Social Engineering

939 words 4 pages
SOCIAL ENGINEERING

INTRODUCTION
Social Engineering is using non-technical means to gain unauthorized access to information or system. Normally a hackers would use exploit a systems vulnerabilities and run scripts to gain access. When hackers deploy social engineering they exploit human nature. Social Engineering is represented by building trust relationships with people who work in the inside of the organization to gain access or who are privilege to sensitive information such as usernames, passwords, and personal identification codes which are needed to gain access to information, networks and equipment. An attacker may appear to be trustworthy and authorized, possibly claiming to be a new
…show more content…
Most people do not cause problems intentionally however they can bring down an entire network by accessing unsecure websites, deploying unauthorized wireless access points and opening suspicious email message.
How to avoid being a victim.
• Be suspicious of unsolicited phone calls, visits, or email messages from individuals asking about employees or other internal information. If an unknown individual claims to be from a legitimate organization, try to verify his or her identity directly with the company.
• Do not provide personal information or information about your organization, including its structure or networks, unless you are certain of a person authority to have the information.
• Don't send sensitive information over the Internet.
• Do not reveal personal or financial information in email, and do not respond to email solicitations for this information. This includes following links sent in email.
• Be suspicious of unsolicited phone calls, visits, or email messages from individuals asking about employees or other internal information. If an unknown individual claims to be from a legitimate organization, try to verify his or her identity directly with the company.

CONCLUSION
The greatest weakness to a company or organization is its employees. Social Engineering exploits that human weakness in a nontechnical way. Companies can

Related

  • Mechanical Engineering
    1104 words | 5 pages
  • Software Engineering Paper - Prototyping Model
    3670 words | 15 pages
  • Pros and Cons of Genetic Engineering
    1742 words | 7 pages
  • Human Genetic Engineering
    1607 words | 7 pages
  • Global Engineering
    3983 words | 16 pages
  • Social Networking in Today’s Workplace
    1063 words | 5 pages
  • Social Policy
    2133 words | 9 pages
  • Green Engineering
    886 words | 4 pages
  • Gattaca (Genetic Engineering) Opinion Piece
    923 words | 4 pages
  • Engineering Management
    2454 words | 10 pages