Question

Social Engineering: Search the Internet and refer to your readings for effective social engineering techniques. Now,...

Social Engineering:

Search the Internet and refer to your readings for effective social engineering techniques. Now, suppose you wanted to obtain access to confidential digital information stored on servers at a small local company called InfoLeak, Inc. The company is situated in a small town and has less than 100 employees. Of these 100 employees, only 5 are responsible for information technology and network security. The remaining employees are administrative, sales and research/development. The company is very open and community-friendly, often holding offsite company meetings and gatherings at local bars and restaurants.

Given your knowledge of social engineering, computer security and the general details of InfoLeak, Inc., provide a detailed strategy for obtaining the confidential information.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Social Engineering, with regards to data security, alludes to mental control of individuals into performing activities or unveiling classified or confidential data. A sort of certainty trap with the end goal of data social event, extortion, or framework get to, it contrasts from a conventional "con" in that it is regularly one of many strides in a more mind boggling misrepresentation conspire. The expression "social engineering" as a demonstration of mental control of a human, is additionally connected with the sociologies, yet its use has gotten on among PC and data security experts.Various types of social engineering attacks for obtaining the confidential information from the source(host) are :

1. Baiting: Baiting is the point at which an attacker leaves a malware-contaminated physical gadget, for example, a USB pendrive in a place it is certain to be found. The discoverer at that point grabs the gadget and loads it onto his PC, inadvertently introducing the malware. And in the given example the company is very small (less people to see you), so it won't be a tough job to catch an employee into this bait.

2. Phishing: Phishing is the point at which a malicious party sends a deceitful email masked as a genuine email, frequently implying to be from a trusted source. The message is intended to trap the beneficiary into sharing individual or money related data or tapping on a connection that introduces malware.

In the given example, due to less number of employees, and out of which only 5 are responsible for information technology and Network Security, they lack in giving attention to each and every mail thoroughly and it will be quite easy to trap them by using some official logos and names to pass them through some malicious link for gethering confidential data from their system.

3. Renumeration: implies something for something: An attacker calls arbitrary(random) numbers at an organization, guaranteeing to get back to from specialized help(technical support). In the long run this individual will hit somebody with a serious issue, thankful that somebody is providing back some help to them. The attacker will "help" take care of the issue and, all the while, have the client type commands that give the attacker access to dispatch malware. For implementing this technique you must be good in talking. This was greatly misused 15 years ago.

4. Pretexting: Pretexting is the point at which one gathering misleads another to access advantaged information. For instance, a pretexting trick could include an attacker who claims to require individual or money related information so as to affirm the personality of the beneficiary. This can also be easily done in the above mentioned example, if someone is asking about some company commodity code and all, you'll ask the other employee that time itself (bacause of small organization) and chances will be high that the attacker will get the information he needed. Apart from these, as the company often holding offsite company meeting and gatherings at local bars and restaurants, there can be some chances to lure the company's employee by buying drinks for them and in the process taking out some important information.

Add a comment
Know the answer?
Add Answer to:
Social Engineering: Search the Internet and refer to your readings for effective social engineering techniques. Now,...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Acer focuses on planning. Debate this assertion by making reference to the case study. In your...

    Acer focuses on planning. Debate this assertion by making reference to the case study. In your answer pay attention to the strengths and weaknesses of planning. QUESTION TWO out Acer... Technology innovation that fosters business transformation [45] We Are In the Acceleration Business We help customers use technology to slash the time it takes to turn ideas into value. In turn, they transform industries, markets and lives. Some of our customers run traditional IT environments. Most are transitioning to a...

  • Q.3\ How could IT/e-banking assist an organization/ a bank to achieve a competitive advantage in the...

    Q.3\ How could IT/e-banking assist an organization/ a bank to achieve a competitive advantage in the marketplace? Explain through the case of Citibank. please make sure you give a unique answer (not copied one) ,Please no hand writing, and need references. This question is from ECOM 421 e-Business Strategies and Business Models course e-Business Strategy and Models in Banks : Case of Citibank E-business strategy in Citibank: Banks today are up-to-date with both the pros and cons of the internet....

  • e-Business Strategy and Models in Banks : Case of Citibank E-business strategy in Citibank: Banks today...

    e-Business Strategy and Models in Banks : Case of Citibank E-business strategy in Citibank: Banks today are up-to-date with both the pros and cons of the internet. They are aware of the opportunities and threats that are associated with the Web. Not a single traditional bank is brave enough to face investment analysts without an Internet strategy. But even a very thoughtful approach to the Web may do no good to the company/ organization. The main purpose behind launching online...

  • Tony and Jeannie Nelson are married and file a joint return. They have four children whose...

    Tony and Jeannie Nelson are married and file a joint return. They have four children whose ages are: 12,15,19 & 23. The three youngest live at home with their parents and qualify as their dependents. The oldest Roger got married on 5/5 2019 and lives with his wife, Jane. The 19-year old Tabitha is studying Fine Arts at Savannah College of Art & Design. During the summer she helps her mother put together the art exhibits. They provide you with...

  • Will facebook be able to have a successful business model without invading privacy? explain your answer?...

    Will facebook be able to have a successful business model without invading privacy? explain your answer? could facebook take any measures to make this possible? BUSINESS PROBLEM-SOLVING CASE Facebook Privacy: Your Life for Sale Facebook has quickly morphed from a small, niche haps most obviously. Facebook allows you to keep in networking site for mostly Ivy League college stu- touch with your friends, relatives, local restaurants, dents into a publicly traded company with a market and, in short, just about...

  • Case: Criticizing customers. Short-changing workers. Sassing regulators. Deceiving authorities. Emphasizing rule breaking and ruthlessness in a...

    Case: Criticizing customers. Short-changing workers. Sassing regulators. Deceiving authorities. Emphasizing rule breaking and ruthlessness in a “win at all costs” workplace culture. Is this what it takes to go from startup to a $70 billion business in only seven years? Or are these characterizations false, the criticisms of jealous rivals? Let’s take an extended look at the exciting journey of the low-cost ridehailing service known as Uber, or Uber Technologies Inc., one of the leading transportation services of the world....

  • How can we assess whether a project is a success or a failure? This case presents...

    How can we assess whether a project is a success or a failure? This case presents two phases of a large business transformation project involving the implementation of an ERP system with the aim of creating an integrated company. The case illustrates some of the challenges associated with integration. It also presents the obstacles facing companies that undertake projects involving large information technology projects. Bombardier and Its Environment Joseph-Armand Bombardier was 15 years old when he built his first snowmobile...

  • CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male...

    CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male San Bernardino suspect's iPhone 5c. Cook stated: Antiterrorism We are challenging the FBI's demands with the deepes respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications While we believe the FBI's intentions are good, if would be wrong for the w e nt to force...

  • This year Evan graduated from college and took a job as a deliveryman in the city....

    This year Evan graduated from college and took a job as a deliveryman in the city. Evan was paid a salary of $68,500 and he received $700 in hourly pay for part-time work over the weekends. Evan summarized his expenses below: Cost of moving his possessions to the city (125 miles away) Interest paid on accumulated student loans Cost of purchasing a delivery uniform Contribution to State University deliveryman program $1,200 2,840 1,440 1,320 Calculate Evan's AGI and taxable income...

  • I have this case study to solve. i want to ask which type of case study...

    I have this case study to solve. i want to ask which type of case study in this like problem, evaluation or decision? if its decision then what are the criterias and all? Stardust Petroleum Sendirian Berhad: how to inculcate the pro-active safety culture? Farzana Quoquab, Nomahaza Mahadi, Taram Satiraksa Wan Abdullah and Jihad Mohammad Coming together is a beginning; keeping together is progress; working together is success. - Henry Ford The beginning Stardust was established in 2013 as a...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT