Social Engineering - 1000 words

User Generated

GhgbeEvtug

Business Finance

Description

As additional background, read the following two articles:

http://www.darkreading.com/the-7-best-social-engineering-attacks-ever/d/d-id/1319411

https://www.ijcsi.org/papers/IJCSI-13-6-129-135.pdf

In a written analysis, highlight and share an experiment that you might utilize to perform a social engineering attack on a company.

Discuss what methods and weaknesses you would use to exploit the employees or family members of employees to try and gain positive access and/or control.

Include any additional recommendations to the company/employees to protect against such exploitation.

Your paper should be 4-5 pages in length, not including the title and references pages, and should cite at least three scholarly resource other than the course materials. It should follow the academic writing standards and APA style guidelines, as appropriate.

It is strongly encouraged that you submit all assignments to the Turnitin Originality Check prior to submitting it to your instructor for grading. If you are unsure how to submit an assignment to the Originality Check tool, please review the Turnitin Originality Check Student Guide for step-by-step instructions.

Deliverables:

  • General Introduction about Social Engineering and IT Security Incident Response.
  • First section after the introduction should include more details about Social Engineering and IT related issues. Also, the types of Social Engineering and some techniques to perform Social Engineering to an organization
  • Sub title e about the methods and weaknesses you would use to exploit the employees or family members of employees to try and gain positive access and/or control.
  • The impact of Social Engineering to organization
  • Recommendations best practices to the company/employees to protect against such exploitation.
  • Conclusion
  • References

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hello, please check the uploaded file and let me know if there is any other way I can be of help.

Running Head: SOCIAL ENGINEERING

1

Social Engineering
NAME OF STUDENT
INSTITUTION
PROFESSOR’S NAME
DATE

2

SOCIAL ENGINEERING

Social Engineering
Introduction
Social engineering is a mean of gathering confidential information through manipulating
legitimate users or gaining unauthorized physical or network access to a target such as an
organization or a person. The attacker utilizes technique, for example, tricks, extortion, lies,
traps, threats, and bribes to get sensitive confidential information or persuading them to do
activities that are against the standard policies. By utilizing these techniques, the assailant takes
advantage of human weakness nature and builds two-way trust in order to gather the information.
This is preferably simpler than guessing computer vulnerability on the internet. Social
engineering recognizes that the users in any organization are the weakest connection in giving
security (Algarni et al, 2014, June). According to research, an attacker can acquire sensitive data
once found unauthorized access to a network. Then the attacker accesses open source
information, finds important information, names, codes, departments of the organization and
layouts to development of the organization website. After gathering all these information, the
attacker has enough information to physically infiltrate into organization website.
Once inside, the attacker will view all the organization data, can change some
information even including the passwords. There are numerous classes of social engineering and
all of whic...


Anonymous
Just what I needed. Studypool is a lifesaver!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags