Social Engineering

939 words 4 pages
SOCIAL ENGINEERING

INTRODUCTION
Social Engineering is using non-technical means to gain unauthorized access to information or system. Normally a hackers would use exploit a systems vulnerabilities and run scripts to gain access. When hackers deploy social engineering they exploit human nature. Social Engineering is represented by building trust relationships with people who work in the inside of the organization to gain access or who are privilege to sensitive information such as usernames, passwords, and personal identification codes which are needed to gain access to information, networks and equipment. An attacker may appear to be trustworthy and authorized, possibly claiming to be a new
…show more content…

Most people do not cause problems intentionally however they can bring down an entire network by accessing unsecure websites, deploying unauthorized wireless access points and opening suspicious email message.
How to avoid being a victim.
• Be suspicious of unsolicited phone calls, visits, or email messages from individuals asking about employees or other internal information. If an unknown individual claims to be from a legitimate organization, try to verify his or her identity directly with the company.
• Do not provide personal information or information about your organization, including its structure or networks, unless you are certain of a person authority to have the information.
• Don't send sensitive information over the Internet.
• Do not reveal personal or financial information in email, and do not respond to email solicitations for this information. This includes following links sent in email.
• Be suspicious of unsolicited phone calls, visits, or email messages from individuals asking about employees or other internal information. If an unknown individual claims to be from a legitimate organization, try to verify his or her identity directly with the company.

CONCLUSION
The greatest weakness to a company or organization is its employees. Social Engineering exploits that human weakness in a nontechnical way. Companies can

Related

  • Human Genetic Engineering
    1607 words | 7 pages
  • The Role of Engineers in Society
    1615 words | 7 pages
  • Gattaca (Genetic Engineering) Opinion Piece
    923 words | 4 pages
  • Miami Toy Company
    1482 words | 6 pages
  • Corporate Responsibility Essay - Activision Blizzard
    1833 words | 8 pages
  • Ch1 Comp Security
    2289 words | 10 pages
  • Social Networking in Today’s Workplace
    1063 words | 5 pages
  • Super Star Uni Case Study
    2527 words | 11 pages
  • Ipma Level B Report
    5091 words | 21 pages
  • Ducati
    5708 words | 23 pages