there is no finalized result or indication that it impacted happiness, which many ethical theories depend on. Namely consequentialism, utilitarianism and ethical egotism require an end result in one form or another. There is also no purpose in committing the hackings which makes applying moral theories that deal with motivation and intent, ethical egotism and aspects of virtue ethics, increasingly more difficult to do effectively. Therefore moral theories that apply almost exclusively to the action itself will be utilized in this argument.
Harvey, Brian."Computer Hacking and Ethics." Ed. Paul Goodman, P.G. Electrical Engineering and Computer Sciences. U of California, Berkeley, n.d. Web. 25 Jan. 2014.
Social penetration theory states, in order to develop stronger relationships, each party must engage into information disclosure. And the strength of a relationship runs parallel with the type of information we decide to share. People are like onions. They have layers, and these layers are referred to as public which is available to all, semi-private which is available to some, and private which is rarely available
One of the things though is that we don’t only see schemes on social networks it could happen on any site that requires you to share information. Things like online shopping require you to share some of your personal information along with your bank information so if the site doesn’t have a strong security system it can have consequences. There are intelligent hacker1s and scammers that can breach the security system and steal your bank information. Three simple steps such as typing your name, birthdate, and zip code is more than enough for someone to try and steal your identity or use your information to their advantage. Theodore Claypoole in “Privacy and Social Media” said how the United States is trying its best to pass laws and keep up to date with new software in order to help protect people from falling into the realms of cyber criminals (Privacy and Social Media). As time passes technology is advancing and sharing our information is becoming easier, so it’s necessary for our security software to be up to