Sunday, December 29, 2019
Social Engineering Free Essay Example, 1000 words
For instance, an individual using his or her social engineering skills to in access to a computer system may attempt to acquire the trust of an authorized user and persuade them to unveil data that endangers the systemââ¬â¢s security (Mann, 2012). This is the reason social engineers frequently depend on the natural cooperation of unknowing people while exploiting the weaknesses. Recently, social engineers have grown less fond of directly attacking computer systems and have become increasingly used to directly contacting or infiltrating individuals. For instance, a hacker can call an authorized worker impersonating a relative or friend in an effort to present a made up urgency that needs the hackersââ¬â¢ instant access to the userââ¬â¢s network (Long, 2011). This trend is more common among spammers than other kinds of network hackers. Evidently, these intruders appeal to vanity, authority, greed, and conventional eavesdropping. With more and more usage of emails in organizat ions and by individuals, the widespread of spamming social engineers is nearly inevitable. Social engineering affects individuals and organizations in different ways. First, luring situations make up the most common method individuals for victims to social engineers (Mouton et al. , 2013). We will write a custom essay sample on Social Engineering or any topic specifically for you Only $17.96 $11.86/pageorder now Social engineers know that when valuable offers or services are presented to vulnerable people, they often give in. This method of social engineering is more common in peer-to-peer website that that allow internet users to download new media or any other type of data free. However, this method is also common in social networking websites, perpetrated through malicious software and websites that users come across through search engines. The same technique can involve visiting websites with remarkably good offers presented as auction websites (Long, 2011). Even while using an organizationââ¬â¢s network, individuals will still think of a seller with a good rating in an auction website as a credible source and plan ahead of time after suppressing oneââ¬â¢s suspicion. Users whose computers fall victim to scrupulous programs again usually produce any amount of new feats against themselves and organizations or deals (Mann, 2012). In the process, the person loses money without getting the bought item. In some cases, unknowing individuals can choose to pay for the transaction using cheques or credit cards and ultimately find their bank accounts emptied. Nurturing distrust is another way for social engineers to cause disagreements within organizations or amongst targeted users (Hadnagy, 2010).
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.