Social Engineering and Reverse Social Engineering Assignment

Anonymous
timer Asked: Feb 9th, 2019
account_balance_wallet $9.99

Question Description

This is a research paper which should have following

- 10 pages(Minimum),

- 12 font size,

- 1” margins,

- double-spaced including figures, tables, etc.

- use a minimum of one graphic (may use a table)

Must have current APA format guide (6th Edition) for the research paper. Use spell check, grammar check, no keyboarding or grammatical errors

A cover page and a reference page are required. Make sure the cover page and reference page are also in current APA format.

Provide at-least 5 references - References should be attached at the end in APA format, need few from Cited Journals or peer-reviewed journals

Most Importantly, NO PLAGIARISM - provide a plagiarism report

Tutor Answer

MercyK254
School: Rice University

Attached.

Running Head: SOCIAL ENGINEERING AND REVERSE SOCIAL ENGINEERING

Social Engineering and Reverse Social Engineering
Name
Institutional Affiliation

1

SOCIAL ENGINEERING AND REVERSE SOCIAL ENGINEERING

Social Engineering and Reverse Social Engineering
Social engineering has become more prevalent and sophisticated as the attackers are
ever devising new strategies to ensure victims reveal valuable company data. Social
engineering is a manipulative manner in which the unsuspecting victims are lured into
handing sensitive or private and confidential data to the attackers. In most occasions, system
users end up divulging their user identities and passwords unsuspectingly to the hackers. The
rationale is to obtain extremely valuable information without using too much effort. This
analysis seeks to critically examine what social engineering and reverse social engineering is.
It will give recommendations on how individuals can carry out due diligence so that they are
way ahead of the criminals.
When there is vulnerability in information systems security, there is likelihood that
information will be stolen. In most occasions, the vulnerabilities are detected after an attack
has occurred. At times, the attack does not get easily detected since they might be minute.
They might occur over a span of time making companies to lose extremely valuable
information. It is justified for organizations to have elaborate protection mechanisms since
what is at stake in these cases can be massive. Compromise of this information can be
damning as it might lead to numerous lawsuits especially in the event confidential data is
leaked out. In business, it might lead to g the loss of customers or the loss of money which
can lead to a decline in profitability. Businesses that thrive on customer retention can be
negatively affected as their might lose their trust in the businesses.
What are some of the techniques Used in Social Engineering?
Hackers in most occasions call the targets claiming to be computer support staff
requesting them for their user names and password to correct a problem with the system. The

2

SOCIAL ENGINEERING AND REVERSE SOCIAL ENGINEERING

hackers are psychologically manipulative as the invoke fear and urgency in the target victims.
They then bait the users in revealing vital details about themselves and then making the click
on malevolent links and or files (Breda, Barbosa, Morais, 2017). Alternatively, a hacker
would seek employment at the firm they desire to obtain information from. Although the
hacker might not directly get the information he or she desires, he or she might gain indirect
access because he or she might have entry to areas that non-employees have access to.
Janitors and garbage collector jobs are more valuable to hackers since they are allowed to
access any part of the building. They can go through garbage or go through unattended to
desks once people leave their premises.
The other technique used to access the computer systems include engaging in criminal
actions for instance, a company can decide to practice industrial espionage by spying on
corporate facilities to get information. The other technique used to collect computer password
sis through eavesdropping especially when a person is typing in a computer password. Social
engineering gives attackers knowledge that they would initially not be privy to had the
technical security mechanisms not have been tampered with. It enables them to comprehend
the weaknesses of all employees as they thrive on poor plans and procedures.
Vulnerabilities that Allow Social Engineering to Occur
The most common vulnerability that allows social engineering to occur is poor
security awareness. The validation is that people do are not aware on how to respond to such
attacks in the event they occur. Firms that have security systems in place do not have the right
sources to counter check their security systems.
Very few pe...

flag Report DMCA
Review

Anonymous
Thank you! Reasonably priced given the quality not just of the tutors but the moderators too. They were helpful and accommodating given my needs.

Similar Questions
Related Tags

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors