Social Engineering Attack

Decent Essays
My Topic for the Lesson 8 Presentation
The topic I have chosen for my presentation is, “Preventing Social Engineering Attacks.” A social engineering attack is one of the most powerful weapons used to steal people’s passwords, credit cards, and personal data. It takes advantage of the fact that the biggest vulnerability of any security system is the users themselves. Social Engineering uses psychological tricks in order to get users to volunteer their personal information. These attacks can be launched very easily on a mass scale and range from sending you an email from “your late African uncle” to pretending to be your bank over the phone. They prey on those who are either unlucky or unaware. Social engineering attacks are so strong that they can even take down whole companies. Since these attack use complex strategies, it takes complex strategies to defend against them.
My Sources.
My sources are the book:
1. Hadnagy, C., & Books24x7, I. (2011;2010;). Social engineering: The art of human hacking (1. Aufl.;1; ed.). Indianapolis, IN: Wiley.
2. Peltier, Thomas R. (2014) Social Engineering: Concepts and Solutions. Retrieved February 26, 2017, from
…show more content…
Both are highly qualified on the topic of security since they worked as security consultants. They did not list that they had college degrees, but this is less important than certifications in this context. Certifications require that the user re-test every so often to make sure they stay up to date on the latest security techniques. This is critical when writing a presentation on security because security is constantly evolving. I obtained the first source through research on Lion search and the second I found extremely useful in a previous

Related Documents

  • Decent Essays

    Analysis: Blown To Bits

    • 312 Words
    • 2 Pages

    Chapter two of Blown to Bits by Hal Abelson, Ken Ledeen, and Harry Lewis was about how technology affects our privacy. In this chapter, the authors discussed how our privacy is being stripped away, the willingness with which we give this privacy away, and privacy policies. As experts in technology, Abelson, Ledeen, and Lewis discuss how technology has aided this progression of human ideologies to lead increasingly more public lives. Our privacy is constantly being stripped away from us thanks to the technological innovations. As technology becomes more and more widely used, more and more personal information is being stored through technological means.…

    • 312 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    In an era where some of the biggest damage is done by simple keystrokes, cyber security is an essential part of any organization, whether big or small. The purpose of this report was to gather information regarding The University of Texas Health Science Center at San Antonio (UTHSCSA). Through proper use of research, network scanning, and social engineering the team was able to obtain valuable information regarding the infrastructure, policy, intellectual properties and the security of the Health and Sciences center. The Team would be able to analyze all the findings and point out key the interfaces that may potentially be impacted as well as the key threats and vulnerabilities. These findings were to be given to executives at the Health and…

    • 1298 Words
    • 6 Pages
    Superior Essays
  • Superior Essays

    Social Network: A Newborn Monster One of the sensational social issues on media is about the negative global impacts of the spread of social communication on the Internet. These sites were established to tie the individual to each other and create a strong solidarity among members, however, are creating an egoistic society. The way people using the social network, and the way it affects society are over control and unpredictable. According to the article “Online Socializing: A New Agents of Socialization”, the younger people are, the more they use the online social network.…

    • 1343 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    The 21st century has added a new weapon to the arsenal of persecutors. Credit card companies can lower a customer 's credit limit based solely on where they’ve shopped. An employer can make his or her decision on hiring an employee using just social media footprints. Lori Andrews presents frightening information in her essay “Facebook Is Using You”. Through the use of statistics, anecdotal evidence, and appeals to the audience 's sense of fear, she successfully convinces the reader that there is a need for a Do-Not-Track law.…

    • 802 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Marisa Bugarin Professor Bivona ENG 102 3:00-4:15 3/16/15 Annotated Bibliography Annotated Bibliography 1) Chemaly, Soraya. " A Million Peeping Toms: When Hacking Is Also A Hate Crime." Time. Com (2014): 1.…

    • 1953 Words
    • 8 Pages
    Improved Essays
  • Decent Essays

    Phishing is one of the assaults that have become famous these days. it's far an identity robbery try with the intention to obtain exclusive and private data of people or companies for monetary or other profits. inside the latest component there had been many reports on phishing assault in lots of financial domains such as banking. It has emerge as a severe threat to establishments that deal with monetary transactions. If those threats aren't addressed thoroughly, people can’t trust on-line transactions that contain due authentication through credentials.…

    • 205 Words
    • 1 Pages
    Decent Essays
  • Brilliant Essays

    Kathleen Ebscohost

    • 554 Words
    • 3 Pages

    Pcworld, Nov. 2015, p. 51. Ebscohost, proxy.jjc.edu/login?url=http://search.Ebscohost.com/login.aspx?direct=true&db=ulh&AN=110843237&site=eds-live. Stein, Joel, Eben Harrell. "Your Data, Yourself." Time, vol. 177, no. 11, 21 Mar. 2011, pp.…

