Cumberlands Components of a typical social engineering strategy

Anonymous
timer Asked: Feb 21st, 2019
account_balance_wallet $20

Question Description

Chapple et al. (2014) stated that social engineering is a strategy in which hackers exploit the general human tendency to trust, cooperate, and offer help, especially to those they consider part of their organization or peer group. This week’s reading mentioned four components a typical social engineering strategy would embrace. Using proper APA formatting write 3-5 pages defining and explaining how these components enhance social engineering abilities.

Requirements

Please use the Individual Project (IP) title page provided in the course material folder. Your SA score should not be more than 30%. All paragraphs must be indented and have at least four complete sentences. You should also use sub-headers for each component. In-text citations and a reference list are also a requirement. Please ensure that all cited sources are credible.Need 6 in-text citations and references.

Please use attached template

Unformatted Attachment Preview

ISOL531-42 Access Control 1 Your Name University of the Cumberlands ISOL634-25 Physical Security Week 17 Individual Project Professor Richards Date ISOL531-42 Access Control What is defensible space? According to Fennelly (2013), defensible space is a surrogate term for the range of mechanisms real and symbolic barriers, strongly defined areas of influence, improved opportunities for surveillance that combine to bring an environment under the control of its residents. To provide maximum security and control over an area, it should first be divided into smaller, clearly defined areas or zones, which describe the defensible space (Wayland, 2015). What is Crime Prevention through Environmental Design? Crime Prevention through Environmental Design (CPTED) is a multidisciplinary approach to the reduction of crime and the associated enhancement of the perception of personal safety by inhabitants of an environment (Tipton & Nozaki, 2007). White (2014) stated that CPTED is a concept in the security industry, basically meaning that you may be able to reduce criminal acts from occurring with the proper design and planning of an environment. In theory, you can make changes to the physical environment that allow for better physical and operational controls of the property; as a result, it can further your crime prevention strategies. 2 ISOL531-42 Access Control 3 References Fennelly, L. J. (2013). Effective physical security (Fourth edition. ed.). Amsterdam: ButterworthHeinemannis an imprint of Elsevier. Tipton, H. F., & Nozaki, M. K. (2007). Information security management handbook (6th ed.). Boca Raton: Auerbach Publications. Wayland, B. A. (2015). Emergency preparedness for business professionals : How to mitigate and respond to attacks against your organization (1st edition. ed.). Wlatham, MA: Elsevier. White, J. M. (2014). Security risk assessment : Managing physical and operational security. Amsterdam ; Boston: Butterworth-Heinemann is an imprint of Elsevier. ...
Purchase answer to see full attachment

Tutor Answer

ProfessorMyron
School: UT Austin

Hey, please find the below attached file and kindly ask me for any editing, enhancement or modification. Otherwise, if all is great, kindly invite me for more tasks. Thanks!

ISOL531-42 Access Control

1

Your Name
University of the Cumberlands
ISOL634-25 Physical Security
Week 17 Individual Project
Professor Richards
Date

ISOL531-42 Access Control

Components of a typical social engineering strategy
Introduction
Due to software and hardware upgrade, technical hacking has relatively become harder.
Subsequently, most hackers have placed their focus on organization employees, trying to take
advantage of human psychological weakness based on trust, cooperation and the desire to assist
or make progress in life (Richards, 2008, p.41). Therefore, there is an immediate need for
modern-day organizations to formulate and implement strategies that remedy human
vulnerabilities and weaknesses. Social engineering tries to unravel and remedy these human
weaknesses as they have proved costly to a significant number of business organizations.
Discussed below are the components of a typical social engineering strategy.
The Components of a typical social engineering strategy
Information Security control components
One way of keeping an organization data and information secure is by the design and
implementation of information security control components. These components are meant to
safeguards, counteract, detect and minimize security risks associated with hacking (Kim &
Solomon,2012). They are also intended to control how and who can access the company data and
information and at what time.
Information control components fall under different classifications based on the criteria
used. There are two common classifications, one is the classification based the time they react in
response to information security risk and they include preventive, detective and collective
information control components. The other classification is based on the nature of the

2

ISOL531-42 Access Control

information control components. They include procedural controls, physical controls, regulatory
and legal controls and finally we have the physical controls. Harnesk and Lindstrom (2012) also
define the components based on three-dimensional perspectives. The first dimension is on
confidentiality and this means the company’s data and information should be kept private and
away from non-company employees. The second dimension is on integrity and this is something
that directly links to company employees who are expected to maintain high levels of personal
integrity. The third dimension falls under the availability of the company’s information,
company information should be only availed to those that have been cleared by the company.
Risk assessment Component
This component is much more related to assessing the impact of a possible hack. Through
the risk assessment component, an organization is able to identify a possibl...

flag Report DMCA
Review

Anonymous
Goes above and beyond expectations !

Similar Questions
Related Tags

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors