Sunday, December 29, 2019

Social Engineering Free Essay Example, 1000 words

For instance, an individual using his or her social engineering skills to in access to a computer system may attempt to acquire the trust of an authorized user and persuade them to unveil data that endangers the system’s security (Mann, 2012). This is the reason social engineers frequently depend on the natural cooperation of unknowing people while exploiting the weaknesses. Recently, social engineers have grown less fond of directly attacking computer systems and have become increasingly used to directly contacting or infiltrating individuals. For instance, a hacker can call an authorized worker impersonating a relative or friend in an effort to present a made up urgency that needs the hackers’ instant access to the user’s network (Long, 2011). This trend is more common among spammers than other kinds of network hackers. Evidently, these intruders appeal to vanity, authority, greed, and conventional eavesdropping. With more and more usage of emails in organizat ions and by individuals, the widespread of spamming social engineers is nearly inevitable. Social engineering affects individuals and organizations in different ways. First, luring situations make up the most common method individuals for victims to social engineers (Mouton et al. , 2013). We will write a custom essay sample on Social Engineering or any topic specifically for you Only $17.96 $11.86/pageorder now Social engineers know that when valuable offers or services are presented to vulnerable people, they often give in. This method of social engineering is more common in peer-to-peer website that that allow internet users to download new media or any other type of data free. However, this method is also common in social networking websites, perpetrated through malicious software and websites that users come across through search engines. The same technique can involve visiting websites with remarkably good offers presented as auction websites (Long, 2011). Even while using an organization’s network, individuals will still think of a seller with a good rating in an auction website as a credible source and plan ahead of time after suppressing one’s suspicion. Users whose computers fall victim to scrupulous programs again usually produce any amount of new feats against themselves and organizations or deals (Mann, 2012). In the process, the person loses money without getting the bought item. In some cases, unknowing individuals can choose to pay for the transaction using cheques or credit cards and ultimately find their bank accounts emptied. Nurturing distrust is another way for social engineers to cause disagreements within organizations or amongst targeted users (Hadnagy, 2010).

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.