essay on Social Engineering - 900 words

User Generated

GhgbeEvtug

Business Finance

Description

  • General Introduction about Social Engineering and IT Security Incident Response.
  • First section after the introduction should include more details about Social Engineering and IT related issues. Also, the types of Social Engineering and some techniques to perform Social Engineering to an organization
  • Sub title e about the methods and weaknesses you would use to exploit the employees or family members of employees to try and gain positive access and/or control.
  • The impact of Social Engineering to organization
  • Recommendations best practices to the company/employees to protect against such exploitation.
  • Conclusion
  • References

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: SOCIAL ENGINEERING

1

Social Engineering
Name:
Institution:

SOCIAL ENGINEERING

2

Introduction
Most of the times we often find ourselves at a risk of exposing confidential information
to people of sites that are not secure or guarantee security for our information. Some of the
attributed to this is the fact that we often tend to trust most of the people we interact with or the
sites we visit such that we would not mind sharing information with them. With the recent cases
of technological advancements coupled with cybercrimes, fraudsters and hackers, sharing
information with any person or any caller or even any site makes us under the risk of exposing
confidential information that can be used by fraudsters to defraud us. This therefore has
prompted researchers into probing what exactly happens such that we tend to be used by
fraudsters and hackers easily and why we are so gullible which lead to the notion of social
engineering which attributed to the loss of confidential and sensitive information by persons
without their consent.
Social Engineering refers to the psychological manipulation of individuals with an aim of
making them conceal confidential information. This is normally done by either fraudster who
have intentions of using one’s confidential to defraud them of their valuables or alternatively
networking companies who would want to get information about their customers. The
information security culture in man (ISC) in many organizations then to expose their employees
to the risk of giving out their confidential information without their consent. The current
organizational culture with regards to information security not secured and thus there is need for
measures to innate an incident response. Incident response is referred to an organized approached
whose efforts are geared towards neutralizing the threat posed by attacks on the information
security system. The incident response is often done and undertaken by the Computer Security
Incident Response Team (CSIRT). This team is a group of staff tasked to ensure that the security

SOCIAL ENGINEERING

3

of the respective organizattions is guaranteed and that the confidentiality of the employees’
personal and sensitive information is well taken care of by the information security system of the
organization. This also serves as a r...


Anonymous
Goes above and beyond expectations!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags