Ans 1.
Engineering is the application of science/math to solve real life
problems. Engineers find out that how things
work .
And science is a systematic study of any thing.
social science is a systematic study of society.
a systematic study of society can help the society in various
ways.
but in context of Information security.
social engineering means to study the psychology of
of an individual(victim) to take his/her(victim's) confidential
information(such as PIN, passwords, credit card number and so
on.
After having such confidential information, the attacker can misuse
this information.
So, a person who is attempting to grab the victim's confidential
information should be shrewd.
and should have the tendency to cheat his/her friends colleague and
so on.
because social engineering is always applied to the persons who are
familiar with the attacker.
It is very difficult to know the password of a victim by
cracking/guessing.
the easiest way,that victim reveals his/her confidential
information to the attacker.
An attacker can make it possible by following methods
Baiting:
If an attacker knows about the victim's internet habits, hobbies(
such as listening audio, watching video).
Attacker can set the bait for the victim in following ways.
a)False lottery email
there is a chance, that the victim clicks some link and the malware
may take its place on the victim's computer.for example key logger
can record all the key strokes made by the victim.
b)Too much trust
An attacker can gain the trust of the victim by helping him/her in
various ways.
and victim can give his/her confidential information to the
attacker.
c)Phishing:False web page can be sent to the victim's computer such
as bank account login page to steal the password(by key
logger).
d)online shopping:- if a victim uses credit/debit card for online
shopping,victim enters credit/debit card number and other
confidential information, which can be taken by the attacker(using
key logger).
e)installation of the malware(key logger) on the victim's
computer:-
if victim's hobby is to watch videos, and attacker knows victim's
choice,attacker can send such videos.
when victim downloads such videos,malware will be installed with
the downloaded videos.
Ans 2.
Attacker:-Mr. ABC
target/victim:- Mr. XYZ
As stated earlier, social engineering is a game of
psychology.
So, first of all, attacker should make up his/her mind to cheat
some one.
and attacker should also be shrewd.
Now, attacker will increase the interaction with the
target/victim.
for example: shop together, lunch together, and other social
activities.
It this way attacker can study victim's habits such as internet habits, hobbies( such as listening audio, watching video).
Now attacker should try phishing.
Attacker can also plant the malware on the victim's computer by giving audio/video to the victim.
Attacker can gain trust of target/victim.
and can take the advantage of this trust.
Write a 3 to 4 page paper where you discuss the social engineering process. Pick a fictitious person and explain how you would attempt to use social engineering on that person.
Write a 3 to 5 page paper dealing with project management. You may pick a chapter from Information technology Project management 8th Edition to do your paper on, or you may do your paper on how project management is used in industry. The paper must be double spaced, and references must be cited.
Write a 4 to 5 page paper (not including title and reference pages) write-up a scenario where you develop a plan to attack a fictitious organization. Use all the phases that in this hacking Methodology course to build your plan.
Write a 1-2 page paper explaining how you would address the situation found in Workplace Applications on page 245 of your Study Guide. Mr. Sanchez comes to the desk to check out after seeing the physician. When Brenda tells him that his bill is $95, he complains that he only saw the physician for 10 minutes. The fee is in accordance with evaluation and management guidelines. Explain the fees to Mr. Sanchez. Consider the following questions when writing your paper....
Write 3 to 4 page paper in a narrative format. Paper must be typed and submitted using microsoft word. You are to interview the CEO or owner of a business and answer the following question in paragraph form. 1. Why are you in this business? 2. What is your primary product or service? 3. What are you social responsibility efforts? 4. What is the major problem facing your business or industry? 5. What is our greatest market potential for profit...
In a 2-3 page paper discuss how health and illness beliefs can influence the assessment process. You can use the Table on Traditional Health and Illness Beliefs in your textbook or any other evidence-based sources. Include how belief structure might impact how a client responds to an assessment interview and how culture might influence physical findings. Your assignment must have accurate spelling and grammar and use APA Editorial Format.
In a 2-3 page paper discuss how health and illness beliefs can influence the assessment process. You can use the Table on Traditional Health and Illness Beliefs in your textbook or any other evidence-based sources. Include how belief structure might impact how a client responds to an assessment interview and how culture might influence physical findings. Your assignment must have accurate spelling and grammar and use APA Editorial Format
Critical Thinking 2-3: Your Social Engineering Attack Today's Attacks and Defenses at the beginning of this chapter illustrated how a security researcher could manipulate a help desk support technician into compromising security. If you were to create your own social engineering attack, what would it be? Using your place of employment or school, first determine exactly what your goal would be in the attack, and then craft a detailed description of how you would carry out the attack using only...
In a 1-2 page paper explain the difference in how you would mine data based on the 3 categories; Prediction, Clustering, and Association. Within the paper, please include responses to the following questions: What is the difference in the type of data needed? Which data mining approach would you choose? Why? How will the outcomes of the analysis be used?
Write a 2-page paper in which you explain and analyze the different types of derivatives and how they affect financial statements. You are required to use at least two journal articles and follow proper APA format.
In this learning plan you explored diseases and disorders of the both the eye and ear. You were asked to attempt to understand life as visually impaired or hearing impaired person would. Write a paper that addresses at least two diseases or disorders that would cause visual impairment and at least two diseases or disorders that would cause hearing impairment. Include how these four total diseases or disorders are contracted (age related, genetic, infection, etc) and what treatment options would...