Social Engineering And Its Relevance To Information

0 / 5. 0

Social Engineering and its relevance to information

Introduction

Nowadays the most important asset is the information because everyone fights in the world for having it … well historically it has also been, but it is currently very easy to have the information of others, because people give the information regardless of what whatIt happens only to have a new application or teach how they are having fun in x bar with a person, we do not measure the consequences of our actions by wanting to communicate with people through social networks, this means that they know us more every day that happens.

However, this happens worldwide and do not have enough security to protect information, which happens if they hack a banking company, a school institute, a data center (where you store your information virtually), etc.. All technology can be hacked, but the most fragile part in the security of a company remains the human being and its communication.

Developing

Business information

Sharing information with companies is accepting an invasion of your privacy, unfortunately this happens that people are not well informed and there are cases such as Cambridge Analycc that was the company that helped Donal Trump in his electoral campaign through Facebook thus creating aMarketing sturcture, as Brittany Kaiser (a former Crambrige Analyc Employment)- ‘Technology companies have value because they exploit people’s data’.

In all entrepreneurs there is information from both the employee and everything that is handled in the company for them is power, because as Aaron Swartz said in guerrillas Open Access Manifesto -“Information is power. But, like any power, there are those who want to keep it for themselves.”, Now let’s imagine that this power falls into wrong hands, because that can happen by human fragility and our ways of communicating either digitally or personally.

What is social engineering?

It is science for someone to information without realizing it, because people are the most weak part of a company, but every system depends on a human being so that it can work, this means that social engineering focuses moreIn the areas that surround the company (security, mill, reception, etc …) or even people’s own family within the company can be affected, all this leaving aside technology.

Social Engineering Function

There is always a discussion within the field of information and hackers, because according to security experts- "the only safe computer is the one that is unplugged", but social engineering experts respond- "there will always be an opportunity to convince someone to plug". The effectiveness of the issuer at the time of communicating will influence the behavior of the receiver, since the more it manages to persuade the closer it is to achieve its objective.

The types of attacks can vary depending on the information they have, in addition to how the receiver answers all that can influence an attack and the strategy that they manage until they achieve, one of the most easy ways to get infomming according to Kevin Mitnick (known asThe Magician of Social Engineering) said -“If you ask for confidential information, people, naturally, suspect immediately. If you pretend that you already have that information and say something that is wrong, people usually correct and reward you with the information you were looking for ”.

Mitnick managed to be one of the best hackers in the world but that the best, not being a software geni.OR.A (United States of America) in its history stealing a lot of information from the country.

Types of attack

  • Telephone attack: This is a very common attack either in companies and even in the personal life of a person, since the attacker seeks a way to threaten, to achieve a monetary or information benefit.This way is very safe for him since facial features are not seen and simply with the voice can modify the course of conversation. Currently it is also very common that they send you text messages asking for information, an example Nuy Community is when they send you a message saying that you won a prize and ask you for card number to deposit.
  • Internet attack: It is one of the most common forms to attack through advertising within web pages this will vary depending on the website where you are. Also sometimes on pages like Facebook and emails they send you false message or the same false advertising so that you enter a page and from there download a virus to your computer.
  • Face to face attack: This can be the most structured and complex, because you have to know how to communicate well and be good socially. Also, although it is very rare, it can be an external attack, I mean getting close to a person’s circle to gradually approach you and their goal.

conclusion

Information security are not alone technical and physical issues, because the social environment and everything that entails is also very important. I wanted to show what they are looking for, because not our information all the time is in danger and we are not sure, in addition to the fact that ways can attack to be prevented either in a cooring way and in daily life. 

Free Social Engineering And Its Relevance To Information Essay Sample

Related samples

Zika virus: Transmission form Introduction The Zika virus belongs to the Flaviviradae family, was found for the first time in a monkey called Rhesus febrile and in...

Zika virus: cases and prevention Introduction The World Health Organization (WHO) has confirmed that Zika is a virus caused through the mosquito bite which is...

Zeus The King of Greek mythology Introduction Zeus is the Olympic God of heaven and thunder, the king of all other gods and men and, consequently, the main figure...

Zeus's punishment to Prometheus Introduction Prometheus, punished by Zeus Prometheus, punished by Zeus. Prometheus is a ‘cousin’ of Zeus. He is the son of the...

Comments

Leave feedback

Your email address will not be published. Required fields are marked *