    • 554 Words
    • 3 Pages
    Brilliant Essays
  • Decent Essays

    This article provides insight into the sphere of CyberFraud and its effect internationally and nationally (United States of America), it explores statistics on who the criminals target, why they target their victims, the information that is stolen during the attack(s) and the economic effect the attacks hold. The source focusses on the most common aspects of CyberFraud and has valuable statistics of being affected and becoming a victim of the crime. The source explores the major types of CyberFraud; Phishing, Pharming and Identity Theft. The article concludes with how corporations can prevent the attacks and shows the damage (economically) that CyberFraud generates.…

    • 400 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    The word security has changed over time in different ways including what it means, context, and what it really stands for. Security in today’s age means the state of being in good protection from danger. However, looking back the definition was more so related to social status and economic security meaning you were making steady income. Both still mean protection from danger, as in now we think of it as protection for life but back then it was protection from what people thought you were, homeless or poor. Let's look at the text 1, Declaration of Independence, which talks about its contextual meanings.…

    • 457 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    This novel stands today, as an important reminder of where society could be headed if not appropriately governed. In today’s society, people share in abundance, information about themselves on social media and the through the Internet itself. Passwords, emails, addresses, the list goes on and on, at this…

    • 2165 Words
    • 9 Pages
    Superior Essays
  • Improved Essays

    Especially showcased in scenarios of the workplace and job field, digital and social media is becoming a mere weapon in the arsenal of employers everywhere; using today’s technology, business employers are able to track down and extract personal information posted on social media websites by the simple signature of an employee contract. Nowadays, companies looking to hire new positions first weed out possible candidates by doing a simple Google search or Facebook look-up prior to the initial pursuit process; even with extensive personal settings supposedly guaranteeing privacy to unwelcome followers, there are all kinds of hacks that still make such a feat possible. Even beyond the hiring process, employers are also using social media to track their workers. Highly ranked bosses are now realizing that social media has “struck fear into some employers about decreased productivity, unwanted publicity, and an increase in exposure for various work-related claims” (Handman). For example, workers for a certain beverage company can suffer severe consequences if they post a picture promoting a beverage of another type, eventually causing unwanted publicity for rivaling corporations.…

    • 1024 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Conformity Bias

    • 1015 Words
    • 5 Pages

    How times have changed as technologies, have evolved, so too have the tools that cyber attackers use to hack into businesses to access personal information. Fraud has always existed and has hardly changed, only the disguises it uses. In today’s world people, have been taught to push and strive for more and to continue to push for more. This new way of thinking has quickly developed into something uncontrollable. It has caused a new stream of fraud to emerge for it has created higher levels of greed, new methods to detection, as well as new ways to prevention.…

    • 1015 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Thompson discusses the over use of Facebook, Myspace, and Twitter, and how the people who use these websites daily, rule their lives. He also mentioned the idea of privacy and how these social networking sites expose someone’s privacy. He stated, “browsing Facebook was like constantly poking your head into someone’s room to see how she was doing”(Thompson 583), as if every action done on the site is being seen. He describes the social networking sites as a “small-town life”, because everyone is in each other’s business and daily life. “It’s just like living in a village, where it’s actually hard to lie because everyone knows the truth”(Thompson 591).…

    • 913 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    A literature review allows a researcher to present the findings and viewpoints of other researchers in order to build on existing knowledge (Onwuegbuzie, Leech, & Collins 2012). This allows the researcher to build a solid foundation in which to further sustain their work and demonstrate the credibility of sources used. By the use of Google Scholar, EBESCOhost and proQuest I reviewed the literature pertaining to cyber awareness, cyber security, cyber attacks, the economic fallout from cyber attacks and the state of businesses taking preventative measures. Furthermore, I reviewed the literature based on the need for individuals to concern themselves with cyber awareness.…

    • 2302 Words
    • 10 Pages
    Great Essays
  • Improved Essays

    As you are well aware the world is strikingly different and has evolved through constant change. The same may be stated for the military and social media, when I first entered military service in 1977 our social media was personal interaction, slow-mail and phone conversations. Now we acknowledge various mediums that we may use to communicate or keep in touch with family, friends and so forth. The military acknowledges the fact that social media is an intricate part of our culture, social-media benefits the military in a variety of ways from recruiting, and highlighting each individual branch with reports/stories of who they are and what they are accomplishing on home station or around the world, or as a morale boost keeping families separated by long distances in touch.…

    • 418 Words
    • 2 Pages
    Improved Essays