Disadvantages Of Social Engineering

Decent Essays
Society today has gotten into the habit of allowing their login credentials set to auto-fill on their highly used websites. Individuals allow for their favorite shopping websites to remember their credit card numbers and home addresses. People are tempted to use the easy way out, the simple solution or the swiftest method that’s made available. The same individual who wants to make their purchase with the simple click of a button often has their phone locked with a password or a fingerprint for security. Many people believe that they are taking the measures necessary to protect themselves and their personally identifiable information, but, do not know the risk that they take on an everyday basis. In this day and age, E-Business has been built …show more content…
One of the biggest problems that can come from Social Engineering is someone having their entire identity stolen. No matter the outcome Social Engineering allows for an individual’s personal information to be abused by someone else. Not only can someone’s personal information be used to hurt others as well. An example of this type of Social Engineering is used when an individual makes an attempt to scam a family. The individual may make it appear as if a family member is hurt or in danger, playing on the family members emotions they may convince them to send money in order to help. But, while there are many bad sides to Social Engineering, there is some good that can come from it.
Many don’t believe that the effects of Social Engineering can be completely reduced. One positive impact that Social Engineering has on society is that it allows for new and innovative ways for individuals and society to protect themselves. Social engineering brings awareness to the threat of hacking and cyber-attacks on innocent individuals. Making people aware of just how easy it is to have their information stolen will help them in their efforts to protect themselves against these

Related Documents

  • Improved Essays

    Loo1 Unit 2 Research Paper

    • 1344 Words
    • 6 Pages

    Blackboard Name: Sanya Murgai PSID: 1264832 LO1: Discuss information privacy and methods for improving the privacy of information. LO2: Explain the effects on information privacy of e-mail, data collection, and censorship. In today’s day and age, privacies definition can be manipulated to personal preferences. Once we put something on the internet, it will be accessible forever even if we delete it.…

    • 1344 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    Analysis: Blown To Bits

    • 312 Words
    • 2 Pages

    Chapter two of Blown to Bits by Hal Abelson, Ken Ledeen, and Harry Lewis was about how technology affects our privacy. In this chapter, the authors discussed how our privacy is being stripped away, the willingness with which we give this privacy away, and privacy policies. As experts in technology, Abelson, Ledeen, and Lewis discuss how technology has aided this progression of human ideologies to lead increasingly more public lives. Our privacy is constantly being stripped away from us thanks to the technological innovations. As technology becomes more and more widely used, more and more personal information is being stored through technological means.…

    • 312 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    Nevertheless, Park doesn't fail to address some more of the reality that we face in the everyday world _ robbery. Basically, we apply every other measure to keep our personal and social life as well as our monetary fund away from strangers in the real world. And we keep ourselves up to date with the passwords while constantly changing it at regular intervals required, especially with the credit cards and social Google accounts. But still hackers and robbers will find the best way out to decrypt our passwords from us through the worst of ways; surely for their own personal benefits and profits. This existing problem is shown along with clarity over the short story that Park presents.…

    • 1975 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    The use of technology can significantly save costs and improve products quality in an organisation, which can help Full Bloom. Full Bloom operate in a very competitive business environment, competing not only with other florist shops but also with supermarkets and convenience stores. In addition, they have to deal with the threat of substitute products such as trendier technological gifts or other cheaper kinds of gifts that can be mass produced at a lower cost. A strategy that can help Full Bloom accomplish their vision while addressing their competitors and challenges is using competiveness advantage. Competiveness advantage is the ability of the organisation to sell goods and services better than its competitors.…

    • 526 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    To keep our communities safe, we must have our social media accounts checked. However, officials should not be able to check people’s social network accounts. I strongly believe officials should be able to check people’s social networks for our safety. My essay will be about how I believe officials should be able to checked people’s social network accounts.…

    • 531 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    The word security has changed over time in different ways including what it means, context, and what it really stands for. Security in today’s age means the state of being in good protection from danger. However, looking back the definition was more so related to social status and economic security meaning you were making steady income. Both still mean protection from danger, as in now we think of it as protection for life but back then it was protection from what people thought you were, homeless or poor. Let's look at the text 1, Declaration of Independence, which talks about its contextual meanings.…

    • 457 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    As consumers, we trust corporations with private information like phone numbers, home addresses, SSID numbers, and in some cases interests or search history. Facebook and Google, which are tech giants, sells out your history to companies like Target to advertise merchandise on the internet that is personally tailored to you. Target and other well known stores have been hacked for customer information. A few easy rules to follow to prevent getting hacked are not shopping online and pay with cash as much as possible. According to Lee Rainie, an expert in research in internet, science and technology if one cannot, they are among “91% of Americans who say they do not have control of their personal information online”(Rainie 7).…

    • 1159 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Social Media Data Analysis

    • 1277 Words
    • 5 Pages

    Having the necessary information is crucial in almost any area, especially for research and development. The purpose of collecting data is primarily for knowledge discovery, then for further consideration. In other words, all websites gather people’s information and base on them to explore their behaviours and trends. From there, they will shape the browsing experience that match each person’s preference in the future. As mentioned above, social media, especially Facebook and Google, track all users’ activities online.…

    • 1277 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    With the new technology we spew each year, promising us new ways to keep us secure. The everyday user usually does not realize how unprotected their newly purchased appliances really are. More people are getting attacked, scammed, and are being robbed everyday due to the lack of knowledge people have about their appliances. So eventually with people placing their personal info into these accessible and yet vulnerable phones and computers, those same people will get riled up with the amounts of times they have been hacked into and would declare that their government should do something about their unfortunate situation. The real issue isn’t about the accessibility of our private information, but whether or not society is willing to sacrifice…

    • 860 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    There are a plethora of social media sites today. Discovering Computers 2016 (2016) defines social media as "a website that encourages members in its online community to share their interests, ideas, stories, photos, music, and videos with other registered users" (p. 72). From Facebook, to Instagram and Twitter. There are websites where you can socialize and then websites, such as YouTube, that are used to just post short videos. No matter what the social platform, there are millions of people plugged into them.…

    • 1482 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    In our daily lives, we relinquish some of our private information ignorantly. As human beings, many of us tend to simply hand out our information in exchange for other items or free services. Many times, online shopping offers better prices but at what cost? Sometimes, better prices means relinquishing your private information that could be obtained by anyone at anytime. In the article, The Convenience-Surveillance Tradeoff, the author makes compelling points on how our society is unaware of the repercussions that come with relinquishing our…

    • 1456 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    CHAPTER I INTRODUCTION In today’s business, e-business is very common for utilizing information and communication technology to support all the activities of the business. E-business is a business that runs via online, it is including buying and selling of goods and services through the internet. With e-business, companies are able to link their internal and external data processing system to be more effective and efficient.…

    • 1456 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Albert Einstein once stated, “Technological progress is like an axe in the hands of a pathological criminal.” This quote from 1800s-1900s has become even more relevant in the 21st century, because of the advancing popularity in social media platforms. Adolescents are mainly exposed to modern media sites because they’re growing up in a time where technology is advancing rapidly. Advocates of social media platforms claim that the internet is what connects the world together; it is an efficient and helpful way of communication, a modernized way for students and teachers to search for information and conveniently spreads informative news faster. However, social media manages to put society 's privacy in danger every day.…

    • 1090 Words
    • 5 Pages
    Improved Essays