Social Engineering Technology and Tools

1499 Words3 Pages

Introduction
This paper analyzes the social engineering technology and the social engineering tools that are used to test the human element with regard to its capabilities and limitations in the areas of confidentiality, integrity, and availability. The analysis covers Social engineering Toolkits usefulness, cost, and implementation complexity and how its effectiveness can be enhanced.
Social engineering are all those activities that are done by a hacker to manipulate that human tendency to trust so as to gain unauthorized access to the valued information that are in the computer system. The IT specialist agrees that despite the secure networks and firewall being used, the security of the IT is based on the trust in the protection and authenticity . The easiest place for the attackers in the computer network is the human willingness to trust people based on what they have said. This makes any system very vulnerable to the attack of the criminals . While the IT specialist in the company can do all to protect the system form malicious attacks, it is up to the people using the system to ensure that the corporate network is secure
Increase of internet based social networking has created a revolution by enhancing social connectivity. However, the criminals and other actors on the internet that will ill motives have exploited this capability for nefarious purposes. There are two main tactics that are used by the criminals to exploit the people on the online social networks. The two methods will mostly be used together by the criminals. The first is that the computer savvy hackers may install unwanted software on the user’s computer or the phone so as to gain the personal information. This is mainly done by people who specialise i...

... middle of paper ...

...an: Social Engineering Techniques and Security
Countermeasures Published by Gower Publishing Ltd. ISBN 0-566-08773-1 or ISBN 978-0-566-08773-
Mitnick, K (2002). "The Art of Deception", p. 103 Wiley Publishing Ltd: Indianapolis,
Indiana; United States of America. ISBN 0-471-23712-4
Mitnick, K, William L., & Wozniak, S. (2002). The Art of Deception: Controlling the Human
Element of Security Published by Wiley. ISBN 0-471-23712-4 or ISBN 0-7645-4280-X
Mitnick, K., & Simon, W. (2005). "The Art of Intrusion". Indianapolis, IN: Wiley Publishing.
Mitnick, K., Kasperavičius, Alexis. (2004). CSEPS Course Workbook. Mitnick Security
Publishing.
Palumbo, J., (2000). “Social Engineering: What is it, why is so little said about it and what can be done?”, SANS Institute, July 26, 2000
Stevens, G., (2003) “Enhancing Defenses Against Social Engineering” SANS Institute,
March.

More about Social Engineering Technology and Tools

Open Document