SOCIAL ENGINEERING
1. Introduction. Social engineering is the art of human hacking. It is the art and science of getting people to comply with your wishes. It includes the ways and means to fool and manipulate people to give out confidential information or to mould the human minds to take particular decisions. The information can vary from bank information, social media passwords to the professional secrets. At its core it is manipulating a person into knowingly or unknowingly giving up information; essentially 'hacking' into a person to steal valuable information. It is a way for criminals to gain access to information systems. The purpose of social engineering is usually to secretly install spyware, other malicious software or to trick persons
…show more content…
Biggest Attacks
o. Why do People Fall for Social Engineering Techniques
p. Precautions
q. Bibliography
4. Social Engineers. Social engineers or criminals are individuals who take advantage of human behaviour to pull off a scam and aren't worried about a badge system. They will just walk right in and confidently ask someone to help them get inside. 'Social Engineering' is a threat, often overlooked but regularly exploited; to take advantage of what has long been considered the 'weakest link' in the security chain of an organization, the 'human factor'. Social engineers draw their motivation from following elements:-
a. Financial Gain. For example, he may believe he deserves more money than he earns or maybe there is a need to satisfy an out–of-control gambling habit.
b. Self-interest. For example, want to access and/or modify information that is associated with a family member, colleague or even a neighbour.
c. Revenge. For example, target a friend, colleague, organization or even a total stranger to satisfy the emotional desire for vengeance.
d. External Pressure. For example, receiving pressure from friends, family or organized crime syndicates for reasons such as financial gain, self-interest and/or
…show more content…
Trust Manipulation. The social engineering is constantly on the rise as it is much easier to fool a person to give out his password rather than using complicated software’s to try and crack the passwords. The social engineering is all about exploiting human natural inclination to trust the people. Human being is very emotional and has natural tendency to trust others. People are generally helpful, especially to someone who is nice, knowledgeable or insistent.Security has now evolved all around a human’s judgment about who to trust and what to trust. It’s about one’s mastering the following skills:-
a. Knowing who and what to trust.
b. Knowing when and when not to believe one’s words.
c. Ensuring that the person you are communicating is the same you intend to communicate with.
d. Ensuring the website is legitimate and it’s safe to give information on it.
e. Ensuring that the person on the other side of the phone is the person you intend talking to.
f. Knowing whether it’s safe to give out particular personal
Social psychology is one of the many variations of psychology. By definition, social psychology is how humans influence each other’s way of behaving and thinking. Under social psychology, there are various ways to define human behaviour and understand why we behave in a particular manner. These approaches deal with multiple concepts such as conformity, obedience, and social influences. They help answer questions about our behaviour and actions, while also analyzing our cognitive processes in certain situations. Social experiments conducted throughout history have also led to more understanding in the aforementioned areas. With these understandings of social behaviour, society can benefit and become aware of themselves and their mentalities.
...ecessary safety measures in order to protect ourselves from things like identity theft. Effective telephone communication is crucial because of the possible dangers that occur while using the devices. Before using any type of technology to communicate with others, be sure you know the main issues relating to it and how to prevent these issues from happening to you. Look into the technology’s ratings and feedback before investing in it; by doing so, there is a greater chance that you will be happier with the outcome of your decision on whether or not to purchase it.
Sometimes in our lives, someone whom we care about and trust ends up betraying us or acting in a way that feels like a betrayal. We feel hurt by their actions and wonder why they would do such a thing, asking ourselves what we had done to deserve it. Then things go one of two ways: either we forgive and forget or we feel the need to take revenge; we want them to feel the pain we felt and understand what they’ve done, although ultimately, our vindictive actions only serve to hurt us further.
Concern InfoTech Pvt. Ltd. (2013) Socialization [online]. [Accessed 11th December 2013]. Available at: < http://www.sociologyguide.com/basic-concepts/Socialization.php>.
When communicating, make sure that there are minimal noises and distractions around so the person will stay in focus.
People can "talk" to others by sending email messages, at the speed of pressing the send key. This information is instantly transmitted to the receiver, who can in turn, reply quickly. Today, one can even literally talk to someone else, just as if he/she were actually phoning someone over traditional phone lines. While the quality is not as clear as regular lines, the cost is considerably less.
Social media creates a host of communications issues that are not easy to counteract. In the case study, Social Benefits of Social Disaster?-Best Buy; there are two glaring examples of how social media creates issues from its communications. The first of which is the risk to security. In this case, an easy to guess password was used by a hacker to misuse a twitter account. Implications were felt not only by the individual that was hacked, but the company suffered financial losses. Further issues could have occurred if the hacker was interested trying out the password on internal Best Buy systems. As a manager, it is critical to stress to employees the importance of communications that contain sensitive information and how to choose a password that provides the highest level of security. (Robbins, Decenzo, & Coulter, 2013)
Social Engineering: What It Is and How to Help Protect Yourself. (n.d.). Retrieved from http://www.microsoft.com/security/resources/socialengineering-whatis.aspx
Social designing is the craft of manipulating people so they surrender classified data. The sorts of data these criminals are looking for can fluctuate, however when people are focused on the criminals are generally endeavoring to deceive you into giving them your passwords or bank data, or access your computer to subtly introduce malignant software– that will give them access to your passwords and bank data and additionally giving them control over your computer.
Lack of knowledge of the subject that you are discussing, if you do not understand the subject yourself you will not be able to discuss or explain the subject in detail this can lead to the person not being able to understand the information that is being communicated and can lead to
Cybercrime and social media are two major global problems that impact society. Today, are more accessible to computers and the Internet than in years prior. Nonetheless, perpetrators attack social media with illegal activity to facilitate their crime. There are different strategies or practices by various countries to combat cybercrime. However, identity theft, cyberbullying and phishing are three major type of cybercrimes which are impacting social networking websites.
In this paper I will analyze my own behavior, behaviors of others, and interactions I have noticed pertaining to social penetration theory. Social penetration theory provided me with insight on my daily communication practices. It brings light to the reasons as to why we feel comfortable, and uncomfortable in our ongoing experiences.
Social Networking is a modern and the easiest way to Communicate Online. It has revolutionized the way we communicate over large distances. We can get into contact immediately with Family, Friends, and other people from around the globe using any of the modern Communication mediums such as a Mobile Device or a Computer. There are many possible ways of Social Networking. You can use Social Networking Websites, Blogging, IMs (Instant Messengers), Chatrooms, and Dating Sites to get connected to people.
Some examples of social engineering include phishing, spear phishing, and hoaxes. Phishing is where a victim receives messages that may or may not look real from actual business places. These messages ask victims to authenticate and give up sensitive information. Most people who fall for these tactics believed that the website or message was real. Spear Phishing targets a specific victim. Hoaxes are just ways to make the victim feel dumb that they fell for the trap. Lastly, we have spam, which is unsolicited commercial emails. Now a days filters have blocked a good amount of these emails because they are just annoying to deal with but spam has become the common transport for viruses, worms, trojans, and many other forms of
Social media can provide a false sense of security to users by empassizing the social aspect of the platform and primarily showing people content generated by thier friends. Similarly, Gehl described his ideal social platform as a network of exclusively peer to peer connections. Gehl’s ideal social network would closely simulate real life communities to the point that the online world is just an extension of real life local communities. Gehl’s ideal social network was private at is core because your content and information would only be shared with your peers. In essence,